instant netrunning a fuzion plug-in by christian...

25

Upload: hangoc

Post on 09-Aug-2018

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

Instant Netrunning � A Fuzion Plug-In � by Christian Conkle

([email protected], http://www.europa.com/~conkle)

Introduction

This is a system of rules expanding the hacking rulesfor Fuzion and Interlock. These rules draw heavily onCyberpunk 2020's Netrunning rules and are intendedto be native in a Cyberpunk environment where neuralcyber-interfaces are standard, though they are writtengenerically enough to be useable in a modern setting aswell.

These rules were designed to use existing Cyberpunk2020 equipment and software with little modi�cation.There are several di�erences from the original rules, how-ever, that are intended to speed play and optimize sim-plicity. First, these rules lack a grid. Movement withinthe virtual environment of cyberspace is conceptual. Toconvert applications that give �ranges�, simply apply apercentage chance of e�ectiveness based on range. Sec-ond, these rules incorporate the Power attribute fromother Fuzion games, essentially the equivalent to a com-puter's Intelligence from CP2020. Third, software andmemory no longer needs to be assigned to speci�c CPUs.If the GM wishes, each MU of application and data�lecan be assigned to speci�c CPUs such that if that CPUfails, the application or data�le is no longer available.This process was removed to eliminate extra bookkeep-ing. These rules assume a 3d6 die-rolling mechanic op-tion of Fuzion. If you're playing Interlock, or the Fuzionoption of 1d10, simply replace the 3d6 with a 1d10 dieroll. You won't achieve the same kind of bell curve, butthe results will be su�ciently randomized.

The Net

The Net is a global computer network allowing fastand convenient access to millions of computers fromany other computer on earth or beyond. Any computerconnected to this network has the capability to accessinformation from any other computer connected to thisnetwork regardless of distance or time of day. Whether itis called the Internet, the Web, the Cybernet, the Face,or the Net, all use di�erent special e�ects and technolo-gies to describe the same thing. This plug-in assumes anear-future setting which makes use of a Virtual Realityinterface and gives exciting names to actions and taskswhich can be easily modi�ed to �t a more mundanemodern setting.

All computers connected to the Net are assigned LDL.This LDL serves as a kind of telephone number forthat computer, to which other computers know whereto send information. In a futuristic setting, a VirtualConstruct or Icon may substitute for the LDL. The NetUser connects their computer to a Virtual Reality Inter-face, within which companies pay for space and createelaborate virtual constructs to represent their LDL, theVR equivalent of Internet Portal Sites such as Infos-eek or Yahoo! today. The Net User may now tour thebustling 3D Virtual City regardless of gravity or speed.Corporate virtual constructs are like giant 3D advertise-ments, attempting to entice the average Net User intotheir Virtual Realities to sell products or services. SomeVirtual Realities actually provide useful services suchas information or online software applications. The VRequivalent to modern Websites. These Virtual Realitiesare housed on Dataservers maintained by the respec-tive corporations or institutions. It is the informationhoused on these Dataservers that isn't readily availableto the public that draws the Hacker. Normally, a cor-porate dataserver is openly accessible to the Net public,providing information either to the public or its employ-ees through a variety of interfaces: text-only, text andgraphics (the Web), audio/video, or fullsensory virtualreality (the Net).

However, the value of information available on publicdataserver sites is poor and bland. In addition, access toremote software applications is limited to public-domainapplications.

Datafortresses are the restricted hidden levels of adataserver providing remote access to restricted data orsoftware applciations to authorized users. Security ismaintained through the datafortress' DataWall program.The level of security restriction depends on the value ofthe information or application. Secure information maybe housed on the same dataserver as public information,only hidden in restricted directories, e�ectively invisiblefrom those who lack proper authorization. Authorizationcomes with proper identi�cation. � Identi�cation cancome in many forms: Authorized Net LDLs, passwords,proper interface software, or even biometric data.It is a hacker's goal in life to gain unrestricted accessto restricted information, uncover secrets, make unau-thorized changes to data, or to use a restricted softwareapplication.

