instant netrunning a fuzion plug-in by christian...
TRANSCRIPT
Instant Netrunning � A Fuzion Plug-In � by Christian Conkle
([email protected], http://www.europa.com/~conkle)
Introduction
This is a system of rules expanding the hacking rulesfor Fuzion and Interlock. These rules draw heavily onCyberpunk 2020's Netrunning rules and are intendedto be native in a Cyberpunk environment where neuralcyber-interfaces are standard, though they are writtengenerically enough to be useable in a modern setting aswell.
These rules were designed to use existing Cyberpunk2020 equipment and software with little modi�cation.There are several di�erences from the original rules, how-ever, that are intended to speed play and optimize sim-plicity. First, these rules lack a grid. Movement withinthe virtual environment of cyberspace is conceptual. Toconvert applications that give �ranges�, simply apply apercentage chance of e�ectiveness based on range. Sec-ond, these rules incorporate the Power attribute fromother Fuzion games, essentially the equivalent to a com-puter's Intelligence from CP2020. Third, software andmemory no longer needs to be assigned to speci�c CPUs.If the GM wishes, each MU of application and data�lecan be assigned to speci�c CPUs such that if that CPUfails, the application or data�le is no longer available.This process was removed to eliminate extra bookkeep-ing. These rules assume a 3d6 die-rolling mechanic op-tion of Fuzion. If you're playing Interlock, or the Fuzionoption of 1d10, simply replace the 3d6 with a 1d10 dieroll. You won't achieve the same kind of bell curve, butthe results will be su�ciently randomized.
The Net
The Net is a global computer network allowing fastand convenient access to millions of computers fromany other computer on earth or beyond. Any computerconnected to this network has the capability to accessinformation from any other computer connected to thisnetwork regardless of distance or time of day. Whether itis called the Internet, the Web, the Cybernet, the Face,or the Net, all use di�erent special e�ects and technolo-gies to describe the same thing. This plug-in assumes anear-future setting which makes use of a Virtual Realityinterface and gives exciting names to actions and taskswhich can be easily modi�ed to �t a more mundanemodern setting.
All computers connected to the Net are assigned LDL.This LDL serves as a kind of telephone number forthat computer, to which other computers know whereto send information. In a futuristic setting, a VirtualConstruct or Icon may substitute for the LDL. The NetUser connects their computer to a Virtual Reality Inter-face, within which companies pay for space and createelaborate virtual constructs to represent their LDL, theVR equivalent of Internet Portal Sites such as Infos-eek or Yahoo! today. The Net User may now tour thebustling 3D Virtual City regardless of gravity or speed.Corporate virtual constructs are like giant 3D advertise-ments, attempting to entice the average Net User intotheir Virtual Realities to sell products or services. SomeVirtual Realities actually provide useful services suchas information or online software applications. The VRequivalent to modern Websites. These Virtual Realitiesare housed on Dataservers maintained by the respec-tive corporations or institutions. It is the informationhoused on these Dataservers that isn't readily availableto the public that draws the Hacker. Normally, a cor-porate dataserver is openly accessible to the Net public,providing information either to the public or its employ-ees through a variety of interfaces: text-only, text andgraphics (the Web), audio/video, or fullsensory virtualreality (the Net).
However, the value of information available on publicdataserver sites is poor and bland. In addition, access toremote software applications is limited to public-domainapplications.
Datafortresses are the restricted hidden levels of adataserver providing remote access to restricted data orsoftware applciations to authorized users. Security ismaintained through the datafortress' DataWall program.The level of security restriction depends on the value ofthe information or application. Secure information maybe housed on the same dataserver as public information,only hidden in restricted directories, e�ectively invisiblefrom those who lack proper authorization. Authorizationcomes with proper identi�cation. � Identi�cation cancome in many forms: Authorized Net LDLs, passwords,proper interface software, or even biometric data.It is a hacker's goal in life to gain unrestricted accessto restricted information, uncover secrets, make unau-thorized changes to data, or to use a restricted softwareapplication.
Instant Netrunning � Netrunning Softwares 1/25
When attempting to gain unauthorized access to a cor-porate datafortress, the hacker establishes a legal con-nection to the company's dataserver. Once connected,the hacker has normal access to the free services. Nor-mally, an authorized user will then use an interface pro-gram to gain access to the datafortress. The datafortress'Code Gate program veri�es authorization and allows ac-cess. The hacker attempts to fool the code gate intoauthorizing entry. Should that fail, the hacker may at-tempt to gain entry by disabling the DataWall programprotecting the information.
Once past security, the Datafortress constantly re-checksauthorization through the use of Detection software. De-tection software double-checks the authorization of allthe users connected to the datafortress. If it �nds adiscrepancy or error, it noti�es the Datafortress SystemAdministrator (SysAdmin) who will either attempt todisconnect the hacker, determine the hacker's locationwith a Trace application, disable the hacker's softwarewith an Anti-ICE application, disable the hacker's com-puter with Anti-System software, or physically injure thehacker with Anti-Personnel software. The hacker usesStealth software to fool detection software into eitherauthorizing or ignoring the hacker's connection. If dis-covered, the hacker may �ght back against the SysAdminwith Anti-ICE, Anti-System, or Anti-Personnel softwareof their own.
Should the hacker gain access to the Datafortress' di-rectories, they may view, copy, or alter data. Datacomes in the form of online applications for remote use,inter-o�ce communication, public display data (text,audio-video, or VR), databases, or records.
The Hacker
The Hacker's arsenal includes a computer, specializedhacking software, and, foremost, a way to connect toa remote target computer, usually via the Net thoughdirect connections, however unwise, can be made.
A Hacker's access to the Net is very important. To con-nect to the Net, the Hacker must have an LDL. LDL'scost 50 euro a month from the Internet Corporation,though they, too, can be hacked. Connections betweencomputers are relatively easy to trace. Each computerconnection has a corresponding Trace Value from 1 to10. Hackers generally make a chain of several connec-tions before they proceed to their target computer. ASysAdmin wishing to trace the ultimate origin of theHacker must trace every connection to �nd the source.
The SysAdmin
The SysAdmin is in charge of security for aDataserver/Datafortress. It is their primary job to pre-vent Hackers from illegally gaining unauthorized accessto restricted data. It is their secondary job to catchhackers who have already have.
SysAdmins use their own computers connected to aDataserver/Datafortress to execute software applica-tions. The Dataserver/Datafortress itself uses softwaresuch as Codegates, Datawalls, and Detection softwaredeter and identify hackers, yet allow authorized users in.
A Datafortress is also characterized by its Power and itsSpeed. A Datafortress is also rated by a Security Levelfrom 1 to 10. This number is added as a skill would tothe computer's Power when executing software applica-tions. The computer's Security Level is also it's TraceValue if being used to chain connections. A SysAdmincan't do anything to catch a Hacker if he doesn't knowthey're there, so the SysAdmin relies heavily on De-tection software to notify them of unauthorized access.Once detected, the SysAdmin can run Anti- Personnelsoftware against the intruder, or opt to trace the hackerand run Anti-System software against the Hacker's com-puter.
The Computers
Computers, whether they are Palmtops, Desktops, Mi-nis, or mainframe supercomputers, exist to execute soft-ware applications. The computer is characterized by itsPower and its Speed and its Security Level.
The Power is used like the computer's Body and it'sRe�exes, it determines it's resiliency to attack and itsbase chance to perform an action. Power is based on thenumber of Central Processing Units driving a computer.One CPU has a Power of 3, each additional CPU addsan additional 3. Each CPU costs $10,000. A Computermay have up to 7 CPUs for a Power of 21. AdditionalCPUs increase processing capacity and provide backupsin case one CPU should fail due to Anti-System soft-ware.
A Computer's CPU also determines how much softwareit can run and data it can store. Software and Dataare stored in Memory Units. A Computer can store asmany MU's as it's CPU x 40. Memory can be improvedfor $250 per MU. CPUs also determines the startinglevel of system Datawall. A Datafortress' base Datawallstrength is equal to the number of CPUs driving it.
2/25 Instant Netrunning � Netrunning Softwares
Computers with Powers higher than 10 are Arti�cialIntelligences with complete personalities and full inter-activity. Power can be decreased for a cost reductionof $3000 per level. A Computer may also possess skillslike a character. Memory can be put aside to use asskills at a rate of 1 MU per Skill Level. In this way, acomputer can devote 5 MU to have a Security Skill of 5.All computer skills use Power as the primary statistic.
The Speed is used to determine initiative. If using theSpeed Chart, it can be used to determine the numberand order of actions in a turn. Speed can be increasedfor $2000 per bonus up to +5.
The Security Level is the SysAdmin's Security skill,added to its Power when resisting attacks. The SecurityLevel is also used to determine a server's Trace Valuewhen using it to chain connections in preparation for arun.
A Computer can respond to hacker's automatically.Once Detection software has identi�ed an unauthorizedintruder, the Computer can automatically execute Anti-Personnel software against the Hacker, or trace the signaland run Anti-System software against the Hacker's com-puter.
A Computer can also be de�ned as a Cyberdeck. Cy-berdecks or Cybermodems are small devices that aresimilar to computers in that they execute programs, butare di�erent in that they are connected to the user'sliving brain and use it's neurological wiring to act asits Central Processing Unit. The Cyberdeck, modernterms, is little more than a hard drive and network con-nection. All input and output is processed by the user'sbrain.
Cyberdecks do not have CPUs, but the user must have aNeural Interface and Cybermodem processor installed intheir brain, the cost of which is $1100 for the hardwareand $500 for the surgery. Cyberdecks provide 10 MU,a Speed of 0, and have a Data Wall strength of 2. Thebasic parts of a cyberdeck costs $1000 for the externalhardware, though this is often marked down to as lowas $500 for a used model.
