Lead

Apr 23 15 12:49 AM

Tags : :

Programs

Known Programs at Start
A character begins play with a number of programs equal to their Computers skill rank, for free. Activating a program on a computer takes 1 action. 

Skill Programs
Skill programs come in three categories, Basic, Advanced, and Experimental. Basic Skill programs provide a +1 to that skill, Advanced Skill programs provide a +2 to skill checks, Experimental Skill programs provide a +3 to skill checks but at a drawback. Basic Skill Programs are at Normal price, Advanced Skill Programs are at a Costly price, Experimental Skill Programs are at a Very Costly price.

Using Skill Programs: Skill programs can be referenced from any Computer and generally require display into the Augmented Reality view of the user. A Education skill program may bring up citations and sources about a particular topic in order to allow the user to quickly educate themselves on a topic. A Throwing skill program takes online windspeed and weather data into account in order to show the user a clear parabolic arc to their target and even suggestions on how to throw the ball while pitching at a baseball game. A Tactics skill program may create a blueprint of building and suggest tactical advice on entry and where a character's blindspots are. Skill programs provide a bonus to their designated skill as long as their Active Memory is being used by the Computer they are running from. When a character is not using that designated skill, the program generally runs in the background and minimizes its profile in the user's field of view in order to prevent distraction. A character may run multiple skill programs at a time and get the bonus for each as long as they dedicate the Active Memory of their Computer and Network for the task. 

Basic Skill Programs
(Price: Normal), Active Memory Usage: 1 

Athletic Skill Programs
Athletics (+1 to Athletics), Availability: Common
Acrobatics (+1 to Acrobatics), Availability: Common
Throwing (+1 to Throwing), Availability: Common

Infiltration Skill Programs
Stealth (+1 to Stealth), Availability: Illegal
Sleight of Hand (+1 to Sleight of Hand), Availability: Illegal

Martial Skill Programs
Martial Arts (+1 to Martial Arts), Availability: Restricted
Dodge (+1 to Dodge), Availability: Restricted
Initiative (+1 to Initiative), Availability: Restricted

Combat Skill Programs
Shooting (+1 to Shooting), Availability: Restricted
Tactics (+1 to Tactics), Availability: Restricted

Knowledge Programs
Education (+1 to Education), Availability: Common
Science (+1 to Science), Availability: Common
Medicine (+1 to Medicine), Availability: Common
Tech (+1 to Tech), Availability: Common

Security Programs
Awareness (+1 to Awareness), Availability: Restricted
Sense Motive (+1 to Sense Motive), Availability: Restricted
Investigate (+1 to Investigate), Availability: Restricted
Research (+1 to Research), Availability: Restricted

Vehicle Programs
Operate (+1 to Operate), Availability: Common

Advanced Skill Programs
(Price: Costly), Active Memory Usage: 2

Athletic Skill Programs
Athletics (+2 to Athletics), Availability: Uncommon
Acrobatics (+2 to Acrobatics), Availability: Uncommon
Throwing (+2 to Throwing), Availability: Uncommon

Infiltration Skill Programs
Stealth (+2 to Stealth), Availability: Illegal
Sleight of Hand (+2 to Sleight of Hand), Availability: Illegal

Martial Skill Programs
Martial Arts (+2 to Martial Arts), Availability: Restricted
Dodge (+2 to Dodge), Availability: Restricted
Initiative (+2 to Initiative), Availability: Restricted

Combat Skill Programs
Shooting (+2 to Shooting), Availability: Illegal
Tactics (+2 to Tactics), Availability: Illegal

Knowledge Programs
Education (+2 to Education), Availability: Uncommon
Science (+2 to Science), Availability: Uncommon
Medicine (+2 to Medicine), Availability: Uncommon
Tech (+2 to Tech), Availability: Uncommon

Security Programs
Awareness (+2 to Awareness), Availability: Restricted
Sense Motive (+2 to Sense Motive), Availability: Restricted
Investigate (+2 to Investigate), Availability: Restricted
Research (+2 to Research), Availability: Restricted

Vehicle Programs
Operate (+2 to Operate), Availability: Uncommon


Experimental Skill Programs
(Price: Very Costly), Active Memory Usage: 3 

Drawback: When using Experimental Skill Programs, a character loses the ability to easily improvise and may be distracted by the program due to the focus required to perform the action effectively under the program's guidance. Experimental Skill Programs are generally only useful to those who already have at least some idea what they're doing. The effect is that while using an Experimental Skill Program, the character cannot make use of the Knack-skill to imitate the skill being used, they must use their rank in that skill exclusively for the check result. 