Instant Netrunning � Netrunning Softwares 1/25

Page 2: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

When attempting to gain unauthorized access to a cor-porate datafortress, the hacker establishes a legal con-nection to the company's dataserver. Once connected,the hacker has normal access to the free services. Nor-mally, an authorized user will then use an interface pro-gram to gain access to the datafortress. The datafortress'Code Gate program veri�es authorization and allows ac-cess. The hacker attempts to fool the code gate intoauthorizing entry. Should that fail, the hacker may at-tempt to gain entry by disabling the DataWall programprotecting the information.

Once past security, the Datafortress constantly re-checksauthorization through the use of Detection software. De-tection software double-checks the authorization of allthe users connected to the datafortress. If it �nds adiscrepancy or error, it noti�es the Datafortress SystemAdministrator (SysAdmin) who will either attempt todisconnect the hacker, determine the hacker's locationwith a Trace application, disable the hacker's softwarewith an Anti-ICE application, disable the hacker's com-puter with Anti-System software, or physically injure thehacker with Anti-Personnel software. The hacker usesStealth software to fool detection software into eitherauthorizing or ignoring the hacker's connection. If dis-covered, the hacker may �ght back against the SysAdminwith Anti-ICE, Anti-System, or Anti-Personnel softwareof their own.

Should the hacker gain access to the Datafortress' di-rectories, they may view, copy, or alter data. Datacomes in the form of online applications for remote use,inter-o�ce communication, public display data (text,audio-video, or VR), databases, or records.

The Hacker

The Hacker's arsenal includes a computer, specializedhacking software, and, foremost, a way to connect toa remote target computer, usually via the Net thoughdirect connections, however unwise, can be made.

A Hacker's access to the Net is very important. To con-nect to the Net, the Hacker must have an LDL. LDL'scost 50 euro a month from the Internet Corporation,though they, too, can be hacked. Connections betweencomputers are relatively easy to trace. Each computerconnection has a corresponding Trace Value from 1 to10. Hackers generally make a chain of several connec-tions before they proceed to their target computer. ASysAdmin wishing to trace the ultimate origin of theHacker must trace every connection to �nd the source.

The SysAdmin

The SysAdmin is in charge of security for aDataserver/Datafortress. It is their primary job to pre-vent Hackers from illegally gaining unauthorized accessto restricted data. It is their secondary job to catchhackers who have already have.

SysAdmins use their own computers connected to aDataserver/Datafortress to execute software applica-tions. The Dataserver/Datafortress itself uses softwaresuch as Codegates, Datawalls, and Detection softwaredeter and identify hackers, yet allow authorized users in.

A Datafortress is also characterized by its Power and itsSpeed. A Datafortress is also rated by a Security Levelfrom 1 to 10. This number is added as a skill would tothe computer's Power when executing software applica-tions. The computer's Security Level is also it's TraceValue if being used to chain connections. A SysAdmincan't do anything to catch a Hacker if he doesn't knowthey're there, so the SysAdmin relies heavily on De-tection software to notify them of unauthorized access.Once detected, the SysAdmin can run Anti- Personnelsoftware against the intruder, or opt to trace the hackerand run Anti-System software against the Hacker's com-puter.

The Computers

Computers, whether they are Palmtops, Desktops, Mi-nis, or mainframe supercomputers, exist to execute soft-ware applications. The computer is characterized by itsPower and its Speed and its Security Level.

The Power is used like the computer's Body and it'sRe�exes, it determines it's resiliency to attack and itsbase chance to perform an action. Power is based on thenumber of Central Processing Units driving a computer.One CPU has a Power of 3, each additional CPU addsan additional 3. Each CPU costs $10,000. A Computermay have up to 7 CPUs for a Power of 21. AdditionalCPUs increase processing capacity and provide backupsin case one CPU should fail due to Anti-System soft-ware.

A Computer's CPU also determines how much softwareit can run and data it can store. Software and Dataare stored in Memory Units. A Computer can store asmany MU's as it's CPU x 40. Memory can be improvedfor $250 per MU. CPUs also determines the startinglevel of system Datawall. A Datafortress' base Datawallstrength is equal to the number of CPUs driving it.

