Jump to content

Sanctimonious

Senior members
  • Content Count

    140
  • Joined

  • Last visited

Community Reputation

0 Neutral

About Sanctimonious

  • Rank
    Cyberpunk
  1. Pretty Sweet Altcult. Very playable and usable. Me like!
  2. Hang on a minute. Do you combine all the damage when an assault rifle or submachine gun hits a target? Because that's the way you are describing the damage here, which means that even a .22 mini-gat could deal 30d6 at close range, again rendering armor useless. However, by the standard rules where each hit is treated as an individual shot, a shotgun might do a lot of damage in this system (taken from Hardwired), but SP 12 makes them 100% irrelevant, and SP 8 makes them nearly harmless. Ok, ok slow down... That takes shotguns from god like to wimpy, but with specialized ammo like, like AP or flechette, would make them kinda cool. As for hitting more than one target, I would make it one attack roll at -4 and if the shooter hits then you can devide the pellets evenly between the two. Well thats how I'm gonna handle it. Hey, is there a shotgun skill? Is it Handgun, rifles, or hvy weapons?
  3. Shotguns don't shoot thousands of pellets unless you are firing hundreds of rounds of ammo. Typically you are looking at 8 to 10 pieces of shot in each round fired. So, typically, I grant a +1 to hit for firing a shotgun, and one piece of shot hits (dealing 2d6 damage) per point the attack roll hit by. And the spread is not very wide. At most combat ranges, a shotgun pattern will easily fit in a dinner plate - with a hunting shotgun it will fit in a teacup. Whoa, wait a minute...*blink* *blink* So Shotguns do around 16 to 20 d6 at close range? I know shotgun is supposed to be Kick-Ass but that makes all other guns irrelevant. Or are you treating them as hollowpoints like Citizen X?
  4. I didnt know there was a robots suppliment. Where is it?
  5. And they had a whole section full of bots as I remember.
  6. This is about the Link skill for Desnai. My player has a bodyguard mecha that has a howler weapon on it. So when the bodyguard attacks with the howler does he use a "handgun skill" or the "Link" skill? Shooting a howler from a mecha is nothing like shooting a gun but making a mecha move around and making a mecha attack seem like two different skills as well. I'm inclinded to slide it all under the "Link" skill for ease if play, unless anyone else has some ideas?
  7. Shotguns don't shoot thousands of pellets unless you are firing hundreds of rounds of ammo. Typically you are looking at 8 to 10 pieces of shot in each round fired. So, typically, I grant a +1 to hit for firing a shotgun, and one piece of shot hits (dealing 2d6 damage) per point the attack roll hit by. And the spread is not very wide. At most combat ranges, a shotgun pattern will easily fit in a dinner plate - with a hunting shotgun it will fit in a teacup. Thanks, my brother, clear as a bell.
  8. Im not sure I get it. Shotguns shoot thousands of pellets. Im thinking of all the little pellets that hit a wall after a shotgun blast. The shooter pullls the trigger once and the shell explodes out of the barrell in a cone pattern. So I dont think your talking about tracking all those little pellets so Im afraid I dont follow. That would be like +1000 to your attack roll?!?! So what happens to the guy standing next to the target. Are we saying he's subject to the same attack roll even if he wasnt aimed at? What if the shooter failed the attack roll, the cone would still encomapass everyone in that area. Are they all missed too? That doesnt seem right.
  9. YaY! My long awaited C-Punk game has started. I'm thinking of starting a Wiki! Anywhoo.... There seems to be a disconnect with shotgun. You roll to hit, but the roll doesnt matter because of the spread pattern, so if they are in the "cone" they get hit anyway. (If this is wrong please correct me). So then shouldnt shotgun be an automatic save? Sure, let the shooter have the "to-hit" roll but let the success of that roll be the negative to the victims "reflex save". Example: Sally shoots her shotgun and Enzo. The to hit number is 10 and she scores a 15. Enzo makes a reflex save at -5. If he fails roll hit location. Question: Has anyone come up with a borg hit location and taking damage rule? Since borgs are filled with gears and electronics it seems to me they would take damage different from people. I would like to see it equal to their meat couterparts for game balance. They have something similar in Maximum Metal for vehicle combat. Here's an idea. When meatbags get hit they make a stun save to see if they can stay in the fight. Maybe borgs should make stun saves and if they fail they can roll on the Max Metal sub system damage chart. In this way borgs can keep going, but they do so all broken up (kinda like that last scene in terminator). Kinda creepy when you think of the human looking Gemini models.