Computer Hardware Price List
1 CPU $10,000 (Power 3, 40 MU, Data Wall Strength of 1)1 Cyberdeck $1000 (Power 0, 10 MU, Data Wall Strength of 2)+1 CPU $10,000 (Power +3 each, +40 MU each, Data Wall Strength of +1 each, maxi-
mum 7 CPUs)+1 MU $250 (no maximum)+1 Speed $2,000 (maximum of +5)-1 Power -$3,000 (no maximum, but at more than -2 you may as well buy fewer CPUs)
Cyberdecks vs. Computers
In games where cybernetic interfaces are common andolder manual interfaces are uncommon, simply apply a �2 to all actions taken by manual-interface computers. Ingames where cybernetic interfaces are uncommon, suchas the modern world, apply a +2 to all actions taken bycybernetic interface computers.
Successful attacks made against Cyberdecks using Anti-System software will cause the brain to disconnect andbecome unconscious for 1d6 rounds in lieu of the CPU.
The Menu
To simplify using a computer in a game context, a simpleset of commands has been devised. These commands arecalled �The Menu�. A Hacker simply chooses his actionbased on the list available in the Menu.
The Menu
• Log On/O� : Legally gain access to an unre-stricted Dataserver through proper authorizationtechniques (password, LDL authentication, or bio-metrics).
• Run Program: Run either a local or remote soft-ware application.
• Read File: View the contents of a data�le, be itText, Graphics, Audio/Video, or Virtual Reality.
• Copy File: Copy a �le from a remote location toa local one. Warning, a record is kept of each copyin a �le history.
• Edit File: Edit the contents of a data�le above.Warning, a record is kept of each modi�cation ina �le history, including the modi�cation of the �lehistory.
• Erase File: Erase a data�le above. Warning, arecord is kept of each erasure in a �le history, in-cluding the erasure of the �le history.
• LDL: Establish a connection to a Dataserver.Warning, if disconnecting from datafortress, if thestealth roll was unsuccessful, the SysAdmin canstill do a trace on your LDL.
Instant Netrunning � Netrunning Softwares 3/25
The Software
Software applications are measured by their Strength, which act as a sort of Weapon Accuracy which is added toall tasks performed with that application. Software Strength is rated from 1 to 10.
Software is also measured by how many Memory Units it uses on its host computer. This is cumulative. A com-puter with 30 Memory Units can run one 15MU program and three 5MU programs simultaneously. Switching outa program takes one action.
Software applications can have very speci�c e�ects, depending on the application being used. The most commonand broadly-de�ned applications are as follows:Type E�ect Strength MU Cost
Decryption(Wizard's Book)
Defeats Codegates and File Locks. 4 2 400
Intrustion(Hammer)
Defeats Datawalls. 4 1 400
Stealth(Invisibility)
Defeats Detection Software. 3 1 300
Protection(Shield)
Defeats Anti-Personnel Software. 3 1 150
Anti-System(Flatline)
Causes system to crash. 3 2 570
Anti-ICE(Killer II)
Does 1d6 damage to target software's STR. 2 5 1320
Anti-Personnel(Hellbolt)
Does 1d10 Hits directly to target's body if connected via acyber-jack.
4 4 6750
Firewall(Datawall)
Prevents all access to restricted information. POW � �
+1 +1 +1000Authentication(Codegate)
Allows access to restricted information to authorized users 2 1 2000
+1 +1 +2000Detection(Guard Dog)
Detects unauthorized users, traces signal, and alerts SysAd-min.
4 5 720
Other software found in Cyberpunk 2020 is fully compatible with this system.
4/25 Instant Netrunning � Netrunning Softwares
Utilities
Utilities are programs that help the Hacker in between runs. Though most don't provide any practical applicationduring the run, they're nonetheless essential applications for the upkeep and preparation of a hacker's computer.
Type E�ect Strength MU Cost
Restore Utility(ReRezz)
Recompiles and restores destroyed programs. 3 1 130
Recorder Util-ity(Instant Replay)
Records activities of current Hack for replay later. 8 2 180
Virus Protec-tion Utility(Gatemaster)
Detects and destroys Virus programs. 5 1 150
File ProtectionUtility(Electrolock)
Locks data�les as a Strength 3 Code Gate. 7 2 170
CompressionUtility(Packer)
Reduces program size by 1/2. Takes 2 turns to unpack. 4 1 140
Backup Utility(Backup)
Creates copies of most programs on chip. 4 1 140
VR Map Util-ity(Cartographer)
Supplies complete system map of VR interface. 6 3 200
Utility Package All of the above in one package. Saves MU and money. 5 10 1000
The GoodsOnce a successful Hacker has bypassed security(Datawalls, Codegates, and Detection software), he nowhas access to the Datafortress' CPU. The Hacker maynow view stored �les (text, video, audio, VR) or runonline software applications. Be warned, individual �lesmay have further security measures attached to them.For example, a �le marked �Black Ops: Top Secret�might have another Detection application attached to itwhich the Hacker must bypass. Or it may be �le-locked.Tampering with any ICE applications automatically re-quires the Hacker bypass a File Protection Utility andany Detection Software.
Common data�les found on corporate datafortresses in-clude:
1. Inter-O�ce Memos (E-Mail)2. Promotional Material(such as VR advertising sims
and Web Pages)3. Business Records (including databases)4. Financial Transactions5. Grey Ops6. Black Ops
CPU's house applications for online use as well. Appli-cations range from simple spreadsheets and word proces-sors to VR Simulations and computer-controlled roboticsystems such as security video surveillance, elevators,building climate-control, assembly robots, etc.
Note on making copies: In the Cyberpunk future,all �les have a �le-history, recording all modi�cationsto the �le. Though modi�cations can be made to the�le-history, the File-history now has a record of themodi�cation. This feature is used to determine the pro-priety of data. For instance, a hacker �nds a �le in theArasaka database called �Black Ops: Top Secret�. TheFile History for that �le will indicate how many timesit's been viewed, by what User, and when. Our Hackerdecides to make a copy. The original now records that acopy was made at this date by this user. The new Copyrecords that it was copied from an original on this dateby this user. Every time the hacker views the material,the record shows that the �le was viewed on this date bythis user. If the hacker wishes to sell this information, aprospective buyer can view the �le-history and see howmany times the �le has been seen, modi�ed, and copiedand by whom. Diluted data will lower the �le's value.
Instant Netrunning � Netrunning Softwares 5/25
Virgin data will raise it's value. The enterprising Hackercan easily change the File-History, but a record is madethat the �lehistory has been changed, thus lowering thevalue even more. The Hacker can then try to delete therecord of the change, but the deletion of the change isrecorded in the �le-history. It never ends. The safestbet is to just own one copy and not view it.
Standard Hacker Software
Decryption (Strength 4, MU 2, $400)Intrusion (Strength 4, MU 1, $400)Stealth (Strength 3, MU 1, $300)Protection (Strength 3, MU 1, $150)Anti-ICE (Strength 2, MU 5, $1320)Total (MU 10, $2570)
Standard Datafortress Software
1. Mundane SystemsDetection (Strength 4, MU 5, $720)Total (MU5, $720)
2. Grey SystemsDetection (Strength 4, MU 5, $720)Anti-System (Strength 3, MU 2, $570) Grey Sys-tems OnlyTotal (MU 7, $1290)
3. Black SystemsDetection (Strength 4, MU 5, $720)Anti-System (Strength 3, MU 2, $570) Grey Sys-tems OnlyAnti-Personnel (Strength 4, MU 4, $6750) BlackSystems OnlyTotal (MU 11, $8040)
Sample Computers
1. Minor business or personal system (grey info)Statistics: POW 1 (1 CPU, -2 POW) , MU 40,Speed 0, $4000Example: DataTerms, Minor Personal Informa-tion, Palmtops, Portable Computers.
2. Major business (grey info) or personal system(black info)Statistics: POW 3 (1 CPU), MU 40, Speed 3,$16,000Example: Business Accounts, Secret Personal In-formation
3. Major business (black info) or Megacorp sys-tem (grey info)Statistics: POW 6 (2 CPU), MU 80, Speed 6,$32,000Example: Alternative Accounts, Customer SalesInformation
4. Government (grey info), Megacorp (black info)or Criminal system (grey info)Statistics: POW 9 (3 CPU), MU 120, Speed 9,$48,000Example: Police Files, Sabotage Information,Holdings Information
5. Government (black info), Orbital (grey info), orCriminal system (black info)Statistics: POW 10 (4 CPU, -2 POW), MU 160,Speed 10, $54,000Example: Black Op Files, Internet Account Hold-ers, Face Bank Accounts
6. Orbital system (black info)Statistics: POW 12 (4 CPU), MU 160, Speed 12,$64,000Example: Agora Mecca, Cyber Circle Lunar,Ishima Orbital Databases, Arti�cial Intelligences.
Steps in Cracking a Datafortress:
1. Library Research (Intelligence + Library Research + 3d6 vs. Di�culty Number) to determine little factsabout the corporation. The margin of success is granted as a bonus to the Decryption roll in step 2.Bonus: The Hacker loads up a good selection of software. Necessary applications include one Decryption,one Intrusion, one Stealth, one Anti-ICE, and one Protection.
2. LDL (Roll over LDL Security Level on 1d10 ). The Hacker has connected to a remote server and may use itto connect (LDL) to another remote server, making a chain of connections to their target. SysAdmins musttrace each connection to determine the Hacker's LDL. Once a chain of connections has been established,the Hacker may use the same chain inde�nitely unless access is revoked by the remote server's Net AccessProvider.If unsuccessful, the remote server has refused to connect the Hacker. The Hacker must then make a �nalconnection to the target server.
3. Decryption vs. Codegate (Intelligence + Hacking + Decryption Program Str + 3d6 vs. Power + Security+ Codegate Str + 3d6 ). If successful, the Hacker has fooled the Code Gate into allowing unauthorized accessto the server. The Hacker is still susceptible to Detection software, proceed to step 4.