2/25 Instant Netrunning � Netrunning Softwares

Page 3: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

Computers with Powers higher than 10 are Arti�cialIntelligences with complete personalities and full inter-activity. Power can be decreased for a cost reductionof $3000 per level. A Computer may also possess skillslike a character. Memory can be put aside to use asskills at a rate of 1 MU per Skill Level. In this way, acomputer can devote 5 MU to have a Security Skill of 5.All computer skills use Power as the primary statistic.

The Speed is used to determine initiative. If using theSpeed Chart, it can be used to determine the numberand order of actions in a turn. Speed can be increasedfor $2000 per bonus up to +5.

The Security Level is the SysAdmin's Security skill,added to its Power when resisting attacks. The SecurityLevel is also used to determine a server's Trace Valuewhen using it to chain connections in preparation for arun.

A Computer can respond to hacker's automatically.Once Detection software has identi�ed an unauthorizedintruder, the Computer can automatically execute Anti-Personnel software against the Hacker, or trace the signaland run Anti-System software against the Hacker's com-puter.

A Computer can also be de�ned as a Cyberdeck. Cy-berdecks or Cybermodems are small devices that aresimilar to computers in that they execute programs, butare di�erent in that they are connected to the user'sliving brain and use it's neurological wiring to act asits Central Processing Unit. The Cyberdeck, modernterms, is little more than a hard drive and network con-nection. All input and output is processed by the user'sbrain.

Cyberdecks do not have CPUs, but the user must have aNeural Interface and Cybermodem processor installed intheir brain, the cost of which is $1100 for the hardwareand $500 for the surgery. Cyberdecks provide 10 MU,a Speed of 0, and have a Data Wall strength of 2. Thebasic parts of a cyberdeck costs $1000 for the externalhardware, though this is often marked down to as lowas $500 for a used model.

Computer Hardware Price List

1 CPU $10,000 (Power 3, 40 MU, Data Wall Strength of 1)1 Cyberdeck $1000 (Power 0, 10 MU, Data Wall Strength of 2)+1 CPU $10,000 (Power +3 each, +40 MU each, Data Wall Strength of +1 each, maxi-

mum 7 CPUs)+1 MU $250 (no maximum)+1 Speed $2,000 (maximum of +5)-1 Power -$3,000 (no maximum, but at more than -2 you may as well buy fewer CPUs)

Cyberdecks vs. Computers

In games where cybernetic interfaces are common andolder manual interfaces are uncommon, simply apply a �2 to all actions taken by manual-interface computers. Ingames where cybernetic interfaces are uncommon, suchas the modern world, apply a +2 to all actions taken bycybernetic interface computers.

Successful attacks made against Cyberdecks using Anti-System software will cause the brain to disconnect andbecome unconscious for 1d6 rounds in lieu of the CPU.

The Menu

To simplify using a computer in a game context, a simpleset of commands has been devised. These commands arecalled �The Menu�. A Hacker simply chooses his actionbased on the list available in the Menu.

The Menu

• Log On/O� : Legally gain access to an unre-stricted Dataserver through proper authorizationtechniques (password, LDL authentication, or bio-metrics).

• Run Program: Run either a local or remote soft-ware application.

• Read File: View the contents of a data�le, be itText, Graphics, Audio/Video, or Virtual Reality.

• Copy File: Copy a �le from a remote location toa local one. Warning, a record is kept of each copyin a �le history.

• Edit File: Edit the contents of a data�le above.Warning, a record is kept of each modi�cation ina �le history, including the modi�cation of the �lehistory.

• Erase File: Erase a data�le above. Warning, arecord is kept of each erasure in a �le history, in-cluding the erasure of the �le history.

• LDL: Establish a connection to a Dataserver.Warning, if disconnecting from datafortress, if thestealth roll was unsuccessful, the SysAdmin canstill do a trace on your LDL.

Instant Netrunning � Netrunning Softwares 3/25

Page 4: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

The Software

Software applications are measured by their Strength, which act as a sort of Weapon Accuracy which is added toall tasks performed with that application. Software Strength is rated from 1 to 10.

