Jump to content

TheWanderingJewels

Senior members
  • Content Count

    194
  • Joined

  • Last visited

Community Reputation

0 Neutral

About TheWanderingJewels

  • Rank
    Cyberpunk
  • Birthday 28/02/1970

Contact Methods

  • AIM
    hasmoline
  • Website URL
    http://trek-rpg.net
  • ICQ
    0
  • Yahoo
    julianxsj

Profile Information

  • Location
    Lincoln, NE
  • Interests
    Japanese Chambara films, Cinema, Bo-Staff Training, Biking, Goth Music, Anime, Roleplaying, Brewing, Cooking
  1. Avast http://fmso.leavenworth.army.mil/Collabora...Narco-Armor.pdf
  2. Program Examples Chimes (as in rung): This is a nonlethal, but unpleasant anti-personnel program designed by the cadre of hackers known as The Collective from The Outer District, Chiba-kyu, Tokyo. The program appears to be code-optimized and weaponized simsense code that temporarily blinds the target (primary function) and inflicts aphasia on the target (secondary function), putting the desk nearly out of Cyberspace combat. While not designed to move on it's own, it does tag the target with trace protocols to alert the user when the struck target jacks out or comes back online. While the ICE is non-lethal, it has gained respect (and fear) from many runners who have been on the receiving end of it Icon: the programs tends to resemble a wave of incoming lines resembling old style vector graphic version of missile tracks that tack the target in a spiraling pattern. Building the Program TN: 35 STR: 6 Anti-personnel: +20 Trace: +2 Strength 6: +6 Secondary Combat function (Str 6): +6 Icon (contetxural) : +1 Effects: Target takes -6 to Sight rolls due to inability focus correctly for 6 rounds, and will have penalties (-6) to tech rolls and social rolls as their scrambled neurons attempt to reorder themselves. Tickle: Based on code stolen from several megacorps and modified, this is a rather ugly little bit of anti-personnel software that has come out of Eastern Europe, made by hackers that have had to deal with Weefle-runners once too often and feel like sending a message. Also used by several megacorps as an intermediate grade of Grey to Black ICE. The ICE is designed to give the target very painful chest pains and to induce vomiting, which tends to discourage most low grad runners permanently, and give professional deckers a bit of shock as they realize the opposition could be playing much rougher. Icon: due to the rather black sense of humor of the designers, the icon for the program looks to be a colorful graphic feather in flight Building the Program TN: 40 STR: 6 Anti-personnel: +20 Movement: +5 Trace: +2 Strength 6: +6 Secondary Combat function (Str 6): +6 Icon (contetxural) : +1 Effects: given the rather unpleasant nature of the program, to Stun saves of -6 vs DV15 are made. The first triggers heart beats, often felt as chest palpitations. Its up to the GM to decide how much of an effect this has, and whether or not any strenuous activity will cause a full arrest. The Second Stun SV to avoid charfing ones guts all over everything. A somewhat harsher version of this has the fit continue for rounds equal to degrees of success, still making the Stun Save. Guess which version the corps use? Anti-Software forms of ICE Jörmungandr: A little known, and less used piece of ice, typically used by corporations as last ditch effort to retain whatever secrets they thing may have been stolen from them (corps DO tend to want the deck intact for proof purposes, as well as see what other tid-bits the Netrunner may have). This ice is used when the gloves are off and the corps just want the information blown into oblivion. The program roars in tat the OS level and begins to scramble all data on the system (stolen Data, operating system, drivers, ETC) into one unusable lump of Code. Veteran CP players would recognize this as the program Rache Bartmoss used to screw the Net over during the last days of Corp War IV, albeit a much more restricted one. Icon: and impossibly huge Serpent of midnight black scale and red glowing eyes, breathing green fire from it's nostrils Building the Program TN:33 STR: 6 Anti-Software: +15 Trace: +2 Strength: +6 Movement: +5 Icon (Superrealistic): +5 Effects: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, follow by a [Cypher/Modem//System] + the program STR to screw things beyond recognition. This will be the Total Netrunning roll +6 (Program STR) as TN for the target to beat when attempting to jackout and get the computing system offline. Otherwise, time for a OS reload. You do have one of those on back up, do you? Raspberry: often put together by weeflerunners, and netrunners with a less bloodthirsty disposition, is is one of the more common forms of 'runner ICE and there are many variations on the theme. The program attempts to rewrite the deck's menu command structure, resulting in nearly random actions and commands, depending upon the creator's whims. Building the Program TN:23 to 33 depending STR: 6 Anti-Software: +15 Trace: +2 Strength: +6 Movement: +5 (or not, depending on skill level of programmer) Icon: +1 to +5, depending on creators tastes Effect: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] roll for a secured system, follow by a [Cypher/Modem//System] roll+ the Program STR to bugger things up for hours equal to the program STR, in this case 6 hrs as the netrunner goes through and reassigns everything. Suffice it to say, this will REALLY annoy whomever has to put things back together. some revisions Processor statline: Name Processor | CPU | Speed | Cnx | Slots | Availability | Reliability Sony VaaU Deck/ Electronic, 2, +2, screen/board/wifi/network, 4 accessory slots Sony VaaU Deck Electronic | 2 | +2 | ST/IF | CB/WF | 4/0 | C | ST Camera, Mic, Printer, Mini Speakers Clothing Processor Electronic | 1 | 0 | IF | CB+WF | 0 | C | UR Spime RFID Lets have some examples of CP game deck design: “New from Cynex Systems comes the ACS-II series of armored laptop and carrying case for on-the-go individual in need of high end, reliable processing power and connectivity. Based off of DataTel's (a wholly owned subsidiary of Cynex Systems) ACS series, this brings the armored laptop into the next decade with the new 15.7 Phz 'Photon' Processor and VRGPU-5 graphics capability for home graphics processing and presentation, With Datatel's Avalon series of VR-Office Manipulation tools as part the standard operating system. All with a build in Audio Adaptive Sound System by Bang & Olafsen “'But with the times we live in, how can I protect my data from Cyber-Terrorists and Criminals?' Cynex has implemented an on-board hardware firewall on your ACS-II laptop's motherboard to be configured by our sales representatives or your Company's IT department, built to the Highest Standards, with upgrade packages provided for those who wish to truly secure their data. “Cynex. Security, Reliability. Serenity.” Cynex Advanced Communications Suitcase II or ACS-II Electronic, 4CPU, +2 spd, 6UDP Options: Onboard Keyboard +Pointer/Mouse + Screen Interface + Chip reader +Hi Quality Audio --Hardware -- Firewall - [Detect//Comm] 19, [secure//CybModem] 19 Electronic | 4 |+2 |ST-IF | CB-Wi-FO | 6/0 (P) (VR) Based off the Advanced Communications Suitcase from Chromebook 1, page 4 As you might notice, this is an upgraded version of the ACS from Cyberpunk, probably by more than one corporate deck-slinger that got annoyed at being out performed by street trash and decided to a get serious case spec together that could still do all the things that corporate wanted to do with the mind numbing presentation while performing actual decking duties....and playing games. It's a bit of a pricy beast, it in the hands of a competent runner, it will make an average netrunner sweat. “So where did you get this thing again?” “Nicced it on a run in side of EBM's Tokyo office. Took a bit to remove the tracer firmware, software, and RFID tags, but nothing that was completely horrible to deal with. Two nights work on downtime. And I have a new back-up deck to play with in case something goes south.” “Isn't that difficult to do?” “Mostly the stuff with the photonic processor, but luckily been reading up on that anyway. Less heat buildup too, so helps out Stealth B&E.” –-Nene Romanova and Lucifer, The Star of Morning, Esq. Euro Business Machines PNI – 412 Proton | 4 | +2 | ST-IF| CB - Wi – FO | 4 | P | VR Options: Onboard Keyboard and Pointer/Mouse or Interface Cables + Video board + Chip reader --Software --Firewall - [Detect//Comm] 24, [secure//CybModem] 24
  3. http://www.tanks-encyclopedia.com/Narco_Tanks
  4. Anti-Software forms of ICE Jörmungandr: A little known, and less used piece of ice, typically used by corporations as last ditch effort to retain whatever secrets they thing may have been stolen from them (corps DO tend to want the deck intact for proof purposes, as well as see what other tid-bits the Netrunner may have). This ice is used when the gloves are off and the corps just want the information blown into oblivion. The program roars in tat the OS level and begins to scramble all data on the system (stolen Data, operating system, drivers, ETC) into one unusable lump of Code. Veteran CP players would recognize this as the program Rache Bartmoss used to screw the Net over during the last days of Corp War IV, albeit a much more restricted one. Icon: and impossibly huge Serpent of midnight black scale and red glowing eyes, breathing green fire from it's nostrils Building the Program TN:33 STR: 6 Anti-Software: +15 Trace: +2 Strength: +6 Movement: +5 Icon (Superrealistic): +5 Effects: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, follow by a [Cypher/Modem//System] + the program STR to screw things beyond recognition. This will be the Total Netrunning roll +6 (Program STR) as TN for the target to beat when attempting to jackout and get the computing system offline. Otherwise, time for a OS reload. You do have one of those on back up, do you? Raspberry: often put together by weeflerunners, and netrunners with a less bloodthirsty disposition, is is one of the more common forms of 'runner ICE and there are many variations on the theme. The program attempts to rewrite the deck's menu command structure, resulting in nearly random actions and commands, depending upon the creator's whims. Building the Program TN:23 to 33 depending STR: 6 Anti-Software: +15 Trace: +2 Strength: +6 Movement: +5 (or not, depending on skill level of programmer) Icon: +1 to +5, depending on creators tastes Effect: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] roll for a secured system, follow by a [Cypher/Modem//System] roll+ the Program STR to bugger things up for hours equal to the program STR, in this case 6 hrs as the netrunner goes through and reassigns everything. Suffice it to say, this will REALLY annoy whomever has to put things back together.