6/25 Instant Netrunning � Netrunning Softwares
If unsuccessful, the Hacker still has no access to the server. Repeated failed attempts(3d6) will cause anyDetection Software to alert the SysAdmin to the attempt who may use Detection software to initiate a traceto locate and/or monitor the possible Hacker. Continue to Step 4.
4. Intrusion vs. Datawall (Intelligence + Hacking + Intrusion Program Str + 3d6 vs. Power + Security +Datawall Str + 3d6 ). If successful, the Datawall has been circumvented and the hacker now has access tothe server. The Hacker is still susceptible to Detection software, however. Proceed to step 5.If unsuccessful The Hacker still has no access to the server but may have been noticed. If unnoticed, tryagain.If noticed, either a SysAdmin or an Anti-Personnel Program has been noti�ed of the Hacker's presence andwill attempt to apprehend or discourage him, proceed to Combat!
5. Stealth vs. Detection (Power + Security + Detection Str + 3d6 vs. Intelligence + Hacking + StealthStr + 3d6 ). If successful, the Detection Software has detected no unauthorized activity but may attempt tore-validate the user after an interval of time (3d6 rounds), proceed to step 6.If unsuccessful, the Detection Program has detected unauthorized activity and may noti�ed either a SysAdminor an Anti-Personnel Program to apprehend or discourage the Hacker, proceed to Combat!
6. You now have access to the CPU. The computer thinks you are logged on as an o�cial authorized user.You may access data�les and software applications available on that server. Some data�les and applicationsmay contain further security measures. If so, repeat step 3.
7. Cover your tracks. Failing to log o� or being cut from the line means that the SysAdmin can still traceyour location. Be sure to always log o� properly. View the contents of any �le you download, but be waryof the �lehistory: don't dilute your data!
Combat!
1. Initiative.Human Intelligence + Computer's Speed + 3d6 versus Computer's Power + Speed + 3d6
2. Loser declares �rst, Winner acts �rst. Therefore, if the loser is launching an Anti-Personnel Programtowards the intruder, the winner may either activate a suitable defense or take a chance and attack the loser�rst.
3. Combat Options:
a Intruder attacks ICE. (Intelligence + Hacking + Anti-ICE Program Str + 3d6 vs. Computer'sPower + Security + Program Str + 3d6 ). If successful, the target software application has crashed anderased from the server.If unsuccessful, the attack has failed to crash the application. Detection Software automatically tracesthe Hacker's connection and alerts the SysAdmin to the attempt who may attempt to discourage theHacker.
b Intruder attacks SysAdmin or SysAdmin attacks Intruder. (Intelligence + Hacking/Security+ Anti-Personnel Program Str + 3d6 vs. Protection Program Str + Intelligence + Hacking/Security+ 3d6 ) If successful, the Anti-Personnel program has done damage directly to the user's brain (STR �Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treatattack as an Anti-System attack.If unsuccessful, the attack has failed to do any damage.
c Defending CPU attacks Intruder (Computer's Power + Security + Anti-Personnel Program Str+ 3d6 vs. Intelligence + Hacking + Protection Program Str + 3d6 ) If successful, the Anti-Personnelprogram has done damage directly to the user's brain (STR � Protection STR in Hits), only if connectedvia a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack.If unsuccessful, the attack has failed to do any damage.
d Intruder attacks System. (Intelligence + Hacking + Program Str + 3d6 vs. Computer's Power+ Security + DataWall Str + 3d6 ) If successful, the Anti-system software has caused a CPU to crash,ceasing all activity until the CPU can be re-initialized using a Restore Utility. The Intruder is imme-diately disconnected, but not logged o�. Once the CPU is re-initialized, the SysAdmin may attemptthe trace the connection. If the target is using more than 1 CPU, all CPUs must be neutralized for thetarget to crash.
Instant Netrunning � Netrunning Softwares 7/25
If unsuccessful, the attack against the CPU failed. Detection Software automatically alerts the SysAd-min to the attempt who may initiate a trace to locate and/or monitor the possible Hacker.
e Detection Software Traces Intruder (Power + Security + Program Str + 3d6 vs. Intelligence+ Hacking + Trace Value + 3d6 ) If successful, the Detection Software has located the origin of theHacker's connection and informed the SysAdmin. A Detection Program must trace each connection inthe event of chained connections (see above) to determine the origin. Once determined, the SysAdminmay notify the Hacker's Net Access Provider in an attempt to have their access revoked. In addition, anyfurther attempts to connect from any server on a traced chain will automatically alert the SysAdmin'sDetection Software of the unauthorized access. If a connection was severed without spending an actionLogging O�, the SysAdmin can still perform a Trace on that severed connection.If unsuccessful, the trace has failed. The Detection Program may attempt to trace a connection eachround.
4. Damage. Damage is allocated to a�ected systems or programs (or Hits in the case of Black ICE).
Glossary
Anti-ICE Software: software meant to crash anddelete other software applications.
Anti-Personnel Software: software meant to dodamage to the actual Netuser. Only works in mileuthat use Cybernetic interfaces.
Anti-System Software: software meant to crash orimmobilize another computer's CPU.
Arti�cial Intelligence: an advanced computer ca-pable of full interaction and decision-making.
Black Info/System: Top Secret information. Infor-mation that someone is willing to kill to keep secret.A Datafortress with deadly countermeasures such asAnti-Personnel software.
Codegate: a Cyberpunk 2020 term for an au-thentication mechanism or Firewall. Codegates couldcheck namepassword combinations, computer location(LDL), �ngerprints, retinas, voice-prints, DNA, etc.
CPU: Central Processing Unit, the brain of a com-puter. Many computers have multiple redundant CPUsthat increase processing power. Also, if one fails, thecomputer can keep operating at a reduced level.
Cyberdeck: or Cybermodem, a computer device thatuses the operator's living brain as a CPU.
Data�le: any �le that contains information. Data�lescan be text, graphics, video, audio, or full sensory VRsimulations.
Datafortress: A Dataserver that restricts informa-tion to authorized users.
Dataserver: A futuristic term for a server, a com-puter which provides data upon request.
Datawall: A Cyberpunk 2020 term for a Firewall,a Datawall without a Codegate simply doesn't provideaccess to it's protected information and must be de-feated with Intrustion Software.
Decryption Software: Software designed to bypassCodegates by fooling it into providing access.
Detection Software: Software that periodically re-checks users on a server to authenticate access. If unau-thorized access is discovered, the Detection Softwarenoti�es the SysAdmin or automatically deploys Anti-Personnel or Anti-System applications depending on
how the Datafortress is set up.
Euro: The Cyberpunk 2020 unit of currency. Formodern settings, simply replace with dollars.
Grey Info/System: Secret information. Infor-mation no one is willing to kill to keep secret. ADatafortress with non-lethal countermeasures such asAnti-System software.
Hacker: A generic term for anyone attempting togain unauthorized access to restricted information ofapplications.
Hacking: Skill used by Hackers. In game terms,Hacking and Security are the same skill used for di�er-ent purposes.
ICE: Intrusion Countermeasure Electronics, encom-passing any software applications designed to preventunauthorized access to a Datafortress.
Icon: A visual representation. In Cyberpunk 2020,refers to a 3D representation of a computer object.A �le might be represented by an icon that, onceclicked/grabbed/pushed/opened, will display the con-tents of that �le. Often, events are represented by anicon. For instance, a SysAdmin might represent hispresence on the server with an icon of a knight in ar-mor. If the Hacker sees a knight in armor, then heknows the SysAdmin is logged onto the server.
Internet Corporation: A Cyberpunk 2020 creationmeant to be a conglomerate of Net Access Providers.In the modern world, these would be comprised of sev-eral companies such as MCI, ATT, UUNet, etc. Intru-sion Software: Software meant to temporarily disableDatawalls, allowing access to the server. The disad-vantage is that their use may alert Detection Softwareapplications.
LDL: A Cyberpunk 2020 equivalent of the modernIP address. In Cyberpunk 2020, the LDL also servesas an allpurpose phone number, e-mail address, andvoice-mail box.
Memory Unit: A Cyberpunk 2020 equivalent toMegabytes. It has no real-world conversion and wasused in lieu of actual future memory sizes which canbecome dated quickly.
8/25 Instant Netrunning � Netrunning Softwares
Mundane Info/System: Con�dential information,but hardly a secret. Information that is restricted butisn't guarded by countermeasures. Datafortresses thatemploy Detection Software only.
The Net: The Cyberpunk 2020 equivalent of the In-ternet. The Cyberpunk 2020 Net is represented by a3D fullsensory
Virtual Reality: Other names for the Net includethe Face, the Cybernet, the Interface, the Web, etc.
Net Access Provider: A company that rents tem-porary LDL's to Netusers. The Internet Corporation isa large Net Access Provider. NAP's generally cooper-ate with SysAdmins in discouraging Hacker activity. Ifan NAP is noti�ed that one of their Netusers is possiblya Hacker, they will discontinue that Netuser's service.The futuristic equivalent of modern day Internet Ser-vice Providers.
Netuser: Anyone using the Net legally. The equiva-lent of the modern Net surfer.
Power: A Fuzion game mechanic meant to be a rel-ative measure of a computer's ability.
Security Level: A Fuzion game mechanic meant torepresent the skill used by either a SysAdmin or Com-puter CPU to deter or capture Hackers. In game terms,Security and Hacking are the same skill used for di�er-ent purposes.
Server: A computer connected to the Net. The serveracts as a middle-man between the person requestinginformation and the memory storing the information.Your computer sends a request to the server, the server�nds it, the server sends the information to your com-puter.
Speed: A Fuzion game mechanic meant to be a rela-tive measure of a computer's speed. Stealth Software:Software that attempts to fool Detection Software intoauthenticating or ignoring an unauthorized Hacker.