Athletic Skill Programs
Athletics (+3 to Athletics), Availability: Experimental
Acrobatics (+3 to Acrobatics), Availability: Experimental
Throwing (+3 to Throwing), Availability: Experimental

Infiltration Skill Programs
Stealth (+3 to Stealth), Availability: Experimental
Sleight of Hand (+3 to Sleight of Hand), Availability: Experimental

Martial Skill Programs
Martial Arts (+3 to Martial Arts), Availability: Experimental
Dodge (+3 to Dodge), Availability: Experimental
Initiative (+3 to Initiative), Availability: Experimental

Combat Skill Programs
Shooting (+3 to Shooting), Availability: Experimental
Tactics (+3 to Tactics), Availability: Experimental

Knowledge Programs
Education (+3 to Education), Availability: Experimental
Science (+3 to Science), Availability: Experimental
Medicine (+3 to Medicine), Availability: Experimental
Tech (+3 to Tech), Availability: Experimental

Security Programs
Awareness (+3 to Awareness), Availability: Experimental
Sense Motive (+3 to Sense Motive), Availability: Experimental
Investigate (+3 to Investigate), Availability: Experimental
Research (+3 to Research), Availability: Experimental

Vehicle Programs
Operate (+3 to Operate), Availability: Experimental

Specialist Programs
Specialist Programs have a Price of Normal (Diff 10), however, shareware and free versions also exist (though unless succeeding at a Hard difficulty Fortune skill check, roll on the Shareware bugs list). Some programs may be hard to locate for purchase outside of Net Hotspots or through programmer contacts, at the Game Master's discretion.

1. Intrusion 
2. Defense
3. Detection
4. Stealth
5. Assault
6. Utility

Dedicated Active Memory 

Every active program uses at least 1 point of Active Memory, but more Active Memory can be dedicated to a program to make it more powerful. Each rank of Active Memory dedicated to a program, adds as a bonus to Computer skill checks when using that program for a specified task or as per rules listed for the program. The maximum Active Memory that can be dedicated to a program is six (6 Active Memory). 
Example: A user dedicating 3 points of Active Memory towards a False Flag program link, would provide a -3 penalty to users trying to scan the program link to identify what it really is. 

Intrusion
1. Backdoor, a virus that covertly infiltrates a system and then creates a backdoor for network to allow easy access by a user in 2d6 rounds. Requires a known NetID. A Backdoor can pierce a Firewall at a rank equal to its Dedicated Active Memory. Availability: Illegal
2. Decryptor, a virus that allows decryption of a computer using an Encryption Unit. It can make a decryption check at a bonus equal to its Dedicated Active Memory. Must have user access to decrypt data. Availability: Illegal
3. Worm, a worm intrudes through a Firewall program, but its use cannot be concealed from other users on the system, requires a known NetID to target. It can intrude a Firewall at a bonus to opposed Computer skill checks equal to its Dedicated Active Memory x2. Availability: Illegal
4. False Flag, a link or file that if clicked on or downloaded at any time by another user, automatically creates a backdoor into the system of that user. This is often used as a trap. Detecting a False Flag program link, is at a penalty equal to the Dedicated Active Memory used for the program.  Availability: Illegal
5. Nightmare, a virus that creates a false intrusion that lasts for a number of rounds equal to Dedicated Active Memory of the program, this fools another user into believing their Firewall is being penetrated by a Worm, requires a known NetID. Availability: Illegal
6. Lance, a virus that allows for access to another user's system as long as the NetID is known. An opposed Computer skill check is required to gain access, the user gets a bonus to their skill check equal to their Dedicated Active Memory of this program. Lance does not alert the user of a intrusion. Availability: Illegal