Software is also measured by how many Memory Units it uses on its host computer. This is cumulative. A com-puter with 30 Memory Units can run one 15MU program and three 5MU programs simultaneously. Switching outa program takes one action.

Software applications can have very speci�c e�ects, depending on the application being used. The most commonand broadly-de�ned applications are as follows:Type E�ect Strength MU Cost

Decryption(Wizard's Book)

Defeats Codegates and File Locks. 4 2 400

Intrustion(Hammer)

Defeats Datawalls. 4 1 400

Stealth(Invisibility)

Defeats Detection Software. 3 1 300

Protection(Shield)

Defeats Anti-Personnel Software. 3 1 150

Anti-System(Flatline)

Causes system to crash. 3 2 570

Anti-ICE(Killer II)

Does 1d6 damage to target software's STR. 2 5 1320

Anti-Personnel(Hellbolt)

Does 1d10 Hits directly to target's body if connected via acyber-jack.

4 4 6750

Firewall(Datawall)

Prevents all access to restricted information. POW � �

+1 +1 +1000Authentication(Codegate)

Allows access to restricted information to authorized users 2 1 2000

+1 +1 +2000Detection(Guard Dog)

Detects unauthorized users, traces signal, and alerts SysAd-min.

4 5 720

Other software found in Cyberpunk 2020 is fully compatible with this system.

4/25 Instant Netrunning � Netrunning Softwares

Page 5: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

Utilities

Utilities are programs that help the Hacker in between runs. Though most don't provide any practical applicationduring the run, they're nonetheless essential applications for the upkeep and preparation of a hacker's computer.

Type E�ect Strength MU Cost

Restore Utility(ReRezz)

Recompiles and restores destroyed programs. 3 1 130

Recorder Util-ity(Instant Replay)

Records activities of current Hack for replay later. 8 2 180

Virus Protec-tion Utility(Gatemaster)

Detects and destroys Virus programs. 5 1 150

File ProtectionUtility(Electrolock)

Locks data�les as a Strength 3 Code Gate. 7 2 170

CompressionUtility(Packer)

Reduces program size by 1/2. Takes 2 turns to unpack. 4 1 140

Backup Utility(Backup)

Creates copies of most programs on chip. 4 1 140

VR Map Util-ity(Cartographer)

Supplies complete system map of VR interface. 6 3 200

Utility Package All of the above in one package. Saves MU and money. 5 10 1000

The GoodsOnce a successful Hacker has bypassed security(Datawalls, Codegates, and Detection software), he nowhas access to the Datafortress' CPU. The Hacker maynow view stored �les (text, video, audio, VR) or runonline software applications. Be warned, individual �lesmay have further security measures attached to them.For example, a �le marked �Black Ops: Top Secret�might have another Detection application attached to itwhich the Hacker must bypass. Or it may be �le-locked.Tampering with any ICE applications automatically re-quires the Hacker bypass a File Protection Utility andany Detection Software.

Common data�les found on corporate datafortresses in-clude:

1. Inter-O�ce Memos (E-Mail)2. Promotional Material(such as VR advertising sims

and Web Pages)3. Business Records (including databases)4. Financial Transactions5. Grey Ops6. Black Ops

CPU's house applications for online use as well. Appli-cations range from simple spreadsheets and word proces-sors to VR Simulations and computer-controlled roboticsystems such as security video surveillance, elevators,building climate-control, assembly robots, etc.

Note on making copies: In the Cyberpunk future,all �les have a �le-history, recording all modi�cationsto the �le. Though modi�cations can be made to the�le-history, the File-history now has a record of themodi�cation. This feature is used to determine the pro-priety of data. For instance, a hacker �nds a �le in theArasaka database called �Black Ops: Top Secret�. TheFile History for that �le will indicate how many timesit's been viewed, by what User, and when. Our Hackerdecides to make a copy. The original now records that acopy was made at this date by this user. The new Copyrecords that it was copied from an original on this dateby this user. Every time the hacker views the material,the record shows that the �le was viewed on this date bythis user. If the hacker wishes to sell this information, aprospective buyer can view the �le-history and see howmany times the �le has been seen, modi�ed, and copiedand by whom. Diluted data will lower the �le's value.

