Jump to content

TheWanderingJewels

Senior members
  • Content Count

    194
  • Joined

  • Last visited

Everything posted by TheWanderingJewels

  1. Avast http://fmso.leavenworth.army.mil/Collabora...Narco-Armor.pdf
  2. Program Examples Chimes (as in rung): This is a nonlethal, but unpleasant anti-personnel program designed by the cadre of hackers known as The Collective from The Outer District, Chiba-kyu, Tokyo. The program appears to be code-optimized and weaponized simsense code that temporarily blinds the target (primary function) and inflicts aphasia on the target (secondary function), putting the desk nearly out of Cyberspace combat. While not designed to move on it's own, it does tag the target with trace protocols to alert the user when the struck target jacks out or comes back online. While the
  3. http://www.tanks-encyclopedia.com/Narco_Tanks
  4. Anti-Software forms of ICE Jörmungandr: A little known, and less used piece of ice, typically used by corporations as last ditch effort to retain whatever secrets they thing may have been stolen from them (corps DO tend to want the deck intact for proof purposes, as well as see what other tid-bits the Netrunner may have). This ice is used when the gloves are off and the corps just want the information blown into oblivion. The program roars in tat the OS level and begins to scramble all data on the system (stolen Data, operating system, drivers, ETC) into one unusable lump of Code. Veteran
  5. okay...this is a first attempt and building with the new ICE rules. Feel free to critique and rip apart at your will Chimes (as in rung): This is a nonlethal, but unpleasant anti-personnel program designed by the cadre of hackers known as The Collective from The Outer District, Chiba-kyu, Tokyo. The program appears to be code-optimized and weaponized simsense code that temporarily blinds the target (primary function) and inflicts aphasia on the target (secondary function), putting the desk nearly out of Cyberspace combat. While not designed to move on it's own, it does tag the target with
  6. http://thelalalander.com/2015/09/30/person...-more-personal/
  7. Will be working on this a bit over the weekend. Will add some more sample Decks. And I'm going to get around to dealing with the idea of The Long Hack (see Nueromancer) and A.I's and why you do not mess with them
  8. Still working on these, just been very very busy. Feed back would be appreciated
  9. still working on this...Will also try to add a frame work for Designing ICE and software suites and some examples to come
  10. Theoretical Technology....(kinda) Ghost Hacking Based on material presented in Masamune Shirow's Ghost in the Shell, Ghost Hacking marks the next great leap for netrunning software. Rather than simply hacking a computer or a deck, or sending ICE to fry the mind of a Netrunner it will eventually be possible to read memories or control actions all from inside a target's mind. The progression is quite logical, as netrunning attack programs get more sophisticated they'll eventually be running the runner in a sense. And as cybernetics becomes more prevalent and more common it will be possibl
  11. Edited for clarity ICE and Hardware V2.0 Virtual Reality Effects Virtual Reality Effects of ICE This is one area of Netrunning that few people ever really think to play hassles with. Every runner worth the cost has a reputation to maintain. Each is accustomed to running the net with a grace and ease unknown to turtle runners. What happens if those things are distorted? Icon Distortion: Gooped Not every attack should be lethal, some can be done just for fun, or for the effects it will have on an opponents rep. Gooping his icon is one such option. Essentially this program i
  12. Mini update Functionality: Memory Burnout Most modern decks come with read write memory blocks, each with its own finite life span, and error checking systems. This command instructs the deck to begin repeatedly writing and rewriting material to each sector till its is useless. Suggested Mechanic: This one will be handled by a [Control/Modem//System] roll for an unsecured system or a [inflitrate/Modem//System] for a secured system, follow by a [Contol/Modem//System] roll to subtly set up the burn out. Unless the player has taken the time to look for such things or has coded a smart
  13. http://spectrum.ieee.org/tech-talk/consume...cation-devices-
  14. thanks....catching up on sleep right now. update coming soon after ITIL studies
  15. I'll be getting around to showing ice programming methods and difficulties on the next update
  16. Fifty Shades of Grey ICE Cribbed from another forum. (most of the text is not mine) I will be taking these concepts and modifying them, into something that can be plug and played into the programming rules for CP to make for newer and more interesting ice. As well as saner One of the central concepts in the official netrunning rules is that ICE or Intrusion Counter Measure software is a threat to all netrunners. The simplest and oddly enough most common element used to make this threat real is the ability to cause damage to a target via his deck. Some of the more gifted online writer
  17. some revisions Processor statline: Name Processor | CPU | Speed | Cnx | Slots | Availability | Reliability Sony VaaU Deck/ Electronic, 2, +2, screen/board/wifi/network, 4 accessory slots Sony VaaU Deck Electronic | 2 | +2 | ST/IF | CB/WF | 4/0 | C | ST Camera, Mic, Printer, Mini Speakers Clothing Processor Electronic | 1 | 0 | IF | CB+WF | 0 | C | UR Spime RFID Lets have some examples of CP game deck design: “New from Cynex Systems comes the ACS-II series of armored laptop and carrying case for on-the-go individual in need of high end, reliab
  18. I also just found my copy of Brainware blow out. So I'll be adding options in here as well Revised Stat Line Processor | CPU | Speed | Cnx | Slots | Availability | Reliability
  19. a bit of application of what has gone before Pain Induction: Severe The sensation of pain is the only sense we truly have mental control over. Unlike our awareness of temperature or light we never grow accustomed to a set level of stimuli when pain is involved, but we can choose to ignore it. Or create it. This code sequence is designed to trigger a massive sensation of pain, customizable options allow for various real world injuries to be simulated. But of course pain is one of those options that no RPG can really convey, so I recommend adding a penalty to action equal to the strength
  20. Debating Base Firewall Stengths for Decks as I go and work on these...suggestions are welcome
  21. Will be adding more decks this week for those who are interested
  22. Euro Business Machines PNI – 412 (4200eb) Proton | 4 | +2 | ST-IF| CB - Wi – FO | 4/0 Options: Onboard Keyboard and Pointer/Mouse or Interface Cables + Video board + Chip reader --Software --Firewall - [Detect//Comm] 24, [secure//CybModem] 24 Base firewall rating for cyberdecks will probably be a bit higher as people putting their literal brains on the line..
  23. Let's start with a (updated) classic from CP2020 to polish out the Zee-Rust “New from Cynex Systems comes the ACS-II series of armored laptop and carrying case for on-the-go individual in need of high end, reliable processing power and connectivity. Based off of DataTel's (A holey owned subsidiary of Cynex Systems) ACS series, this brings the armored laptop into the next decade with the new 15.7 Phz 'Photon' Processor and VRGPU-5 graphics capability for home graphics processing and presentation, With Datatel's Avalon series of VR-Office Manpulation tools as part the standard operating s
  24. Well...it's been a while. Just got in to read over this thread. me and few of my fellow players/gm's will fiddle with this and see where things can break
  25. http://www.popularmechanics.com/military/w...d-martin-laser/
×
×
  • Create New...