  10. Looks sweet I will tell you how it goes when I try it out. I agree, multiple hits from something with a 35 ROF is an absolute pain.
  11. Crash Override Version 1.2 Build Notes: Cleaned up Clearance. Added Programming. Made it kinda readable with more flo. Your basic run is where a Hacker invades a target computer network we call a DataFort. The goal of the hack is to steal data or gain control of the Datafort peripherals. Datafort architecture resembles a normal directory tree structure with a main folder that has other folders branching off of it and even more folders branching off of them. These folders are called subdirectories/. A Codegate is used to authorize access into a subdirectory. Each folder may contain GreyICE or BlackICE or both. Unless the system sysop changes the security protocols or updates the codegates due to State of the Art a hacker may always enter a codegate he has successfully decrypted. A DataFort has five stats. We refer to their rating as strength. CPU (2 to 20): The CPU is the measurement of processing strength of the Datafort. blackIce/ greyIce (1 to 10): ICE are anti-intrusion programs. BlackICE attacks the hacker and does its rating in physical damage. Grey ICE attacks the hacker’s deck and does its rating in damage to the hackers Deck stat. Codegate (1 to 10): Defend the Datafort and its many subdirectories from unauthorized users. Hackers need to use Decryption programs to get past Codegates. Utilities (1 to 10): Utilities can be anything from Auto-Cannon targeting software to a music player utility. A Hacker need four tools for the job. Interface (1 to 10): The interface skill from the CP v.3 handbook. I’m still thinking of tossing Interface and replacing it with the general programming skill. Deck (3 to 30): The deck rating indicates how many programs it can run. If the deck rating is equal to or higher than strength of the program it can run it. Each program installed on the deck reduces its rating by the program strength. The deck can store any size program with one point, but it will not be able to run it. Programs can be lost if the deck has no room for them, this can happen when a hacker tangles with GreyICE. GreyICE attacks reduce the Deck rating by its strength. Decryption (1 to 10): Decryption programs decrypt Codegates Attack Virals (1 to 10): Attack Virals attack Dataforts and ICE. Anti-trace (1 to 10): Anti-trace defend hackers from ICE and being traced. The Run: Running and Looting Each subdirectory has a codegate protecting it. Hackers can choose to Hack or Exploit to get past them. Hack or Exploit? Hacking is the quick and dirty way of getting into a datafort but it is more likely to raise an alarm. This is your basic Int + Interface + Decryption+ 1d10 vs. CPU + Codegate + 1d10 opposed test. If your successful then you have access to the sub-directory that the Codegate was protecting. However, each time you try use a subdirectory function the Datafort gets a Security Check test: CPU + (Codegate, GreyICE, or BlackICE, whichever is higher) +1d10 against the number you scored in the original opposed test. If your detected the CPU will use that subdirectories defenses against you. Exploiting a Datafort’s defenses is much more effective and safe! The base time is one hour for neural interface, one day for ‘trodes, and three days by keyboard. The contest is the same: Int + Interface + Decryption +1d10 vs. CPU + Codegate +1d10, but unlike hacking the system only gets one roll to detect your presence after you enter the subdirectory. Exploits my last for days, weeks or months, depending on how often the Sysop updates security or if there is a change in the State of the Art. From that point on you have free reign of that subdirectory. Free reign, that is, up to your Clearance. Clearance Higher levels of clearance are harder to achieve. Personnel Clearance: In a corporation this would be general wage slave clearance. Security Clearance: This access is higher than personal and can be used to manipulate and monitor personal accounts. There is a -4 penalty when trying to hack or exploit security clearance. Administrative Clearance: Admin access is the highest of all and is capable of manipulating and viewing personal and security accounts. Admin clearance also gives the user access to secure data and peripherals. There is a -8 penalty when trying to hack or exploit administrative clearance. Taking on ICE When a hacker is caught the Datafort will go on alert and the blackICE, greyICE, or codegate will hunt down the offender. There is also a very good chance that the monitoring Sysop has noticed the attack. Combat: Initiative: Datafort: CPU + 1d10 Hacker: Ref +1d10 Hacker Attack: Int + Interface + Attack Virals + 1d10 Datafort Attack: CPU + BlackICE or GreyICE + 1d10 Hackers do damage with their Attack Virals strength directly to the strength of the ICE. When the ICE is reduced to zero it is derezzed. GreyICE does its strength in damage directly to the Hacker’s Deck strength. The deck can only hold as many programs as its rating will allow. Any program can be held with one pointof strength but they becomes inoperable. Programs without strength to hold them are lost. BlackICE does its strength in damage directly to the Hacker. Damage is still located randomly, but armor does not apply. Damage is the result of nerve damage. Crashing the Party Hackers can shut down utilities with Attack Virals. Although utilities can’t defend themselves they still may be difficult to crash. Hacker Attack: Int + Interface + Attack Virals + 1d10 vs. CPU + Program strength+ 1d10 When a program strength is reduced to zero it crashes. CPUs can’t defend themselves directly but they may take an extended period of time to crash. Hackers can only make one attack roll after certain intervals based on CPU strength. CPU Strength 2-4: 10min interval 5-6: 30min interval 8-9: Hour interval 10: Two hour interval The attack is made as usual: Hacker Attack: Int + Interface 1d10 + Attack Virals vs. CPU + 1d10 When the CPU is reduced to zero the Datafort has crashed. Crashed Dataforts kick off all their users, restart, then reinitialize primary programs. Although the programs can go to 10 finding anything above a +4 should be a very rare and expensive affair. Of course all these programs are illegal so locating one starts at Difficulty 11 then increase by one per level up to level 4. The difficulty jumps to three more per level from 5 up to 7, and finally it goes to six more per level from eight to 10. The base time for this search is one hour of basic online searching. This time frame may change on the more exclusive subnets. I'm using 2d10 skill test in accordance with Blackhammer's cool as heck skill resolution system. ( http://www.dreadgazebo.com/2020/index.php?...1&Itemid=93 ). Here’s a chart: Program Strength Difficulty to Find 1 12 2 13 3 14 4 15 5 18 6 21 7 24 8 30 9 36 10 42 Modifiers: As usual taking more time gives a +2 bonus per increase in time level and failed attempts impose a -3 to your die roll. If there was a change in the State of the Art in that program category the difficulty increases by +4 for the next week after the new tech has been introduced. State of the Art: Stolen from Blackhammer Roll 2d10 after every game session. I’ve added results into the previously empty 16 to 17 to suit these rules. I also changed 8 to deck technology. 2: Paradigm Shift 3: Bullets & Body Armour 4: Biotech 5: Med-Tech 6: Implant CyberTech 7: Communications Tech 8: Deck Tech 9-12: Fashion / Fad 13: Intrusion / Counter-Intrusion Software 14: Physical Security Tech 15: CyberProsthetics 16: Codegate 17: Anti-trace 18: ICE (roll a d10, 1-5 Black Ice, 6-10 Grey ICE) 19: Attack Virals 20: Paradigm Shift If the roll lands on any of the items used in hacking, decrease its Str by 2. Or for pure Hacker you can roll 1d10 and on a 7 to 10 you can apply a State of the Art change. When a change is indicated roll 1d10 again: 1-2: Deck Tech 3-4: Codegate 5-6: Anti-trace 7-8: ICE (roll a d10, 1-5 Black Ice, 6-10 Grey ICE) 9-10: Attack Virals If a change is indicated reduce the strength of that item by 2. Programming: Programmers can use their skills to build programs. They choose what strength they want the program at and add it to the base number for that category to get the target number. Remember, we’re using the 2d10 skill resolution system. The total time needed to complete the program is (Difficulty Value x 6) in hours. This time can be divided among the total programmers working on the project. They may also modify the duration by or Rushing or Taking extra time. ( http://www.dreadgazebo.com/2020/index.php?...1&Itemid=93 ) The success roll is made at the end of the time period. A character who attempts a task again after failing it once may make a new skill roll, but is at -3 for each successive attempt. This penalty is cumulative and is in addition to any other modifiers for taking extra time or rushing. The programmer may try the same category of program at a different strength without penalty. He may also try the same program again without penalty after he has raised his skill by at least one point. Category: Base Target Number Codegate: 22 Utilities: Varies GreyICE: 27 BlackICE: 32 Decryption: 25 Attack Virals: 30 Anti-trace: 26 Modifiers: The use of specialized equipment with these skills may provide a +3 bonus to the skill roll, at the GM’s discretion.