Instant Netrunning � Netrunning Softwares 5/25

Page 6: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

Virgin data will raise it's value. The enterprising Hackercan easily change the File-History, but a record is madethat the �lehistory has been changed, thus lowering thevalue even more. The Hacker can then try to delete therecord of the change, but the deletion of the change isrecorded in the �le-history. It never ends. The safestbet is to just own one copy and not view it.

Standard Hacker Software

Decryption (Strength 4, MU 2, $400)Intrusion (Strength 4, MU 1, $400)Stealth (Strength 3, MU 1, $300)Protection (Strength 3, MU 1, $150)Anti-ICE (Strength 2, MU 5, $1320)Total (MU 10, $2570)

Standard Datafortress Software

1. Mundane SystemsDetection (Strength 4, MU 5, $720)Total (MU5, $720)

2. Grey SystemsDetection (Strength 4, MU 5, $720)Anti-System (Strength 3, MU 2, $570) Grey Sys-tems OnlyTotal (MU 7, $1290)

3. Black SystemsDetection (Strength 4, MU 5, $720)Anti-System (Strength 3, MU 2, $570) Grey Sys-tems OnlyAnti-Personnel (Strength 4, MU 4, $6750) BlackSystems OnlyTotal (MU 11, $8040)

Sample Computers

1. Minor business or personal system (grey info)Statistics: POW 1 (1 CPU, -2 POW) , MU 40,Speed 0, $4000Example: DataTerms, Minor Personal Informa-tion, Palmtops, Portable Computers.

2. Major business (grey info) or personal system(black info)Statistics: POW 3 (1 CPU), MU 40, Speed 3,$16,000Example: Business Accounts, Secret Personal In-formation

3. Major business (black info) or Megacorp sys-tem (grey info)Statistics: POW 6 (2 CPU), MU 80, Speed 6,$32,000Example: Alternative Accounts, Customer SalesInformation

4. Government (grey info), Megacorp (black info)or Criminal system (grey info)Statistics: POW 9 (3 CPU), MU 120, Speed 9,$48,000Example: Police Files, Sabotage Information,Holdings Information

5. Government (black info), Orbital (grey info), orCriminal system (black info)Statistics: POW 10 (4 CPU, -2 POW), MU 160,Speed 10, $54,000Example: Black Op Files, Internet Account Hold-ers, Face Bank Accounts

6. Orbital system (black info)Statistics: POW 12 (4 CPU), MU 160, Speed 12,$64,000Example: Agora Mecca, Cyber Circle Lunar,Ishima Orbital Databases, Arti�cial Intelligences.

Steps in Cracking a Datafortress:

1. Library Research (Intelligence + Library Research + 3d6 vs. Di�culty Number) to determine little factsabout the corporation. The margin of success is granted as a bonus to the Decryption roll in step 2.Bonus: The Hacker loads up a good selection of software. Necessary applications include one Decryption,one Intrusion, one Stealth, one Anti-ICE, and one Protection.

2. LDL (Roll over LDL Security Level on 1d10 ). The Hacker has connected to a remote server and may use itto connect (LDL) to another remote server, making a chain of connections to their target. SysAdmins musttrace each connection to determine the Hacker's LDL. Once a chain of connections has been established,the Hacker may use the same chain inde�nitely unless access is revoked by the remote server's Net AccessProvider.If unsuccessful, the remote server has refused to connect the Hacker. The Hacker must then make a �nalconnection to the target server.

3. Decryption vs. Codegate (Intelligence + Hacking + Decryption Program Str + 3d6 vs. Power + Security+ Codegate Str + 3d6 ). If successful, the Hacker has fooled the Code Gate into allowing unauthorized accessto the server. The Hacker is still susceptible to Detection software, proceed to step 4.