Defense
1. Firewall, increases the amount of time it takes to hack your computer using a Backdoor by a number of rounds equal to your Dedicated Active Memory and it blocks against Lance and other intrusion programs that don't specifically penetrate firewalls, giving a bonus to opposed Computer checks equal to your Dedicated Active Memory. Availability: Common
2. Shield, reduces Memory damage taken from weapon programs, equal to the Dedicated Active Memory of the program. Availability: Common
3. Booster, the movement speed of your Avatar is increased by the Dedicated Active Memory (this does not work inside Augmented Reality). Availability: Common
4. Flight, an Avatar is capable of moving in any direction by flying (this does not work inside Augmented Reality). Availability: Uncommon
5. Flak, a anti-program countermeasure fires whenever the user's computer is under attack by other programs, having this program active allows an opposed Computer skill check to attempt to cancel the effects of targetted programs (such as Delete or Blaster) and gains a bonus equal to the Dedicated Active Memory. Availability: Uncommon
6. Mastermind, a deployable program that acts as its own seperate Avatar, it can run a number of Active Memory programs equal to the Online Memory of the user's Network. It has an Intelligence and Perception score equal to its Dedicated Active Memory. The program will not harm its user, but may be ordered to attack other users in the net or perform other tasks, it is sometimes mistaken for a  Geist of the user. Availability: Uncommon

Detection
1. Facial Recon, a program that can scan photos, video, or other visual images for facial 
recognition matches among established databases of facial images. Provides a bonus to Investigate checks when analyzing facial images equal to Dedicated Active Memory. Availability: Common
2. DeMasker, a program that can remove Mask programs from digital images and video, allowing the ability to view a person as they truly are. Grants a bonus to see through Masks equal to your Dedicated Active Memory for the program. Availability: Restricted
3. Reveal, a program that removes the effects of Invisibility from other programs and users within
a number of yards in the Net equal to the Dedicated Active Memory x10. Availability: Uncommon
4. Locate, a program that identifies the exact location of a user in the Net, providing coordinates as long as the NetID of the user is known. Locate can provide a bonus to finding exactly where a user is using Awareness equal to the Dedicated Active Memory of the program. Availability: Common
5. Tracer, attempts to trace the signal of a user that is using an Anonymizer, this requires an opposed Computers skill check to detect the user's NetID. If the user being traced signs offline, the signal trace cannot be completed. Availability: Restricted
6. Sandman, this scanning program can be used to detect the difference between real Intrusion programs and fakes such as Nightmare, this requires an opposed Computers skill check. You gain a bonus to detect this fake equal to the Dedicated Active Memory. Availability: Uncommon

Stealth
1. Mask, when using this program, anyone viewing your image through digital photos, video, electronic optics, or through the net, instead sees your face or body masked with a avatar image of your choice. Availability: Common
2. Invisibilty, the Avatar of a user is invisible and cannot be seen or heard by other users. Grants a penalty to Awareness checks to other users equal to Dedicated Active Memory. Availability: Restricted
3. Static, any digital cameras or recording devices within a number of yards equal to your Dedicated Active Memory x10, are filled with static, this includes 'recording' programs inside the net (Such as Window). Availability: Restricted
4. Decoy, this program creates a number of replica versions of the user (or their avatar) within the net space, these decoys move at the same speed as their user but in randomized pathways and patterns. Targetting a Decoy does not harm the computer or the main program. Availability: Illegal
5. Fog, The program creates a shield of repeating images and swarms of interference that make it hard for anyone within the "fog" to suffer a penalty to Awareness and Shooting rolls equal to the Computer skill rank of the user. Decoys also mirror the Net ID of the user, making it hard to locate the real user with a Tracer program. The fog program is centered in one spot and has a radius
of the Dedicated Active Memory for the program x10 in yards. Availability: Uncommon
6. Anonymizer, this program makes it hard to detect the Network ID of a user by bouncing it around through a variety of different servers to obscure its original connection. This program opposes the Tracer program. Availability: Illegal