Strength: A Fuzion game mechanic meant to be arelative measure of a program application's ability.
SysAdmin: System Administrator. The person incharge of maintaining a Datafortress' security.
System: A collection of computer components thatwork together. A group of computers attached to asingle network would be a system. The Net as a wholemight be considered a very large system. Trace Value:The relative di�culty in tracing a connection's origin.
Virtual Reality Interface: Much like a modernGraphic User Interface (GUI), the VR Interface dis-plays the computer's �Desktop� as a 3D interactive uni-verse around the user. In Cyberpunk 2020, the Net canbe accessed in such an interface, displaying Net LDL'sas Icons around the user. The user moves freely aboutin this space, choosing the icon they wish by cominginto contact with it with their hands. Their bodies aredisplayed to them as whatever the user wishes and pro-grams much like a modern cursor, their hands actingas a mouse in space.
VR Construct: A 3D Icon in a VR Interface. A VRconstruct can be anything, limited only by the imag-ine of the creator. It's size is determined by how muchmemory it requires.
VR Sim: A VR Simulation. A tiny virtual universe.
In Cyberpunk 2020, VR Sims can be interactive games,advertisements, network conference areas, or fantasyplaygrounds. Any situation that requires being some-place you can't actually physically be can be solvedwith a VR Sim.
References
For more information on other Hacking and Netrunning sys-tems, see:
Cyberpunk 2020 by Mike Pondsmith, R.TalsorianGames.
Bubblegum Crisis RPGby Benjamin Wright, R.Talsorian Games.
NETRUNNING RULES by [email protected].
Sky�re Master Force by Gary Townsend, HEROGames.
How Hackers Break In... and How They AreCaught by Carolyn P. Meinel, Scienti�c American, Oc-tober 1998.
Cyberpunk:2020 and Fuzion are a Registered Trademarks of R.Talsorian
Corporation. Original Cyberpunk:2020 material Copyright 1994, 1995
by R.Talsorian Corporation. All Rights Reserved. Used without per-
mission. Any use of R.Talsorian Corporation's copyrighted material or
trademarks in this archive should not be viewed as a challenge to those
copyrights or trademarks.
Instant Netrunning � Netrunning Softwares 9/25
NetrunningSoftwares
Type/Name
Str
MU
Cost(eb)Function
From
Icon
Intrusion
Dwarf
33
230
Stronger
versionof
Worm
BB
Small,quietdiggingmachine.
Grubb
13
210
Weakerversionof
Worm
BB
Swarmofpuke-green
grubsthat
eattheirway
throughtheWall.
Ham
mer
41
400
2D6to
DataWallST
R,alertsprogramswithin10
spaces
CP20
Glowingredhammer.
Jackhammer
22
360
1D6to
DataWallST
RCP20
Glowing
red
jackhammer,
which
�res
astream
ofwhite
hotenergy
boltsat
theData
Wall.
Jap
Water
Tor-
ture
34
260
Min
of2turns,each
additionalturn
adds
+1ST
R(m
ax7)
BB
Tiny,random
dropsofglow
ing"w
ater"strike
theWall,causingripples.
Pile
Driver
84
800
4D6toDataWallSTR,alertsprogsin30
spaces,&
Netwatch
Chr3
Steam-pow
ered
pile
driver
onthevergeof
blow
ingup.
Portal
26
750
Opens
door
inDataWall,takes3turns,no
alert
NET
Metallic
door
that
slow
lymesheswiththe
DataWallthen
swings
open
fortheNetrun-
ner.
Ram
mingPiston
103
900
5D6to
DataWallST
R,"audible"to
anything
within50
spaces
BB
Huge
nuclearpowered
battering
ram,as
draw
nby
Jack
Kirby.
Sledgehammer
62
600
3D6to
DataWallST
R,alertsprogramswithin15
spaces
Chr3
Glowingwhite
Sledgehammer.
Termite
12
160
1D6to
DataWallST
RChr1
Brown,
�st-sized,
fractalinsect
withbright
blue
eyes.Emitslow-pitched
bleeps
asitbur-
rowsinto
Wall.
Worm
25
660
Opens
DataWallin
2turns,no
alert
CP20
Gold-metal,roboticworm,withgreenneon
eyes.
Decryption
Codecracker
32
380
Opens
CodeGates
CP20
Thinbeam
ofwhite
light,which
shootsfrom
theNetrunner'shandsandspreadsthrough
theCodeGate.
Cyfermaster
63
700
Stronger
versionof
Ra�
esBB
Fractalimageofaman
�oatingin
lotusposi-
tion.
Dupre
1-8
4900
Opens
CodeGates
&File
Locks
Chr3
Elegant
middle-aged
Victorian.Hespeaks
tothelocked
Gate,
andtakesnotesas
hedoes
so.
Ra�
es5
3560
Opens
CodeGates
&File
Locks
CP20
Dapperyoungman
wearing
eveningclothes
ofthe1990's.
Hespeaks
tothedoor
then
vanishes.
......
......
......
....
10/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Tinweasel
34
300
Sneaky
decryptor
BB
Shifty-eyed
characterwithan
insinceresm
ile.
Wizard'sBook
4/6
2400
Opens
CodeGates
&File
Locks
CP20
Stream
ofblazingwhite
symbols,�owingat
incredible
speedfrom
theNetrunner's
open
hand.
Detection/Alarm
Bloodhound
35
700
Detectsentry,traces,alertsmaster
CP20
Large,gun-metalgrey
hound.
Ithasglow
ing
blue
eyes
andwears
athickcircletof
blue
neon.
Bulldog
66
660
Detectsentry,alertsmaster,disconnectsintruder
Chr1
Short,burlyhumanoidin
metal
armour.
Aglow
ingvisorissituated
abovesnarling,
ca-
nine
jaws.
Canis
Ma-
jor/Minor
45
610
Detectentry,alertsow
ner
BB
Large
steelstatue
ofadog/acomputerised
chihuahua.
Cry
Baby
44
430
"Tags",adds
4to
traces
whencopied
Chr3
Noneuntilactivated,
then
itappearsas
ababy,hangingaround
theNetrunner'sneck,
scream
ing.
Clairvoyance
44
720
SeeYa3.0,detectsandIDsIcons(+
invisibles)within2sub-
grids
Chr3
The
eyes
oftheNetrunner'sicon
glow
�ery
blue,or
apairof
glow
ingeyes
appear
ifthe
icon
hasnone.
DataRaven
56
1000
Detectsentry,traces,alertsmasterwhenevertarget
appears
BB
Metal-platedblackbird.
Fang
46
1300
Detectsentry,traces,disconnectstarget
untildestroyed
BB
Glowinggreenpitbull.
Fang
2.0
56
1600
Detectsentry,traces,disconnectstarget
untildestroyed
BB
Roboticpitbullwitharedhead.
Fetch4.01.1
35
700
Detectsentry,traces,alertsmaster
BB
Chrom
egreyhoundwithglow
ingblue
collar.
Guard-Dog
45
720
Invisible;detectsentry,alertsmaster
Chr1
Detected
itappearsas
astandard
Blood-
hound,
otherwiseitisaslight
�icker
atthe
peripheryof
vision.
HiddenVirtue
31
280
Detects"real"things
inVR
CP20
Glowinggreenring
which
theNetrunnerlooks
through.
Hunter
55
900
Detectsentry,traces,alertsmaster
BB
Hound
head
lungingdownthetarget'sline.
Looking
Glass
1-6
3250+
20/strDetectsdisguisedIcons
Chr3
Series
ofmirrors
appearsin
frontof
the
Netrunner,p
assing
over
andthroughthetar-
geticon.
Mouse
55
350
Creepsinto
fortsandmakes
arecord
ofwhat'sinside
BB
Small,innocuousmouse.
NetspaceInverter
3/5
4540
Travelsthroughafort
at2subgrids/turnIDingprograms
and�les
BB
Flyingeyeball;turnsinvisiblewhenactivated.
PitBull
26
780
Detectsentry,traces,disconnectstarget
untildestroyed
CP20
Short,heavily
built,steeldog.
Ithasglow
ing
redeyes
andwearsacircletof
redneon.
......
......
......
....
Instant Netrunning � Netrunning Softwares 11/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Rex
36
1000
Detectsentry,traces,disconnectstarget
untildestroyed
BB
Rathernasty,metalplated
dogwithreallybig
teeth.
SeeYa
31
280
DetectsInvisibleIcons
CP20
Shimmeringsilver
screen.
Shadow
43
540
Degradesevasionprograms
Chr3
Netrunner's
icon
gainsa
long,humanoid
shadow
.Sm
arteye
34
620
Detectsprogswithin10
spaces,IDsattack
progs
Chr1
Spinning
crystalball;
theballstopsandthe
appropriateicon
appearswithin.
Speedtrap
44
600
Detectsattack
programswithin10
spaces
CP20
Flat,glow
ingplateof
glass,in
which
images
appear.
Watchdog
45
610
Detectsentry,alertsow
ner
CP20
Large,black,
metal
dog.
Ithasglow
ingred
eyes
andaspiked
metalcollar.
Anti-System
Asp
42
800
Killscyberdeckinterface
BB
Glowinggolden
snake.
Cascade
74
900
Erases2D
6MUof
random
mem
ory
Chr3
Show
erofrandom
neon-colouredpods
&cap-
sulessprays
thetarget's
icon
andareab-
sorbed
oncontact.
Cascade
II3
2800
20%
chance
that
program
changes.
Decks
chose
new
prog/turn
BB
Floatingballof
energy.
Clown
35
1130
Disruptsdata
transm
ission,progsare-1
STR,'runners
-1Initiative
BB
Annoying,
loud,obnoxious,
white-faced
cir-
cusclow
n,completewithslapstick,
seltzer
bottle,pies,etc.