6/25 Instant Netrunning � Netrunning Softwares

Page 7: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

If unsuccessful, the Hacker still has no access to the server. Repeated failed attempts(3d6) will cause anyDetection Software to alert the SysAdmin to the attempt who may use Detection software to initiate a traceto locate and/or monitor the possible Hacker. Continue to Step 4.

4. Intrusion vs. Datawall (Intelligence + Hacking + Intrusion Program Str + 3d6 vs. Power + Security +Datawall Str + 3d6 ). If successful, the Datawall has been circumvented and the hacker now has access tothe server. The Hacker is still susceptible to Detection software, however. Proceed to step 5.If unsuccessful The Hacker still has no access to the server but may have been noticed. If unnoticed, tryagain.If noticed, either a SysAdmin or an Anti-Personnel Program has been noti�ed of the Hacker's presence andwill attempt to apprehend or discourage him, proceed to Combat!

5. Stealth vs. Detection (Power + Security + Detection Str + 3d6 vs. Intelligence + Hacking + StealthStr + 3d6 ). If successful, the Detection Software has detected no unauthorized activity but may attempt tore-validate the user after an interval of time (3d6 rounds), proceed to step 6.If unsuccessful, the Detection Program has detected unauthorized activity and may noti�ed either a SysAdminor an Anti-Personnel Program to apprehend or discourage the Hacker, proceed to Combat!

6. You now have access to the CPU. The computer thinks you are logged on as an o�cial authorized user.You may access data�les and software applications available on that server. Some data�les and applicationsmay contain further security measures. If so, repeat step 3.

7. Cover your tracks. Failing to log o� or being cut from the line means that the SysAdmin can still traceyour location. Be sure to always log o� properly. View the contents of any �le you download, but be waryof the �lehistory: don't dilute your data!

Combat!

1. Initiative.Human Intelligence + Computer's Speed + 3d6 versus Computer's Power + Speed + 3d6

2. Loser declares �rst, Winner acts �rst. Therefore, if the loser is launching an Anti-Personnel Programtowards the intruder, the winner may either activate a suitable defense or take a chance and attack the loser�rst.

3. Combat Options:

a Intruder attacks ICE. (Intelligence + Hacking + Anti-ICE Program Str + 3d6 vs. Computer'sPower + Security + Program Str + 3d6 ). If successful, the target software application has crashed anderased from the server.If unsuccessful, the attack has failed to crash the application. Detection Software automatically tracesthe Hacker's connection and alerts the SysAdmin to the attempt who may attempt to discourage theHacker.

b Intruder attacks SysAdmin or SysAdmin attacks Intruder. (Intelligence + Hacking/Security+ Anti-Personnel Program Str + 3d6 vs. Protection Program Str + Intelligence + Hacking/Security+ 3d6 ) If successful, the Anti-Personnel program has done damage directly to the user's brain (STR �Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treatattack as an Anti-System attack.If unsuccessful, the attack has failed to do any damage.

c Defending CPU attacks Intruder (Computer's Power + Security + Anti-Personnel Program Str+ 3d6 vs. Intelligence + Hacking + Protection Program Str + 3d6 ) If successful, the Anti-Personnelprogram has done damage directly to the user's brain (STR � Protection STR in Hits), only if connectedvia a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack.If unsuccessful, the attack has failed to do any damage.

d Intruder attacks System. (Intelligence + Hacking + Program Str + 3d6 vs. Computer's Power+ Security + DataWall Str + 3d6 ) If successful, the Anti-system software has caused a CPU to crash,ceasing all activity until the CPU can be re-initialized using a Restore Utility. The Intruder is imme-diately disconnected, but not logged o�. Once the CPU is re-initialized, the SysAdmin may attemptthe trace the connection. If the target is using more than 1 CPU, all CPUs must be neutralized for thetarget to crash.

