Jump to content

TheWanderingJewels

Senior members
  • Content Count

    194
  • Joined

  • Last visited

Community Reputation

0 Neutral

About TheWanderingJewels

  • Rank
    Cyberpunk
  • Birthday 28/02/1970

Contact Methods

  • AIM
    hasmoline
  • Website URL
    http://trek-rpg.net
  • ICQ
    0
  • Yahoo
    julianxsj

Profile Information

  • Location
    Lincoln, NE
  • Interests
    Japanese Chambara films, Cinema, Bo-Staff Training, Biking, Goth Music, Anime, Roleplaying, Brewing, Cooking
  1. Avast http://fmso.leavenworth.army.mil/Collabora...Narco-Armor.pdf
  2. Program Examples Chimes (as in rung): This is a nonlethal, but unpleasant anti-personnel program designed by the cadre of hackers known as The Collective from The Outer District, Chiba-kyu, Tokyo. The program appears to be code-optimized and weaponized simsense code that temporarily blinds the target (primary function) and inflicts aphasia on the target (secondary function), putting the desk nearly out of Cyberspace combat. While not designed to move on it's own, it does tag the target with trace protocols to alert the user when the struck target jacks out or comes back online. While the
  3. http://www.tanks-encyclopedia.com/Narco_Tanks
  4. Anti-Software forms of ICE Jörmungandr: A little known, and less used piece of ice, typically used by corporations as last ditch effort to retain whatever secrets they thing may have been stolen from them (corps DO tend to want the deck intact for proof purposes, as well as see what other tid-bits the Netrunner may have). This ice is used when the gloves are off and the corps just want the information blown into oblivion. The program roars in tat the OS level and begins to scramble all data on the system (stolen Data, operating system, drivers, ETC) into one unusable lump of Code. Veteran
  5. okay...this is a first attempt and building with the new ICE rules. Feel free to critique and rip apart at your will Chimes (as in rung): This is a nonlethal, but unpleasant anti-personnel program designed by the cadre of hackers known as The Collective from The Outer District, Chiba-kyu, Tokyo. The program appears to be code-optimized and weaponized simsense code that temporarily blinds the target (primary function) and inflicts aphasia on the target (secondary function), putting the desk nearly out of Cyberspace combat. While not designed to move on it's own, it does tag the target with
  6. http://thelalalander.com/2015/09/30/person...-more-personal/
  7. Will be working on this a bit over the weekend. Will add some more sample Decks. And I'm going to get around to dealing with the idea of The Long Hack (see Nueromancer) and A.I's and why you do not mess with them
  8. Still working on these, just been very very busy. Feed back would be appreciated
  9. still working on this...Will also try to add a frame work for Designing ICE and software suites and some examples to come
  10. Theoretical Technology....(kinda) Ghost Hacking Based on material presented in Masamune Shirow's Ghost in the Shell, Ghost Hacking marks the next great leap for netrunning software. Rather than simply hacking a computer or a deck, or sending ICE to fry the mind of a Netrunner it will eventually be possible to read memories or control actions all from inside a target's mind. The progression is quite logical, as netrunning attack programs get more sophisticated they'll eventually be running the runner in a sense. And as cybernetics becomes more prevalent and more common it will be possibl
  11. Edited for clarity ICE and Hardware V2.0 Virtual Reality Effects Virtual Reality Effects of ICE This is one area of Netrunning that few people ever really think to play hassles with. Every runner worth the cost has a reputation to maintain. Each is accustomed to running the net with a grace and ease unknown to turtle runners. What happens if those things are distorted? Icon Distortion: Gooped Not every attack should be lethal, some can be done just for fun, or for the effects it will have on an opponents rep. Gooping his icon is one such option. Essentially this program i
  12. Mini update Functionality: Memory Burnout Most modern decks come with read write memory blocks, each with its own finite life span, and error checking systems. This command instructs the deck to begin repeatedly writing and rewriting material to each sector till its is useless. Suggested Mechanic: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, follow by a [Contol/Modem//System] roll to subtly set up the burn out. Unless the player has taken the time to look for such things or has coded a smart
  13. http://spectrum.ieee.org/tech-talk/consume...cation-devices-
  14. thanks....catching up on sleep right now. update coming soon after ITIL studies
  15. I'll be getting around to showing ice programming methods and difficulties on the next update
×
×
  • Create New...