DecKRASH
42
600
Crashes
'deckfor1D
6turns
CP20
Cartoon
stickof
dynamitewithfuse.
Feedback
43
960
Killsdeck'sinterfaceand"jam
s"'runnerplugs
I.3
Beam
oforange
neon
which
shoots
from
the
Netrunner's�ngertips.
Flatline
32
570
Killscyberdeckinterface
CP20
Beam
ofyellowneon
which
shoots
from
the
Netrunner's�ngertips.
Fragmentation
Storm
43
1000
Killssystem
RAM
BB
Hugewhite
electricalarcthat
strikesthetar-
getandfollowshislineback
tohisdeck.
GridWave
78
20K
DistortsI-Galgorithms
Chr4
Black
sphere
withtwisting
light
waves
sur-
rounding
it.
HellBurner
65
1000
Destroystarget
CPU
Chr3
Giant,disembodied
�stwhich
burnswith
blue,fractal�re,grabsonto
target,engul�ng
itin
blue
�ames.
Krash
32
570
Crashes
closestCPUfor1D
6+1turns
CP20
Large,cartoonanarchistbomb,
withasiz-
zlingfuse.
Murphy
32
600
Causessystem
torandom
lyactivate
programs
CP20
You
neverknow
......
......
......
.......
12/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Piin
theFace
54
800
Makes
CPUcalculatePi
Chr3
Large
cartoonpie,forthrowing.
PoisonFlatline
22
540
Killssystem
RAM
CP20
Beam
ofgreenneon
which
launches
from
the
Netrunner's�ngertips.
Poltergeist
53
660
Randomly
erases
one�leeach
turn
BB
Random
�ashes
ofenergy
from
everyw
here,
wipingdata
and�les.
Pox
42
800
Causesaglitch
inam
bush
ICE,30%
chance
ofderezzing
BB
Floatingballof
energy
that
explodes
into
awashof
sickly
coloured
globules.
ScatterShot
43
660
Killssystem
RAM
BB
Shotgunshooting
fractalshot.
Swarm
17
3000
Causestarget
system
toreplicateSw
arm
programs
Chr4
Cartoon-y
beethat
�ies
towards
aCPU,
stinging
it.
Typhoid
Mary
68
2400
In�ltrates
'runneranddeletes�les
Chr3
FemaleKiller
robot.
Weed
23
630
-1target
speedpersuccessful
attack
Chr4
Tangled
weeds
grow
ingon
theicon
ofthesys-
tem'sCPU(s).
Vacuum
53
1200
Attacks
location
algorithms,forces
'runnerto
where
heen-
teredfort
BB
Seriesofhexagonalframesthat
suck
the'run-
ner'sIcon
outof
thedata
fort.
Virizz
42
600
Tiesup
1system
action
untilturned
o�or
destroyed
CP20
Glittering
DNA
shapemadeof
lightsand
neon.
Viral15
42
590
Randomly
erases
one�leeach
turn
CP20
Swirlingmetallic
blue
fogwithawhite
neon
DNAhelix
embedded
inthecentre.
Evasion/Stealth
Black
Mask
1-5
3-4
200/ST
RMakes
your
Icon
look
likesomething/one
else
NET
Anythingprogrammed
into
it.
Cloak
52
2000
Pow
erfulvariantof
Invisibility
BB
Makes
theuser'sIcon
invisible.
Dom
ino
53
1500
Makes
your
Icon
look
likeonecommon
tothelocale
BB
Depends
onthedata
fort.
George
41
300
Adds4to
Trace
Di�culty
Chr3
Cartoon
signpost
withsignspointing
inall
directions.
Invisibility
31
300
Makes
cybersignalinvisible
CP20
Flickering,iridescentsheet,which
drapesover
theNetrunner.
Open-Ended
Mileage
45
330
AddsanotherLDLto
maketraces
harder
whenactivated
BB
Bluespheresurrounded
bytwostylized
light-
ning
bolts.
Rabbit
5/1
2360
Drawso�
"Dog"programs,+2Initiative
whenreleased
BB
Fractalrabbit
goingliketheblazes.
Also
BugsBunny
variantsaround.
Replicator
3/4
2180
ConfusesattackingICEwithmillions
offalsesignals
CP20
Chrom
esphere
creating
millions
ofholo-
graphicimages
oftheNetrunner.
Signpost
41
300
Adds4to
Trace
Di�culty
BB
Signpostwithsignspointing
inalldirections.
Silhouette
64
600
'Runnerlookslikehe'sjacked
outandisinvisiblefor5turns
I.3
Looks
asittheNetrunner
hasjacked
out.
Spore
77
2320
AIsuicide-replication,
sendsmultiplecopies
into
Net
tore-
produce
NET
Eachsporelookslikeasm
allmoteof
light.
......
......
......
....
Instant Netrunning � Netrunning Softwares 13/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Stealth
43
480
Mutes
cybersignal,makingdetectionharder
CP20
Sheetofblackenergy
draped
overtheNetrun-
ner'sIcon.
Superballs
34
500
Distractstargets,causing-3
Initiative
Chr4
Thousands
ofprimary-coloured
rubb
erballs
bouncing
around
target's
square,as
ifin
aglasscube.
Vew
yVew
yQuiet
42
400
Concentrateson
avoiding
detection
BB
The
'runner
makes
nosound
and
turns
translucent.
Protection
Arm
or4
2170
Reducesattacksfrom
Stun,H
ellbolt,Zom
bie,etcby
3points
CP20
Glowinggolden
armor
inahigh
tech
design.
DeckShieldOne
62
320
Adds+3to
deck'sDataWalls
Chr4
Deck's
data
fort/position
innetspace
issheathed
infractalarmor-plating.
Flak
4/2
2180
Creates
static
Wallto
blindattackers;ST
R2vs
Dog
pro-
gram
sCP20
Cloud
ofblinding,glow
ing,
multicoloured
lights,swirlingin
alldirections.
ForceShield
42
160
Stopsattacksagainst'runner
CP20
Flickering
silver
energy
barrier.
Joan
ofArc
32
190
Rem
ains
"active"
andtakesdamagemeant
forcurrentpro-
gram
BB
Wom
an'sface
that
grimaces
inpain.
OutJack
24
150
Jacks'runneroutof
Net
ifhe'stakenCriticaldamage
Chr3
None.
Re�ector
52
160
Re�ectsStun,Hellbolt,Knockoutattacks
CP20
Flare
ofblue
greenlight,coalescing
into
amirroredbowl.
Shield
31
150
Stopsattacksto
'runner
CP20
Shiftingcircular
energy
�eld
appearingin
frontof
theNetrunner.
Anti-Program
Aardvark
43
1000
Detectsanddestroys
Worms
CP20
Matrixof
thin
yellowneon
lines,which
close
around
theWorm,then
dematerialisewithit
trapped.
Banpei
15
1280
1D6to
program
STR
BB
Roboticsamurai.
Black
Dahlia
77
2000
Interactive,super-realisticKiller.2D
6damage
BB
Incredibly
seductive
wom
anin
ablack
eveningdress.
Bunnies
43
440
Overloads
Vam
pyres
Chr1
Rapidly-m
ultiplying
bunchofburnishedgun-
metal
coloured
bubbles,withclassic"rabbit
ears"antennae.
Chameleon
46
1650
Killer
IVwithactive
Disguise
NET
Killerwithapolishedmirrorface
that
re�ects
theIcon
oftheprogram
itisattacking.
Codeslinger
43
2500
Killer
written
to�t
lessMU.1D
6damage
BB
Cow
boywithsix-shootercodeguns.
D'Arc
Knight
35
1360
1D6to
program
STR
BB
Svelte
knight
inarmor.
......
......
......
....
14/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
DataNaga
65
1480
1D6to
program
STR
BB
Exoticwom
anwithaserpentine
lower
torso
andsixarms.
Dogcatcher
107
1176
Chasesanddestroys
tracing"D
ogs"
Chr3
Basicmaleor
femalehumanoidshapecarry-
inganeton
apole.
Dragon
43
960
Attacks
andderezzes
Dem
ons
CP20
Great
golden
dragon
robot,wreathedin
elec-
tricaldischarges.Laserbeam
sshootfrom
it's
eyes.
Dropp
44
800
1D6damage,andjacksthe'runneroutof
thesystem
BB
Arippleacrosstheimmediatearea
likeadrop
inapond.
Eradicator
8/5
71600
Actsas
Killer
V,destroys
AISp
ores
NET
Glowingam
oeba
withhuge
jaws.
Exorcist
43
600
Rem
oves
e�ectsof
Possession
Chr3
Fractalpriest
infullregalia,carrying
alarge
religious
symbol.
Hydra
33
920
Attacks
andderezzes
Dem
ons
CP20
Glittering
blue
fogthat
encirclesitstarget
anddematerializes
it.
IcePickWillie
25
1320
1D6to
program
STR
BB
Classic'30s
gangster
hitm
an.
Killer
II2
51320
1D6to
anyprogram
STR
CP20
Large
manlikerobot,
dressedas
ametallic
samurai.
His
eyes
glow
redandhe
carries
aglow
ingKatana.
Killer
IV4
51400
1D6to
anyprogram
STR
CP20
Large
manlikerobot,
dressedas
ametallic
samurai.
His
eyes
glow
redandhe
carries
aglow
ingKatana.
Killer
VI
65
1480
1D6to
anyprogram
STR
CP20
Large
manlikerobot,
dressedas
ametallic
samurai.
His
eyes
glow
redandhe
carries
aglow
ingKatana.
Loony
Goon
14
900
1D6damage.
Strength
0to
defend
againstotherKillers
BB
Cartoon
characterof
the'runner'schoice.
Manticore
23
880
Attacks
andderezzes
Dem
ons
CP20
Huge,
lionlikeshape,
draw
nin
red
neon
schematic
lines.
Alargescorpion
tailarcs
over
oneshoulder.