Instant Netrunning � Netrunning Softwares 7/25

Page 8: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

If unsuccessful, the attack against the CPU failed. Detection Software automatically alerts the SysAd-min to the attempt who may initiate a trace to locate and/or monitor the possible Hacker.

e Detection Software Traces Intruder (Power + Security + Program Str + 3d6 vs. Intelligence+ Hacking + Trace Value + 3d6 ) If successful, the Detection Software has located the origin of theHacker's connection and informed the SysAdmin. A Detection Program must trace each connection inthe event of chained connections (see above) to determine the origin. Once determined, the SysAdminmay notify the Hacker's Net Access Provider in an attempt to have their access revoked. In addition, anyfurther attempts to connect from any server on a traced chain will automatically alert the SysAdmin'sDetection Software of the unauthorized access. If a connection was severed without spending an actionLogging O�, the SysAdmin can still perform a Trace on that severed connection.If unsuccessful, the trace has failed. The Detection Program may attempt to trace a connection eachround.

4. Damage. Damage is allocated to a�ected systems or programs (or Hits in the case of Black ICE).

Glossary

Anti-ICE Software: software meant to crash anddelete other software applications.

Anti-Personnel Software: software meant to dodamage to the actual Netuser. Only works in mileuthat use Cybernetic interfaces.

Anti-System Software: software meant to crash orimmobilize another computer's CPU.

Arti�cial Intelligence: an advanced computer ca-pable of full interaction and decision-making.

Black Info/System: Top Secret information. Infor-mation that someone is willing to kill to keep secret.A Datafortress with deadly countermeasures such asAnti-Personnel software.

Codegate: a Cyberpunk 2020 term for an au-thentication mechanism or Firewall. Codegates couldcheck namepassword combinations, computer location(LDL), �ngerprints, retinas, voice-prints, DNA, etc.

CPU: Central Processing Unit, the brain of a com-puter. Many computers have multiple redundant CPUsthat increase processing power. Also, if one fails, thecomputer can keep operating at a reduced level.

Cyberdeck: or Cybermodem, a computer device thatuses the operator's living brain as a CPU.

Data�le: any �le that contains information. Data�lescan be text, graphics, video, audio, or full sensory VRsimulations.

Datafortress: A Dataserver that restricts informa-tion to authorized users.

Dataserver: A futuristic term for a server, a com-puter which provides data upon request.

Datawall: A Cyberpunk 2020 term for a Firewall,a Datawall without a Codegate simply doesn't provideaccess to it's protected information and must be de-feated with Intrustion Software.

Decryption Software: Software designed to bypassCodegates by fooling it into providing access.

Detection Software: Software that periodically re-checks users on a server to authenticate access. If unau-thorized access is discovered, the Detection Softwarenoti�es the SysAdmin or automatically deploys Anti-Personnel or Anti-System applications depending on

how the Datafortress is set up.

Euro: The Cyberpunk 2020 unit of currency. Formodern settings, simply replace with dollars.

Grey Info/System: Secret information. Infor-mation no one is willing to kill to keep secret. ADatafortress with non-lethal countermeasures such asAnti-System software.

Hacker: A generic term for anyone attempting togain unauthorized access to restricted information ofapplications.

Hacking: Skill used by Hackers. In game terms,Hacking and Security are the same skill used for di�er-ent purposes.

ICE: Intrusion Countermeasure Electronics, encom-passing any software applications designed to preventunauthorized access to a Datafortress.

Icon: A visual representation. In Cyberpunk 2020,refers to a 3D representation of a computer object.A �le might be represented by an icon that, onceclicked/grabbed/pushed/opened, will display the con-tents of that �le. Often, events are represented by anicon. For instance, a SysAdmin might represent hispresence on the server with an icon of a knight in ar-mor. If the Hacker sees a knight in armor, then heknows the SysAdmin is logged onto the server.

Internet Corporation: A Cyberpunk 2020 creationmeant to be a conglomerate of Net Access Providers.In the modern world, these would be comprised of sev-eral companies such as MCI, ATT, UUNet, etc. Intru-sion Software: Software meant to temporarily disableDatawalls, allowing access to the server. The disad-vantage is that their use may alert Detection Softwareapplications.

LDL: A Cyberpunk 2020 equivalent of the modernIP address. In Cyberpunk 2020, the LDL also servesas an allpurpose phone number, e-mail address, andvoice-mail box.