  12. Crash Override Version 1.1 Build Notes: Stole from Shadowrun and Blackhammer. Crash Override is the slimmest version of netrunning I could come up with. Here we go. Your basic run is where a Hacker invades a target network we will call a DataFort. The goal of this hack is to steal data or gain control of that Datafort peripherals. A DataFort has five stats: CPU (2 to 20): The CPU is the main processor for the DataFort. It measures the strength of the Datafort. The CPU cannot use programs with a rating higher than its own. Black Ice/ Grey Ice (1 to 10): ICE are anti intrusion programs. Black ICE attacks the hacker and does physical damage to him to a random location. Grey ICE attacks the hackers deck and does its rating in damage to the hackers Deck stat. Codegate (1 to 10): Defend the Datafort and its many subdirectories. Hackers need to use Decryption programs to get past Codegates. Programs (1 to 10): Programs can be anything from Auto-Cannon targeting software to a music player utility. The Hacker will need four things for the job. Deck (3 to 30): Deck is the amount of processing power your deck has. Decryption Programs(1 to 10): Decryption programs decrypt Codegates Attack Virals (1 to 10): Attack Virals attack Dataforts. Anti-trace (1 to 10): Anti-trace help to stop ICE programs from locating you and your deck. Although the programs can go to 10 finding anything above a +4 should be very rare and expensive. Of course all these programs are illegal so locating one starts at Difficulty 11 then increase by one per level up to level 4. The difficulty jumps to three more per level from 5 up to 7, and finally it goes to six more per level from eight to 10. The base time for this search is one hour. Here’s a chart: Program Strength Difficulty to Find 1 12 2 13 3 14 4 15 5 18 6 21 7 24 8 30 9 36 10 42 (I’m using 2d10 skill test in accordance with Blackhammer’s cool as heck <a href=”http://vfte.cyberpunk.co.uk/index.php?showtopic=6081&hl=”> skill resolution system. </a>) Modifiers: As usual taking more time gives a +2 bonus per increase in time level and failed attempts impose a -3 to your die roll. If there was a change in the State of the Art in that program category the difficulty increases by +4 for the next week after the new tech has been introduced. State of the Art: Stolen from Blackhammer Roll 2d10 after every game session. I’ve added results into the previously empty 16 to 17 to suit these rules. I also changed 8 to deck technology. 2: Paradigm Shift 3: Bullets & Body Armour 4: Biotech 5: Med-Tech 6: Implant CyberTech 7: Communications Tech 8: Deck Tech 9-12: Fashion / Fad 13: Intrusion / Counter-Intrusion Software 14: Physical Security Tech 15: CyberProsthetics 16: Codegate 17: Anti-trace 18: ICE (roll a d10, 1-5 Black Ice, 6-10 Grey ICE) 19: Attack Virals 20: Paradigm Shift If the roll lands on any of the items used in hacking, decrease its Str by 2. Or for pure Hacker you can roll 1d10 and on a 7 to 10 you can apply a State of the Art change. When a change is indicated roll 1d10 again: 1-2: Deck Tech 3-4: Codegate 5-6: Anti-trace 7-8: ICE (roll a d10, 1-5 Black Ice, 6-10 Grey ICE) 9-10: Attack Virals If a change is indicated reduce the strength of that item by 2. The Run: Hack or Exploit? Hacking is the quick and dirty way of getting into target datafort but is more likely to raise an alarm. This is your basic Int + Interface + Decryption+ 1d10 vs. CPU + Codegate + 1d10 opposed test. If your successful then you have access to the sub-directory that the Codegate was protecting. However, each time you try use a function the Datafort gets a Security Check test: CPU + (Codegate, GreyICE, or BlackICE, whichever is applicable) against the number you scored in the original opposed test. If your detected the CPU will use that subdirectories defenses against you, that is launch ICE, or in the case of a Codegate, lock you out of the system. Exploiting a Datafort’s defenses is much more effective and safe! The base time is one hour for neural interface, one day for ‘trodes, and three days by keyboard. The contest is the same: Int + Interface + Decryption vs. CPU + Codegate, but unlike hacking the system only gets one roll to detect your presence after you enter the subdirectory. Exploits my last for days, weeks or months, depending on how often the Sysop updates security or if there is a change in the State of the Art. From that point on you have free reign of that subdirectory. Free reign, that is, up to your Clearance. Higher levels of clearance are harder to achieve. Personnel Clearance: In a corporation this would be general wage slave clearance. Security Clearance: This access is higher than