Mirror
54
1200
ReboundsHellbolts
Chr4
Large,square
mirror�oatingin
frontof
the
'runner.
The
bolt
goes
inthen
comes
out
again.
Ninja
55
1520
InvisibleKiller
Chr4
Whenseen
itappearsas
aninjacarrying
aglow
ingsword.
Orion
77
6240
TracksSp
ores,'runners,&programs.DestroysSp
ores
I1.3
Pow
erfulm
anor
wom
anwithbowand�ying
platform
oran
angelwithwings
anddivine
radiance.
......
......
......
....
Instant Netrunning � Netrunning Softwares 15/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Possessor
43
1000
"Possesses"programs
Chr3
Hoodedrobe,withnothinginside.Robewill
coveranotherIcon,which
canbe
seen
inthe
hood.
Raptor
2-6
31900
Killer
that
strikesat
range,1D
6damage.
+80eb/levelover
2BB
Realisticfalcon
which
swoops
downup
onit's
prey.
Raven
54
1000
"Blinds"anyprograms
Chr3
Raven
that
attemptsto
peck
outtheeyes
ofthetarget.
SentinelsPrime
55
1440
1D6to
program
STR
BB
Goldenhumanoidwithabiggun.
Shaka
45
1400
1D6to
program
STR
BB
Zuluwarrior
withspearandshield.
Snow
ball
2+5
3000
1D6damage,
+2ST
Rforeach
program
itdestroys
while
active
BB
Snow
ballthat
grow
sin
size
foreach
program
itdestroys.
Start-UpIm
mola-
tor
45
1280
Destroystarget
ifused
intheroundwhenprogram
was
rezzed
upBB
Boltof
�amethat
shoots
from
the'runner's
mouth
andburnsthetarget
program
toash.
Triggerman
45
1480
1D6to
program
STR
BB
Film
noire-styledetective.
Wildcard
13
1400
1D6to
program
STR
BB
Representation
oftheold
Caponeganger
"Wild
Card".
Wolf
46
1500
Killer
disguisedas
Watchdog
Chr1
Identicalto
theWatchdogicon,except
that
itwill
�ash
entirely
redas
itattacks.
Anti-Personnel
BallandChain
33
5000
Slow
s'runnersmovem
entto
1square
for1D
6+3turns
Chr3
Classicprisoner'sballandchainclam
pedto
somepartof
thetarget
icon.
BolterCluster
44
8000
Pow
erfulHellboltthat
does
4D6damage
BB
Wickedlookingturret
springsforthto
blast
thetarget.
Brainwipe
34
6500
Reduces
INTby
1D6/turn,killing
'runner
CP20
Acid-greenelectrical
arc,
which
leapsfrom
the�oor
andengulfs
andkills
the'runner.
Cerebus
68
9500
PitBullthat
shootsHellbolts
NET
Dark,
metallic
dogwith2heads.
One
�res
Hellbolts
from
itseyes,theotherhowlsas
itpursuestarget.
Cinderella
64
9000
High-powered
Firestarter
BB
Lovelywom
anwithgreenglow
ingeyes,in
18th
centuryballgown,Anythingshetouches
ignites.
CodeCorpse
54
7500
Reduces
INTby
1D6/turn,making'runnermindless
BB
Skeleton
inacloakwithascythe
attacksthe
target.
CorticalScrub
34
6500
Reduces
INTby
1D6/turn,killing
'runner
BB
Green
globethat
send
outelectricalarcs.
DataDarts
34
5500
Hellboltvariantthat
does
3D6damage
BB
Swarmofredglobes
that
strike
atthetarget.
FatalAttractor
77
10750
AttractivelydisguisedHellhound
Chr1
Attractiveyoungwom
anin
askintightbody-
suit.DIFFSysKnowto
recogniseher.
......
......
......
....
16/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Firestarter
44
6250
Pow
ersurgeelectrocutes
'runner
CP20
Blazing
pillar
of�re,
which
speaks
the
Netrunner's
name
ina
hissing,
boom
ing
voice,then
leapsat
him.
Glue
54
6500
Locks
'runnerin
placefor1D
10turns
CP20
Shiftingpatternofredshapes�ickeringacross
the�oor
toentangletheNetrunner.
Hellbolt
44
6250
1D10
physicaldamageto
'runner
CP20
Bolt
ofcrimson
�re
launched
from
the
Netrunner'sraised
hand.
Hellhound
66
10,000
Trackstarget,waits,causes
heartattack
CP20
Huge,black,metalwolf.It'seyesglow
white,
and�reripplesover
itsbody.Repeats
the
'runner'sname.
Hom
ewrecker
54
8000
High-powered
Firestarter
BB
Fiery
electricalarcthat
shootsat
thetarget's
eyes.
Jack
Attack
33
6000
'Runnercan'tlogo�
for1D
6turns
CP20
Pairof
glow
ingschematic
handcu�s
encir-
clingtheNetrunner'swrists.
KingTrail
32
3500
Leavesglow
ingtrailbehind
'runnerfor3D
6turns
NET
Glowingyellowbanana
slug.
Knockout
43
6250
Causescomafor1D
6hours
CP20
Yellow
neon
schematic
boxerappearsand
strikesoutat
theNetrunner'sIcon.
Liche
44
7250
Erases'runnersmem
oryandover-writespersonality
CP20
Metallic
skeleton
dressed
inblack
robes.
Grabs
the'runnerin
itsgraspanddragshim
underthe�oor.
Masti�
56
12000
Tracks&
tags
target,does
1D6damageandreducesINT
1D6
BB
Glowingblue
masti�withahuge
spiked
col-
lar.
NeuralBlade
34
6750
1D6physicaldamageto
target
BB
Glowing,rune-etchedbroadsword.
PepeLePue
65
7750
Reduces
'runnersINTandREFfor1D
6+1turns
NET
Cartoon
skunkthewraps
around
theNetrun-
ner'sIcon.
Psychodrome
4(5)
1114000
Unconscious
for1D
6hours,scares
victim
Chr1
Disguised
assystem
.'Runnerisplaced
invir-
tual
room
offaceted,
mirroredwallsdisplay-
ingtorture.
Red-Out
54
6750
Paralyses
'runnerfor1D
6turns
Chr4
Shiftingcontexturalhaze
ofredpixels
that
descend
onthe
Netrunner;
changing
the
colour
ofhisIcon.
Shock.r
45
6300
Freezes'runnerfor1D
6turns
BB
Goldenboltfrom
theNetrunner'spalm.
Sleeper
64
7250
Non-lethalBrainwipe,makes
target
doatask
(di�
20-30to
resist)
I.3
Electricalarc,w
hich
leapsfrom
the�oor
and
engulfs
the'runner.
Spazz
43
6250
Halves'runnersREFfor1D
6turns
CP20
Nimbusof
electrical
energy
surroundingthe
target.
......
......
......
....
Instant Netrunning � Netrunning Softwares 17/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Stationery
46
10000
Prevents'runnerfrom
movingfor5turns
Chr3
Piecesof
paper,
with'You'reNicked!'
onthem
,appearsin
asort
ofsnow
storm
over
theNetrunner.
Stun
33
6000
Freezes'runnerfor1D
6turns
CP20
Boltofblue
�amestreakingfrom
theNetrun-
ner'sopen
palm.
Sword
34
6750
1D6physicaldamageto
target
CP20
Glowingenergy
katana.
The
AudioVirus
55
8000
Reduces
INTandREFuntil'runnerdestroys
program
Chr4
Photo-realistic
stereo
system
,which
will
trem
bleandvibratefrom
thenoiseitmakes.
Threat
56
7000
Makes
'runnerso
nervoushe
jacksout
Chr3
Any
minor
o�ensive
ordefensiveprogram.
Setat
timeof
purchase.
TKO2.0
43
6250
Causescomafor1D
6hours
BB
Chrom
eboxerwho
smacks
thetarget
witha
nastylefthook.
Werew
olf
66
13,000
InvisibleHellhound
NET
Nonenorm
ally,butastylishwolfin
asuit
whenrezzed.
Zom
bie
54
7500
Reduces
INT1D
6/turn,making'runnermindless
CP20
Shrouded,skeletal
form
,envelopedin
stink-
inggrey
mist.
Itlunges
outandrips
the
Netrunner'shead
o�.
Multi-Purpose
APicture'sWorth
26
1200
Hides
data
withinVRs
Chr4
Slot
machine.
Data�owsin
though
coin
slot,m
achine
spinsajackpot,scrambled
data
poursinto
MU.
AlBoon
1D6
73600
GoesthroughGates,d
oes1D
6damageto
Walls&programs
BB
Stream
offractalcode
that
rapidlycoalesces
into
afractalsolid.
Black
Sky
58
4480
Hides'runnerinacloudwhich
attacksprogramswith"light-
ning"
Chr3
Black
cloudwhich
form
sbetweentheenem
yprogram
andtherunner.
Blink
57
1500
1D6damageto
Walls
andprograms,
goes
throughGates.
50%
rel
BB
Swirlingcloudof
fractalcode
that
coalesces
into
arandom
fractalsolid
(whenitworks).
Orblow
sup.
Dum
my
12
450
Fake,disguisableprogram
Chr3
Smallspinning
chromepyramid
that
re�ects
theIcon
ofanyprogram
itencounters.
EvilTwin
87
2700
Com
bination
Shield/K
rash
Chr3
The
Netrunner'sIcon
seem
sto
�yaround
inlargearcs.
IGOR
47
4800
On-line�unky
Chr4
Classic"m
ad-scientist's"assistant;complete
withlabcoat
andhunchback.
Lightning
Bug
26
1540
6"bugs"
that
killICEbefore
itcanattack
NET
6motesoflight
that
slow
lyalternatebetween
redandwhite.
The
motes
lazily
circle
the
Netrunner.
......
......
......
....