  5. okay...this is a first attempt and building with the new ICE rules. Feel free to critique and rip apart at your will Chimes (as in rung): This is a nonlethal, but unpleasant anti-personnel program designed by the cadre of hackers known as The Collective from The Outer District, Chiba-kyu, Tokyo. The program appears to be code-optimized and weaponized simsense code that temporarily blinds the target (primary function) and inflicts aphasia on the target (secondary function), putting the desk nearly out of Cyberspace combat. While not designed to move on it's own, it does tag the target with trace protocols to alert the user when the struck target jacks out or comes back online. While the ICE is non-lethal, it has gained respect (and fear) from many runners who have been on the receiving end of it Icon: the programs tends to resemble a wave of incoming lines resembling old style vector graphic version of missile tracks that tack the target in a spiralling pattern. Building the Program TN: 35 STR: 6 Anti-personnel: +20 Trace: +2 Strength 6: +6 Secondary Combat function (Str 6): +6 Icon (contetxural) : +1 Effects: Target takes -6 to Sight rolls due to inability focus correctly for 6 rounds, and will have penalties (-6) to tech rolls and social rolls as their scrambled neurons attempt to reorder themselves. Tickle: Based on code stolen from several megacorps and modified, this is a rather ugly little bit of anti-personnel software that has come out of Eastern Europe, made by hackers that have had to deal with Weefle-runners once too often and feel like sending a message. Also used by several megacorps as an intermediate grade of Grey to Black ICE. The ICE is designed to give the target very painful chest pains and to induce vomiting, which tends to discourage most low grad runners permanently, and give professional deckers a bit of shock as they realize the opposition could be playing much rougher. Icon: due to the rather black sense of humor of the designers, the icon for the program looks to be a colorful graphic feather in flight Building the Program TN: 40 STR: 6 Anti-personnel: +20 Movement: +5 Trace: +2 Strength 6: +6 Secondary Combat function (Str 6): +6 Icon (contetxural) : +1 Effects: given the rather unpleasant nature of the program, to Stun saves of -6 vs DV15 are made. The first triggers heart beats, often felt as chest palpitations. Its up to the GM to decide how much of an effect this has, and whether or not any strenuous activity will cause a full arrest. The Second Stun SV to avoid charfing ones guts all over everything. A somewhat harsher version of this has the fit continue for rounds equal to degrees of success, still making the Stun Save. Guess which version the corps use?
  6. http://thelalalander.com/2015/09/30/person...-more-personal/
  7. Will be working on this a bit over the weekend. Will add some more sample Decks. And I'm going to get around to dealing with the idea of The Long Hack (see Nueromancer) and A.I's and why you do not mess with them
  8. Still working on these, just been very very busy. Feed back would be appreciated
  9. still working on this...Will also try to add a frame work for Designing ICE and software suites and some examples to come
  10. Theoretical Technology....(kinda) Ghost Hacking Based on material presented in Masamune Shirow's Ghost in the Shell, Ghost Hacking marks the next great leap for netrunning software. Rather than simply hacking a computer or a deck, or sending ICE to fry the mind of a Netrunner it will eventually be possible to read memories or control actions all from inside a target's mind. The progression is quite logical, as netrunning attack programs get more sophisticated they'll eventually be running the runner in a sense. And as cybernetics becomes more prevalent and more common it will be possible to attack a cyborg without ever being in the net, in the same way a micronet can allow a runner to break into your car. [Ed Note] :There is also precedence in Keiichi Sonada's Bubblegum Crisis and Bubblegum Crash Series for hacking Organic Brains, so I'll be making mention of that as well. The Ghost The Ghost is essentially the mind in the machine, the part that makes a cyborg human. All humans have a Ghost, and some sufficiently advanced AI's have ghostlines that approach the complexity of a humans. The Ghost is the only part of you that is truly unique, your brain can be copied, you cell's uncoded and cloned, but no matter how perfect the duplicate it will still have a different mind, different memories, a different ghost. Of course they could always dub your ghost onto it and fake it pretty well. Ghostline For hackers and users a ghostline is both the pattern of energy that can be recorded from a functioning brain and the point at which direct neural interface moves beyond surface details