personal and can be used to manipulate and monitor personal accounts. There is a -4 penalty when trying to hack or exploit security clearance. Administrative Clearance: Admin access is the highest of all and is able to manipulate and view personal and security accounts as well as operate the most secure functions and view the most secure data. There is a -8 penalty when trying to hack or exploit administrative clearance. Running and Looting Dataforts are set up in traditional windows folder style. These folders are referred to as subdirectories. Each subdirectory may have a codegate protecting it which Hackers can choose to Hack or Exploit. For example: when the Hacker has accesses to say the "surveillance camera" they can control, view, and manipulate the surveillance camera's. Taking out ICE Hackers can take out Black or Grey ICE but this will immediately put the Datafort on alert. The CPU will begin to scan every action the hacker takes within the system just as if he had hacked in. There is also a very good chance that the monitoring Sysop may notice the attack. Initative: Datafort: CPU + 1d10 Hacker: Ref +1d10 Hacker Attack: Int + Interface + Attack Virals + 1d10 vs. CPU + (Black or Grey) ICE strength + 1d10 Hackers do damage with their Attack Virals strength directly to the strength of the ICE. When the ICE is reduced to zero it is derezzed. ICE Attack: CPU + ICE strength + 1d10 vs. Int + Interface + Anti-Trace + 1d10 GreyICE does its strength in damage directly to the Hacker’s Deck strength. The deck can only hold as many programs as their strength will allow. Any program can be held with one pointof strength but becomes inoperable. Programs without strength to hold them are lost. BlackICE does its strength in damage directly to the Hacker. Damage is still located randomly, but armor does not apply. Damage is the result of nerve damage. Crashing the CPU Hackers can shut down a CPU and/or her many programs with Attack Virals. Programs can’t defend themselves but still may be difficult to crash. Hacker Attack: Int + Interface + Attack Virals + 1d10 vs. CPU + Program strength+ 1d10 When a program strength is reduced to zero it crashes. CPUs can’t defend themselves (on their own) but they may take an extended period of time to crash. Hackers can only make one attack roll after certain intervals based on CPU strength. CPU 2-4: 10 interval 5-6: 30 interval 8-9: Hour interval 10: Two hour interval The attack is made as usual: Hacker Attack: Int + Interface 1d10 + Attack Virals vs. CPU + 1d10 When the CPU is reduced to zero the Datafort has crashed. Crashed Dataforts kick off all their users, restart, then reinitialize primary programs.
  13. So when stress is depleted this is when PCs freak out and go postal, is that it?
  14. I can see how this would work for software, some new Killer-App comes out and all of the sudden your kick ass hardware cant handle the new software - Bam! your -2. But how about hardware and hard....stutff? There would have to be a lag between when the new tech is discovered and when it hits the streets (what with lawyering, manufacturing, transportatoin, assimilation etc.) How long after the roll on the chart do you apply the penalty to your players for that kind of thing? And, when your PCs are all beaten up with FutureShock and their Resistance stat goes to zero, what penalties do they incur? What is a futureshocked person? If I'm gonna copy all your ideas, i need to know!
  15. Here’s a thought, I like to think that the Tech Curve is a trickle down type of affair, where the Corps have the best tech and the people have access to the 2nd best tech. In this way, you can slap a penalty on when the PCs are using their tech with something more advanced. Instead of separating it out to all different kinds of equipment you could just have broad categories, for example, fashion, computer hardware, computer software, munitions, body armor etc. So if there was an upgrade in body armor PCs may not notice it around their own turf, but if they went to a CorpZone their ammo would be at -2 damage (or whatever) because the Corps are using cutting edge armour. Fuzion also has an extraneous so far useless stat: Resistance (RES) [WILL x3]: Your ability to resist mental or psychological attacks or stress; basically your mental “Hits” I don’t think I found anything in the V3 book that actually affects this stat. Maybe if a PC gets too many negatives because they haven’t updated their tech and their skills, they could start to take hits to Resistance. When you get down to Zero resistance, then you are vulnerable to mental problems. Kinda like the new version of cyberpychosis.
×
×
  • Create New...