18/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Omnivore
38
18500
Derezzesprograms,friesCPUs,temporarilyreducesINTby
2D6
Chr3
Whirring,
buzzing,
screeching
ballof
blades
which
careensinto
itstarget
andthoroughly
mangles
it.
SatchelCharge
87
18500
5D6damageto
'runner&
progsin
1subgrid,
3D6to
Walls
&Gates
SWAbombin
abackpack.
Scribe
68
NA
Stopsanddisassem
bles
programsforcopying.
Program
roll
47+
Chr4
Cow
ledchromemonkwithfeatherpen.
Wolfpack
68
15200
Does1D
6damageto
ICE/D
emon
STR,1D
10damageto
'runners
Chr3
Pack
ofelectrically-charged
wol�ike
form
swhich
pounce
upon
theirtarget,rippingit
apart.
Controller
CrystalBall
41
140
Operatesvideocameras,remotesensors,etc
CP20
None.
Dee-2
31
130
Operatesrobots,cleaning
machines,autofactories,etc
CP20
None.
Genie
51
150
Operatesdoors,elevators
CP20
None.
Hotwire
31
130
Operatesremotevehicles
CP20
None.
Knevil
43
220
Limited
AIvehiclecontroller,no
safeguards
Chr3
Wildly-dressed
motorcyclist,
with
madly
glinting
eyes.Hegrabstheremote'sicon
and
begins
movingit.
New
sAt8
41
140
Allowsaccessto
DataTerms&Scream
sheetsviatheNet
CP20
None.
OpenSesame
31
130
Weakerprogram
tooperatedoors,elevators
CP20
None.
Phone
Hom
e5/2
1150
Can
place/receivecalls
while
intheNet,caninterceptat
STR2
CP20
None.
Rockerbit
42
200
Limited
AImicrophone/voxbox
controller,broadcastat
pre-
settime
Chr3
Cartoonish
Rockerthat
hangsaround
the
speakerremoteand'yells'into
itas
appro-
priate.
Soundm
achine
41
140
Controlsmikes,speakers,vocoders,etc
CP20
None.
Terminator
42
260
Controlterm
inals
Chr3
Adisembodied
cyberarm
begins
typing,w
rit-
ing,
ordraw
ingon
theremoteicon
inques-
tion.
Viddy
Master
41
140
Allowscontrolof
videoboards
CP20
None.
WADController
21
150
Di�culty10-35to
patchinto
signal
Chr3
None.
Utility
Alias
62
160
Replaces�lenamewithfalseone
CP20
None.
Backup
41
140
Usedto
copy
programs
CP20
None.
Baedeker's
Net
Map
21
130
Routescalls
public
2or
3dataterm
numbers.+3System
Know
BB
AgreenlineextendingacrossaNet
map.
......
......
......
....
Instant Netrunning � Netrunning Softwares 19/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Bakdoor
32
600+
Routeslinkthroughat
leastoneprivatesystem
BB
AgreenlineextendingacrossaNet
map.
Breadcrum
bs4
4290
Finds
newLDLlinkroutes
(legally),1roundperuplinkor
LDL
NET
Lineof
glow
ingsparks
form
ingatrail.
Butcher
Boy
37
550
Creates
apapertrail,whilstfunnellingfundselsewhere
BB
Takes
theappearance
ofasystem
accounting
program.
Cartographer
63
200
STRvs
CPUINT/2
formap
ofdata
fort,m
ustbe
runinside
thefort
Chr3
None.
Databaser
82
180
Stores
upto
10,000
pagesper�le
CP20
None.
Dolphin
Pro-
gram
s3
5310
Clean
Paci�ca
ofjunk
data
NET
Sleek,
chromedolphin.
ElectroLock
72
170
Locks
�les
atST
R3
CP20
None.
Expert
Schedule
An
43
250+
Skims�les
at1M
Uperturn.Shelflifeof
amonth
BB
Noneneeded,butmight
appear
asahu-
manoidicon
that
leadsyouto
the�les
you
requested.
Filelocker
41
140
Locks
�les
withcode
word,
equalto
STR5CodeGate
CP20
None.
File
Packer
41
140
1/2MUsize,2turnsto
unpack
CP20
None.
Flare
Gun
22
300
Message
travels3spaces
perturn
for2D
6turns
Chr3
Big-barrelled�are
gun.
Flip
Switch
2.0
100
225
Flip
Switch
controller,-5
Net
Initiative
whenactive
Chr3
None.
Flip
Switch
3.0
100
250
Flip
Switch
glogocontroller,3settings
BB
None.
GateM
aster
51
150
Anti-virus,detects&destroys
Virizz&Viral15
CP20
None.
GuestBook
42
200
Detects'runnerswithin2squares,treatas
STR3CodeGate
Chr4
Anold-stylehotelguestbook
andquill.
InstantReplay
82
180
Records
'runnerstrip
CP20
None.
Mictotech
AIIn-
terface
24
330
Pseudo-AIthat
scans�les
lookingforkeyw
ords
BB
Floatinghollowmask.
Multinetter
1020
2000
Allowsmultiple'runnersto
runthroughonecomputer
Chr3
None.
Multi-Tasker
56
1140
Extra
actionson
mainframes
NET
None.
Mystery
Box
54
300
Searches
forandcopies
programsfrom
�les
BB
Cartoon
boxwithstrangegearsandwidgets
oneach
surface.
NetMap
41
140
Major
region
locatormap,+2to
System
Knowledge
CP20
None.
New
sgroup
Filter
44
200
Goesoutandskimsnewsandinterest
groups
forspeci�ed
info
BB
AsimpleIcon
oftheuser'schoice.
Padlock
42
160
Accesscode
needed
tologonto
deck
CP20
None.
Re-Rezz
31
130
Recom
pilesdamaged
programsand�les
CP20
None.
R&D
Protocol
Files
43
250+
SkimsR&D�les
at1M
Uperturn.Shelflifeof
twoweeks
BB
Noneneeded,butmight
appear
asahu-
manoidicon
that
leadsyouto
the�les
you
requested.
......
......
......
....
20/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Shredder
Uplink
53
250
Reconstructs�les
intheTrash
bu�er
BB
Janitorprogramwho
ri�esthroughthepieces
inside
atrashcanandpulls
outcomplete�les.
Translator2000
42
240
Takes
pictures
tomakevirtualobjects
Chr4
None.
ZetatechInstaller
11
300
Com
pressesprogramsto
halfsize
butreducesSp
eedby
1BB
'Tronnichumanoidupperbody
mounted
ina
roundmetallic
base,w
hofeedsprogramsinto
base.
Demons
AfreetII
34
1160
Carries
3programs
CP20
Tall,powerfulblackman,dressedin
evening
clothes,wears
afezandspeaks
inaform
al,
deep
voice.
BalronII
55
1240
Carries
4programs
CP20
Huge,male�gure.
Dressed
infuturisticblack
armor.Carries
aredglow
ingenergy
blade.
ImpII
33
1000
Carries
2programs
CP20
Small,
orange
sphere
oflight,with
two
amused
lookingredeyes.Beeps,whistles,&
pings.
Reaper
57
12500
Seeksout&
destroys
usersin
asetarea.
1D6to
'run-
ners/progs
SWClassicGrim
Reaper,completewith�aming
sickleandcloakmadeof
outerspace.
Soulkiller3.0
745-
4000+NA
1D6INT
loss/to
DataWalls&
programs,-4
todetect,3
actions
SWSw
irlingvortex
that
speaks
inahigh
crys-
talline
voice,andsucksthe'runnerinto
it.
Succubus
II4
41200
Carries
4programs
CP20
Voluptuous,nude,hairlessfemale,madefrom
shinychromemetal.Has
largebatlikewings,
blue
eyes.
Thug
36
10440
Permanentsubroutines,1D
6damageto
programsand'run-
ners
Chr3
Genericcartoonthug.
Vam
pyre
II6
72300
Can
absorb
upto
6programs
Chr1
Figurein
grey
robes,
withgolden
eyes,&
fangs.
Transform
sinto
misty
cloudthat
dis-
solves
othericons.
Daemons
Boardwalk
37
1080
Records
messages
and
conversation
inadmin/budget
database
BB
Stylized
porcupine-likeshapethatinvadesthe
database.
Cockroach
57
1600
Eats�les,turnsthem
into
morecockroaches
BB
Smallcockroach-likeimagethat
multiplies
acrosstheface
ofthedatabase.
Cream
Pie
77
1715
Carries
3programs(PoisonFlatline,Killer
IV,&Murphy)
BB
Acream
pie.
DeepThought
37
1080
Records
messagesandconversation
inresearch
database
BB
Darkdepression/holethat
slow
lyworks
it's
way
into
thedatabase
(whenit's
visibleat
all).
......
......
......
....
Instant Netrunning � Netrunning Softwares 21/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Eavesdropper
36
1365
Carries
Databaser.Records
messagesandconversation
insystem
BB
Nonespeci�c,it'ssupp
osed
toblendin.
FaitAccom
pli
37
570
Subtly
messesup
project�les
BB
Cloaked
andhooded
man,withaglimmer
ofasinister
smirkunderthehood.
FalseEcho
26
380
Triggersfalsesystem
alerts
BB
Shimmering"hologram"mirrorimageof
the
'runner.
Gremlins
47
7000
Producesmoregrem
linsandrandom
lyshootso�
programs
BB
Littlegreen
men
runningaround
carrying
monkeywrenches.
ISpy
36
400+
Com
mercialversionof
Eavesdropper
BB
Hollowmaskwithpiercing
light-beam
eyes.
Incubator
26
760
Reproducesotherprograms
BB
Translucent
pyramid
withthenucleusof
an-
otherprogram
alwaysgrow
inginside
it.
Pattel's
Virus
67
2200
Weakens
1type
ofICE
BB
Swirlof
hundreds
ofcrystalline
fragments.