Assault
1. Delete, this program can be used against a system or computer that has been hacked (or if the character has user access) and allows the user to delete a number of files or programs on the computer equal to the Dedicated Active Memory of this program. (This removes programs stored on the computer or data files) Availability: Common
2. Blade, when using a Blade program, you must physically come into contact with the avatar or digital representation of an opponent (requiring a Martial Arts roll), doing so damages the computer of the opposing Avatar by destroying a number of points of active memory equal to the Dedicated Active Memory of the program x2. Availability: Illegal
3. Blaster, when using a Blaster program, you may shoot at opposing avatars with code that deletes active memory of the opponent, removing a number of points of active memory equal to the Dedicated Active Memory of this program. Uses Shooting skill. Availability: Illegal
4. Sever Link, when using this program on a hacked computer (or if the character has user access), the user can attempt to disconnect another user from their Network requiring an opposed Computer roll. You gain a bonus to this skill roll equal to the Dedicated Active Memory of this program. Availability: Restricted
5. Overload, this program has a chance of setting a user's computer on-fire by causing an overload if their system is hacked (or user access granted), the deck burns for 1d6 damage for each point of Hard Memory for 1d6 rounds. Using this program is an opposed Computers skill check, gaining a bonus equal to the Dedicated Active Memory of the program. Availability: Illegal
6. Bomb, this program can be left in one spot and detonated by spending an action. It lasts for six minutes, before it detonates itself. A Bomb program effects all computers within 10yds per point of Dedicated Active Memory of the user who deployed the bomb, reducing all computer Active Memory by 1d6. Availability: Illegal
 
Utility
1. Window, when using this program, you can create a window from one spot inside the Net to another, allowing you or another other users to "see" remote net location and to send programs through either side of the window. Windows can be set to be "one-way" when deployed by a user. One-way windows can only been seen thru and cast programs through in one-direction. The Window program counts as an Avatar for purposes of remote program usage. The window can be opened up to 100 yards away for each 1 point of Dedicated Active Memory. Availability: Common
2. Mimic, this program can be deployed and it captures the code of the next program to be used within its vicinity within 10 yards per point of Dedicated Active Memory, this program cannot be used to stop programs from being used, but can allow this program to mimic the effects of a recently used program afterwards. The data is not enough to create a permanently working copy of a program used around it, just enough to fool temporary server memory into repeating its code for use by the user of the program. It replicates the program being used up to the Dedicated Active Memory of this program. Availability: Uncommon
3. Eraser, this program goes through data storage centers and completely cleans away all evidence of deleted files, preventing use of a Restore program. It can erase the left over data of a number of files equal to the Dedicated Active Memory of the program, in such a manner. Availability: Restricted
4. Restore, this program scans code data on a computer (such as one that has been hacked) and allows restoration of a program, file, or data within a number of hours of its deletion equal to the Dedicated Active Memory of the user. Availability: Uncommon
5. Control, this program allows a user of a computer or network to take control over subsystems inside a hacked computer, this could be anything from piloting a Drone to using automated security systems or using other connected devices. You gain a bonus when using Control subsystems equal to the Dedicated Active Memory of this Program. Availability: Common
6. Bot Swarm, this program allows a user makes you harder to trace and it lets you run a series of intrusion attacks simultaneously from multiple IPs. To gain control over the Online Memory of any hacked computer (an additional number of hacked computers equal to Dedicated Active Memory of the program) and link it to their own. The additional Online Memory keeps adding to the user's own and all hacked computers can be activated in tandem with the user's own computer, allowing for 
multiple intrusion attempts on a single computer. The Online Memory can be used for other purposes as well. Computers linked into a Bot Swarm can only be used once in such a manner 
without arousing suspicion, for each use past the first, opponents suffer a -1 penalty to Trace attempts for each Active Memory spent on Bot Swarm to find the original user's computer (to a max of -6). Availability: Illegal

Shareware Bugs (roll 1d6):
Game Master may roll for Shareware Bugs on a failed Fortune roll (Hard Diff.) when downloading shareware programs. 
1. Memory Hog (Program uses 1 more Active Memory to activate, this does not count towards Dedicated Active Memory) 
2. Glitch (Every 1d6 uses, the program crashes and will be unavailable to use unless the computer is restarted)
3. Beta (You suffer a -2 penalty to Computer skill checks when using this program)
4. Adware (Every time the program is used, an advertisement popup obscures vision, -2 to Perception based skill checks)
5. Backdoor (This program creates a backdoor for a hacker or hackers to steal your data)
6. Lag (The user reduces Processor Speed by 1 point while the program is running)