and moves into more invasive procedures. New sensors and software are used to identify people by their Ghostline, it can be used to tell what type of being they are, if any attack programs are affecting them, and what they have in the way of barrier programs. Diving into a Ghost This is the process by which a runner can examine all the details housed with in a mind. Usually the sheer mass of material makes this unworthy of the effort, and barrier programs cause problems. The most usual approach is to drop a program in and let it do the work. But should one chose to dive unguarded into an unguarded mind the effect is very much like telepathy, both minds are aware of each other on a very personal and very intimate level. More likely the runner will be after something specific, visual data from the subject's eyes, or their current pain response. This is like a surface dive, the more immediate things the subject is dealing with. Deeper dives require more preparation and support. We won't get into them right now. Ghost Hacking But why would you want to do any of this? Well essentially what ghost hacking does is it turns the enemy's mind and body into a datafortress that can be raided. If you can get control over a body long enough you can literally have them commit crimes and stay safely distant. Paralyze a foe, put someone to sleep, blank their memories for a few moments. Combined with SimEx this can literally erase and rewrite minds. How Far Away is Ghost Hacking? In 2020 Ghost hacking has a ways to go yet, the level of sophistication isn't there. However since I set my games in 2099 I have a great deal more freedom. As cybernetics becomes more common and more pervasive the possibilities of ghost hacking get increasingly more likely. I've always hated the concept of cyberpsychosis, since burn victims and amputees don't go nuts cause of prosthetics. But there needs to be something to balance the game, give flesh and blood types a way to beat the borgs. I used something much like ghost hacking before I saw how neat masamune Shirow's take on it was. I called it Dependency Syndrome, the point at which each person cannot exist without all the cybernetics they have, even if it makes them vulnerable. Over time I'll add to this file, maybe fill in the rest of the details. Ghost hacking for the most part in Shirow's books is left vague and open, as far as I'm concerned it becomes a test between willpower and barrier program versus runner's interface and program strength. The possibilities are endless and for the moment open to anyone's imagination. [EdNote]: But then Wizards from Cybergeneration might be an early version of this. And what Largo pulled on Sylia and the Sabers in Ep 3 of Crash kinda sounds like this. Mechanics: To keep this Straightforward It is the targets INT/TECH or COOL (whichever is higher) + Barrier Program VS [Control/User] + Appropriate Program. The logic behind this is that various programs will be tailored to accomplish certain tasks within the Ghost Theoretical Technology Barrier Programs More material based on Ghost in the Shell. It stands to reason that if someone figures out a way to play havoc inside the mind and body of a target, that someone else will spend the time to figure out how to stop it. This is the purpose of the barrier program. It is loaded into the main neural processor complex and is used to defend against unwelcome cybernetic intrusions. Barrier programs are slightly more advanced in concept than traditional cyberdeck walls. A wall simply resists an attack, makes it harder. A barrier program typical packs a counter program designed to return the favor and attack the runner. This makes ghost hacking a great deal more hazardous than traditional netrunning. Every attack you make can conceivably return to haunt you in a counter attack better than your own defenses can handle. At the moment, 2020 such technology is hardly needed as only full conversion borgs are even remotely close enough to being vulnerable. But with enough time that will change. Mechanics: Barrier Programs function like Datawalls for Decks in the old system.
  11. Edited for clarity ICE and Hardware V2.0 Virtual Reality Effects Virtual Reality Effects of ICE This is one area of Netrunning that few people ever really think to play hassles with. Every runner worth the cost has a reputation to maintain. Each is accustomed to running the net with a grace and ease unknown to turtle runners. What happens if those things are distorted? Icon Distortion: Gooped Not every attack should be lethal, some can be done just for fun, or for the effects it will have on an opponents rep. Gooping his icon is one such option. Essentially this program if successful rewrites the target's net icon to include a large amount of noxious green slime the perpetually drips from him. Or if you like his programs can show the blight. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/File//Database] + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. Icon Distortion: Gender Bender This program attempts to redesign the target's icon, is generates a fairly effective conversion from one gender to the other. It can even be used to alter the icons of various subroutines. Imagine turning all your foes killer's into Red Sonja wannabe's? Mechanics: Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/Program] roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/Program] + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. Icon Functionality: Quick Sand This program attempts to rewrite the movement subroutines of a runner's various programs. In effect reducing their ability to move to fractions of a single grid. Hours might pass before they can reach their targets. Mechanics: [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Quicksand Program STR (if the Decker or Sysadmin is not aware of what is going on, a [Edit/File//Database] + Quicksand Program STR Vs [secure/Program//System] roll if the decker/sysadmin gets wise. The effect would be a – to Net Movement equal to Program STR for Program STR + Degree of Success Rounds. Icon Functionality: Target Lock Destabilization This program alters the target programs abilities to follow precise targeting instructions. Variants on this program can have an enemy runner's killers going after bystanders, Netwatch or himself. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Destabilization STR (if the Decker or Sysadmin is not aware of what is going on, a [Edit/File//Database] + Destabilization STR Vs [secure/Program//System] roll if the decker/sysadmin gets wise. The Effect being that the GM picks the target of the opposing program via whatever method they chose Net Functionailty: Blink This program scambles the target's position referents in the Net, essentially what it does is adds a random number generator to each position value. When the sequence starts each turn a new random number is added to the runner's coordinates and he blinks about teleporting randomly from point to point. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Blink Program STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/Program] + Blink Program STR + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. The Effect being that the target gets randomly moved in on direction equal to the STR of the program for Program STR + Degrees of Success (minimum 1 round +program STR). Net Functionality: Webbed This program functions to remove the user's ability to input new web coordinates, in essence trapping him in one place. This is a favorite of Netwatch. Especially when added to an escape clause blocker. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [File/Database] + Webbed Program STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [File/Database] + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. This Effect stops standard net movement for Program STR + Degrees of Success (minimum 1 round +program STR). Net Functionality: Banana Peel This adds a random value to each normal movement, in essence forcing the runner to move further than anticipated with each movement, making him skid about hectically. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Banana Peel Program STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [File/Database] + Banana Peel Program STR+ Vs [secure/Program//System] roll if the decker/sysadmin gets wise. This Effect increases standard net movement in on direction for Program STR + Degrees of Success (minimum 1 round + program STR). Sensory Distortion: Scrambled Eggs The netrunner relies on his deck to provide meaningful and useful sensory stimuli. In particular the visual aspect of VR is very important. This program attempts to add a randomizer to the visual data stream making all visual stimuli seem distorted and meaningless. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Scrambled Eggs Program STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/File//Database] + Scrambled Eggs Program STR+ Vs [secure/Program//System] roll if the decker/sysadmin gets wise. This Effect adds a – to all net related tools as the user as they try to figure out the mess they are looking at for Program STR + Degrees of Success (minimum 1 round + program STR). Pain Induction: Severe The sensation of pain is the only sense we truly have mental control over. Unlike our awareness of temperature or light we never grow accustomed to a set level of stimuli when pain is involved, but we can choose to ignore it. Or create it. This code sequence is designed to trigger a massive sensation of pain, customizable options allow for various real world injuries to be simulated. But of course pain is one of those options that no RPG can really convey, so I recommend adding a penalty to action equal to the strength of the program. And of course the program must manage to strike the 'runner before it can do anything. Mechanics: To simulate this effect, Apply a – equal to Program STR for programs under 4, for 4 plus add 1d6 damage per STR point, and roll on the hit location chart to determine where the simulated wound 'hits'. Pain Induction: Annoyance One of the aspects of hackers and cyberpunk's netrunners that has been largely lost is the element of practical jokes, or doing something just to prove you can. But for something that amounts to a complicated way of saying "I can see you", the full crippling pain function is too heavy handed. And if ya just wanna pull someone's chain wouldn't an itch that doesn't go away be more amusing? Or giving him the sensation of a burning genital rash? You see the idea. This wouldn't really have any game effect, except maybe in social tests (scratching your balls while trying to score with that socket could be embarrassing) or critical moments (is it the red or the black wire?), but I'd be willing to award IP for amusing play. Mechanics: To simulate this effect, Apply a – equal to Program STR. Net Alert: Siren The player's icon presence is altered to transmit an ear splitting siren at all times. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Siren Program STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/File//Database] + Siren Program STR + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. The Effect Adds Noisy to the Deck or System until removed. Commonly bundled with the effect below... Deck Functionality: See Me Not What if your target couldn't even see the things you've done to his icon and the alerts he now gives off? This program installs a filter to make all the user's sensory perceptions normal in everyway. This makes VR attacks look a lot like a sign on his back saying "Kick Me" he may never even know about it. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + See Me Not Program STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/File//Database] + See Me Not + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. This will cloak any effects applied to the system with the exception of system lag... Net Structure: Mazed This program loads a new VR structure into the user's deck. It adds a randomly created maze designed to impede the runner on his journey, as no travel may be performed until such time as the maze is completed. Mechanics: This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Maze STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/File//Database] + Maze STR + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. The Effect prevents the user from moving until removed. Sensory Distortion: Mix Up The program rearranges the deck's ability to send the appropriate icons to the user. there for he will receive randomly selected icons for each new program he encounters. Imagine how alarming this could get is every other user he sees looks just like a hellhound? This would be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, followed by by a [Edit/File//Database] + Mix Up STR roll (if the Decker or Sysadmin is not aware of what is going on), or a [Edit/File//Database] + Mix Pp STR + Vs [secure/Program//System] roll if the decker/sysadmin gets wise. The Effect reduces Initiative by Program STR + Degree of Success.
  12. Mini update Functionality: Memory Burnout Most modern decks come with read write memory blocks, each with its own finite life span, and error checking systems. This command instructs the deck to begin repeatedly writing and rewriting material to each sector till its is useless. Suggested Mechanic: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, follow by a [Contol/Modem//System] roll to subtly set up the burn out. Unless the player has taken the time to look for such things or has coded a smart frame to keep a eye on things, hardware failure is inbound.. Functionality: Signal Noise The deck is instructed to add an annoying static pattern to all virtual sensory output making running the net like listening to nails on chalkboards, all the time. Suggested Mechanic: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] roll for a secured system, follow by a [Contol/Modem//System] roll to introduce fragmentation into the system or a sub program that introduces the errors. A minus to Net-related rolls until the issue is deal with (typically -1-3) Storage: Bunnies The deck has a finite amount of both storage and operational memory. Anyone who has used an older computer knows exactly what can happen when either begins to be filled. That's the purpose of bunnies, it is design to load itself over and over again while creating copies on all available storage media. Eventually the unit crashes from the overload and all its memory blocks are filled. Mechanics: This would be handled by a simple [Conceal/System]+ Bunnies Program STR with the DV being equal to the total roll made to detect the issue. Given that storage is comparatively massive with the new rules, it may take some time for the player to notice..... Identification Alteration: Rename Each and ever deck, be it from off the shelf or rebuilt by a netrunner has an identification chip. Even black market decks need one in case someone asks and they can't prove the deck is legal. This program sets up a new identification code for the deck and if anyone with authority asks that is the ident that the deck will give. What you do mean my name is Bartmoss...? Mechanics: This would be handled by a simple [Control/Modem] roll for a cybermodem or [Control/System] for any other system (“We're being hacked from Arasaka? But the trace says EBM...”)
  13. http://spectrum.ieee.org/tech-talk/consume...cation-devices-
  14. thanks....catching up on sleep right now. update coming soon after ITIL studies
  15. I'll be getting around to showing ice programming methods and difficulties on the next update
×
×
  • Create New...