Skivviss
47
1320
In�atesprojectcosts,so
that
they
getcancelled
BB
Bulbous
chromerobotwithfour
armsthat
actas
a�ndersubroutine
while
corrupting
data.
Ambushes
Chimera
54
100,000
Invisibleanti-dem
on.Ifundetected
itgetsafree
turn
toact
BB
Fully
animated
chimerawhich
breaths�re
andchokinggasat
thetarget
demon.
Soulkiller1.0
4NA
500,000
Drainstarget's
intellect,etc(1D6INT/turn)
into
adata
matrix
BB
Swirlingvortex
that
speaks
inahigh
crys-
talline
voice.
The
vortex
sucksthe'runner
into
it.
Trap!
4x3
NA
200,000
3Asp
programshidden
ina�leor
node
that
attack
ifunde-
tected
BB
Three
Asps�owingoutof
the�le/node.
Systemware
CloakMore
65/cpu4000/cpu
Cloaksan
entire
data
fort.Neutralizes
1INT/C
PU
NET
None.
Dazzler
514
14800
Disguised
VR
"cell"
withtrace,
di�15-25Interfacerollto
detect
Chr3
Usually
disguisedas
apieceof
system
archi-
tectureor
simpledefenceprogram.
Monitor
47
950
RovinginternalNet
security
NET
None.
Panzer
87
20000
Monitor
that
does
1D6damageto
'runnersandprograms
BB
Big
computergeneratedtank.
Often
cus-
tomised
byin
Corpdata
forts.
PocketVR
413
13000
Disguised
VR
"cell"
withtrace,
di�15-25Interfacerollto
detect
BB
Usually
disguisedas
apieceof
system
archi-
tectureor
simpledefenceprogram.
Too
ManyDoors
33
1000
Gives
'runnerachoice
ofdoors,disconnected
ifwrong
one
chosen
BB
Junction
of3or
moreaccess
routes.These
"doors"canbe
unlabelled,
labelledidenti-
cally,or
wrongly.
......
......
......
....
22/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Data
Walls
DataWall
1-10
-1000/levelBasicDataWall.ST
R=CPUs+
0to
+9(m
ax10)
CP20
Standard
DataWall.
DataWall2.0
+1
-1000
FlashyDataWall.ST
R=CPUs+
1BB
Picketfence.
Wallof
Static
+2
-2000
FlashyDataWall.ST
R=CPUs+
2BB
Shiftingwallof
static
surroundingthedata
fort.
CrystalWall
+3
-3000
FlashyDataWall.ST
R=CPUs+
3BB
Crystallinewall.
FireWall
+4
-4000
FlashyDataWall.ST
R=CPUs+
4BB
Wallof
�ame.
ReinforcedWall
+4
-4000
FlashyDataWall.ST
R=CPUs+
4BB
Verysturdy
lookingconcrete
wall.
RockisStrong
+5
-5000
FlashyDataWall.ST
R=CPUs+
5BB
Hugestonewall.
UpgradedDataWalls
Anti-Program
Wall
1-5
-4800+
Attacks
Intrusionprogramsas
Killer,+160eb/ST
RNET
Looks
likeastandard
DataWall.
Anti-Personnel
Wall
1-5
-30000+
Attacks
'runners,
2-3
Stun,
4Spazz,
5Hellbolt,
+1000eb/STR
NET
Looks
likeastandard
DataWall.
Laser
Wire
+2/2
-34000
1D6damageto
'runner(STR2),goes
inertafter3rounds
BB
Meshoflaserlight
that
reachesoutto
engulf
the'runner.
Razor
Wire
+3/3
-36000
2D6damageto
'runner(STR3),goes
inertafter3rounds
BB
DataWallsthat
cansprout
buzzsaw
blades
toattack
the'runner.
ShotgunWire
+5/5
-40000
2D6damageto
'runner(STR5),goes
inertafter3rounds
BB
Anaimpointappearson
the'runner'sIcon,
atwhich
theWallwill
�reaburstof
neural
feedback.
Wallof
Ice
+6/6
-44000
4D6damageto
'runner(STR6),goes
inertafter3rounds
BB
Huge,brain-likeimageem
ergesfrom
theData
Wallto
bombard
the'runnerwithspheresof
programming.
Superior
Net
Bar-
rier
+1
-300,000
Tighter
coding
makes
them
stronger,di�erenceeasily
noted
BB
UpgradedDataWallshave
atightmatrixwo-
veninto
them
.CodeGates
CodeGates
1-10
-1000/levelBasic
Code
Gates.
Many
variations
exist(Brainware
Blowout)
CP20
Normal
CodeGate,
butvariations
arecom-
monplace(see
BrainwareBlowout).
CorticalScanner
5-
20000
Usesabrainw
aveID
scanner.3Interfacerolls
needsto
pass
BB
Keyholethat
scansyour
Icon.
EndlessCorridor
44
8000
Requirestwopasswords.+3di�to
cracksecond
password
BB
The
Gatelookslikeacorridor
that
justkeeps
goingon
andon
andon.
Encryp
Break-
through
+1
-250,000
Tighter
coding
makes
them
stronger,di�erenceeasily
noted
BB
UpgradedCodeGateshave
atightmatrixwo-
veninto
them
.HauntingInquisi-
tion
8/6
880000
Ifyoufailto
getpastitlaunches
Psychodrome(STR6)
BB
Normal
Gateuntilit
activates.
Thenit's
whateveryour
worstnightm
areis.
......
......
......
....
Instant Netrunning � Netrunning Softwares 23/25
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
Mazer
7-
7000
CodeGatevariant
BB
Looks
likeamaze.
Nerve
Labyrinth
6/4
NA
50000
Ifyoufailto
getpast
itdoes
4D6damageto
the'runner
(STR4)
BB
Green
labyrinththat
seem
sto
draw
inthe
'runnerandsqueezehisbrain.
Shrouded
Gate
1-10
43000+
Makes
aCodeGateinvisible.
+1000eb/1
STR
NET
Invisibleor
disguisedas
aDataWall.
Tutor
3/5
NA
50000
Easyto
crack,
buttags
'runnerso
that
ICEcanbreaklink
(STR5)
BB
Regular
CodeGatethat
givesyour
Icon
atail
which
otherICEcanyank.
Transportation
TrailerHitch
13
300
Adds20%
extraMU,Sp
eed-1
NET
Anopen-topped,
single-exittrailer.
18-W
heeler
14
500
Doubles
remaining
mem
ory(M
U-4),Sp
eed=
1NET
An18-wheeler
trailerwiththeNetrunner's
icon
onthesidesof
thetrailer.
Enhancement
Brain
Buster
46
4500
+4to
INT,+2speed
I.3
User'shead
looksas
it'ssteroids,andhe
ra-
diates
anaura
ofgreatintellect.
Gestalt
97
5600
Upto
3'runnerscancombine
INT,REF,andInterface
I.3
Whateveritwants,afterallitisasuperin-
telligence.
RacheSpecials
Mem
orial
ICE-
breaker
62
1500
Hold4programslikeaDem
on,buteach
program
hasfull
strength
BB
Anon-Euclideancorkscrew.
Bone
44
270
Attracts"D
og"programsfrom
allover
NET
RubberdogBone.
PirateUplink
57
NA
AlertsLDLsto
presence
ofillegalcalls
NET
None.
Rache'sSeeYa
62
NA
Prog15+.IDsIcon
aseither
prog,'runner,or
AI
NET
Shimmering
silver
screen,
show
snothing
(program
),sine
wave
(hum
an),
sawtooth
wave(A
I/PseudoInt).
RiceBurner
22+
NA
+1to
Net
movem
ent,-50%
deck
MU
NET
Japanese-styleracing
motorcycle.
SideWalker
33
NA
Allowsyouto
walkon
thesidesof
theOlympiasidewalks
NET
None.
Succubus
III
74
NA
Com
piler,carries2programs.2D
6anti-personneldamage
SWVeryclosevarianton
SpiderMurphy'sIcon,a
busty,
curvaceous,renditionof
ared-headed
animegirl.
Specials
EmergencySelf-
Construct
430
NA
Converts'runnerto
electronic
entity,roll1D
10+4formax
INT
BB
Swirlingvortex
ofblue
lightning
that
sucks
the'runner'sIcon
intoit;ifsuccessfulthe
Icon
laterem
erges.
Lunch
Moneyâ�
¢3
7145000
Com
piler(assassinto
killit),1D
6physical
damageto
the
'runner
BB
Super-realisticlittlegirlthat
playsinnocent,
then
getsan
evillook
init'seyes
andattacks
the'runner.
......
......
......
....
24/25 Instant Netrunning � Netrunning Softwares
......
......
......
...Type/Name
Str
MU
Cost(eb)Function
From
Icon
SystemConstruction
Antiquated
Rou-
tines
NA
NA
50000
Circa
2013
interface.
All'runnerInitiative
rolls
at-2
BB
Older-styleandmoreprimitiveNet
imagery.
Bizzare
Encryp-
tion
NA
NA
10000
Allsystem
data
isencrypted(STR10
Gate),1-2hrsto
de-
code
BB
None.
Blood
Cat
10/5
NA
300,000
INT6pseudo-AI,ST
R5attacksvs
'runnersandprograms
BB
Dead-blackpantherwith
glow
ingred
eyes
andmouth.
TesseractConstructionNA
NA
100,000
Escherstyledata
fort,-3
to'runnerInitiative
untiluseto
itBB
Fort
Fort's
interior
de�esorientation,
up,
down
and
sideways
constantly
changing,
wallsat
impossibleangles.
Inform
ation
c ©R.Talsorian
Gam
esInc.
Allrightsreserved.
Collatedby
AndrewJames
25/11/[email protected]
New
collation
byGabyWald+AmaelAssour07/09/2012.
Instant Netrunning � Netrunning Softwares 25/25