Steps in Cracking a Datafortress
The Typical Run
- Library Research to determine little facts about the corporation. May come in handy.
- Load up a good selection of software. Necessary applications include one Decryption, one Intrusion, one Anti-ICE, one Protection, and a selection of utilities depending on the purpose of the intrusion, e.g. Viddy-Master for taking control of the computer controlled monitor system, Kneivel for controlling vehicles, etc. Reading and Copying files are functions of the Menu. Other programs like Demons, Daemons, Anti-Personnel and others are useful but the extremely lucky weefie-runner might survive a low-level datacrack without them.
- Most programs require an activation and act once. Anti-ICE, Anti-Personnel, Decryption and Intrusion work once per activation. They may be activated again, but requires another action. Oter programs like Stealth and Protection and Demons are activated once and stay on until de-rezzed or deactivated.
- Decryption vs. Codegate (Decryption Program Str+1d10 vs. Codegate Str+1d10). If successful, proceed to step 4. If unsuccessful, continue to step 3.
- Intrusion vs. Datawall (Intrusion Program Str+1d10 vs. Datawall Str+1d10). If successful, proceed to step 4. If unsuccessful and unnoticed, try again. If unsuccessful and noticed, either a SysAdmin or an Anti-Personnel Program has been notified of your presence and will attempt to apprehend or discourage you, proceed to Combat!
- Stealth vs. Detection (Detection Str+1d10 vs. Stealth Str+1d10). If successful, proceed to step 5. If unsuccessful, the Detection Program has notified either a SysAdmin or an Anti-Personnel Program to apprehend or discourage you, proceed to Combat!
- Locate CPU and either run a Menu Command or operate a remote using the appropriate utility. Often, CPU's contain further defenses that may need to be averted and step 4 or Combat! may need to be repeated.
When the Shit Hits the Fan - Net Combat!
1. Initiative:- Human Intelligence + Deck Speed + 1D10
- Computer Intelligence (CPUx3) + 1d10
1a. Winner declares first and takes one action, then each successive highest result acts in descending order.
1b. OPTIONAL RULE: Loser declares first, Winner acts first. Therefore, if an opponent is launches an Anti-Personnel Program towards the intruder, the intruder may either activate a suitable defense or take a chance and attack the opponent first.
2. Combat Options:
Intruder attacks ICE
Anti-ICE Program Str + Intelligence + Interface vs.
Program Str + Computer Intelligence (CPUx3).
Intruder attacks SysAdmin or SysAdmin attacks Intruder
Anti-Personnel Program Str + Intelligence + Interface vs.
Protection Program Str + Intelligence + Interface
Defending CPU attacks Intruder
Anti-Personnel Program Str + Computer Intelligence (CPUx3) vs.
Protection Program Str + Intelligence + Interface
Defending CPU attacks Intruder's Cyberdeck
Anti-System Program Str +Computer Intelligence (CPUx3) vs.
Cyberdeck's Datawall Str + Protection Program Str + 1d10
3. Damage:
Damage is allocated to affected systems or programs Strength (or Health in the case of Black ICE).
Reference
The Cyberdeck Menu
- Log On/Off
- Run Program
- Read File
- Copy File
- Edit File
- Erase File
- LDL
Software
| Offense | Defense | Resolution |
| Intrusion | DataWall | Program Str+1d10 vs DataWall Str+1d10
|
| Anti-System | DataWall | Program Str+1d10 vs DataWall Str+1d10
|
| Decryption | CodeGate | Program Str+1d10 vs Codegate Str+1d10 |
| Detection | Stealth | Program Str+1d10 vs Program Str+1d10 |
| Anti-Personnel | Protection | Program Str+Intelligence+Interface+1d10 vs. Program Str+Intelligence+Interface+1d10
|
| Anti-ICE | None | Program Str+Intelligence+Interface+1d10 vs. Program Str+Intelligence+Interface+1d10
|
| LDL | None | Roll under LDL Security Level |
| Trace | None | Program Str+1d10 vs combined Trace Values |
| Utilities | None | Roll under Utility Strength |
Calculations |
Computer Intelligence= | CPUx3 |
AI= | Computer Intelligence>12 |
Computer Memory= | CPUx40 |
Skills= | CPUx2.5@level 4 |
Base DataWall= | CPUx1 up to 10 |
Base CodeGate= | 2 up to 10 |
- Inter-Office Memos
- Database
- Business Records
- Financial Transactions
- Grey Ops
- Black Ops
No comments:
Post a Comment