Memory Unit: A Cyberpunk 2020 equivalent toMegabytes. It has no real-world conversion and wasused in lieu of actual future memory sizes which canbecome dated quickly.

8/25 Instant Netrunning � Netrunning Softwares

Page 9: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

Mundane Info/System: Con�dential information,but hardly a secret. Information that is restricted butisn't guarded by countermeasures. Datafortresses thatemploy Detection Software only.

The Net: The Cyberpunk 2020 equivalent of the In-ternet. The Cyberpunk 2020 Net is represented by a3D fullsensory

Virtual Reality: Other names for the Net includethe Face, the Cybernet, the Interface, the Web, etc.

Net Access Provider: A company that rents tem-porary LDL's to Netusers. The Internet Corporation isa large Net Access Provider. NAP's generally cooper-ate with SysAdmins in discouraging Hacker activity. Ifan NAP is noti�ed that one of their Netusers is possiblya Hacker, they will discontinue that Netuser's service.The futuristic equivalent of modern day Internet Ser-vice Providers.

Netuser: Anyone using the Net legally. The equiva-lent of the modern Net surfer.

Power: A Fuzion game mechanic meant to be a rel-ative measure of a computer's ability.

Security Level: A Fuzion game mechanic meant torepresent the skill used by either a SysAdmin or Com-puter CPU to deter or capture Hackers. In game terms,Security and Hacking are the same skill used for di�er-ent purposes.

Server: A computer connected to the Net. The serveracts as a middle-man between the person requestinginformation and the memory storing the information.Your computer sends a request to the server, the server�nds it, the server sends the information to your com-puter.

Speed: A Fuzion game mechanic meant to be a rela-tive measure of a computer's speed. Stealth Software:Software that attempts to fool Detection Software intoauthenticating or ignoring an unauthorized Hacker.

Strength: A Fuzion game mechanic meant to be arelative measure of a program application's ability.

SysAdmin: System Administrator. The person incharge of maintaining a Datafortress' security.

System: A collection of computer components thatwork together. A group of computers attached to asingle network would be a system. The Net as a wholemight be considered a very large system. Trace Value:The relative di�culty in tracing a connection's origin.

Virtual Reality Interface: Much like a modernGraphic User Interface (GUI), the VR Interface dis-plays the computer's �Desktop� as a 3D interactive uni-verse around the user. In Cyberpunk 2020, the Net canbe accessed in such an interface, displaying Net LDL'sas Icons around the user. The user moves freely aboutin this space, choosing the icon they wish by cominginto contact with it with their hands. Their bodies aredisplayed to them as whatever the user wishes and pro-grams much like a modern cursor, their hands actingas a mouse in space.

VR Construct: A 3D Icon in a VR Interface. A VRconstruct can be anything, limited only by the imag-ine of the creator. It's size is determined by how muchmemory it requires.

VR Sim: A VR Simulation. A tiny virtual universe.

In Cyberpunk 2020, VR Sims can be interactive games,advertisements, network conference areas, or fantasyplaygrounds. Any situation that requires being some-place you can't actually physically be can be solvedwith a VR Sim.

References

For more information on other Hacking and Netrunning sys-tems, see:

Cyberpunk 2020 by Mike Pondsmith, R.TalsorianGames.

Bubblegum Crisis RPGby Benjamin Wright, R.Talsorian Games.

NETRUNNING RULES by [email protected].

Sky�re Master Force by Gary Townsend, HEROGames.

How Hackers Break In... and How They AreCaught by Carolyn P. Meinel, Scienti�c American, Oc-tober 1998.

Cyberpunk:2020 and Fuzion are a Registered Trademarks of R.Talsorian

Corporation. Original Cyberpunk:2020 material Copyright 1994, 1995

by R.Talsorian Corporation. All Rights Reserved. Used without per-

mission. Any use of R.Talsorian Corporation's copyrighted material or

trademarks in this archive should not be viewed as a challenge to those

copyrights or trademarks.

Instant Netrunning � Netrunning Softwares 9/25

Page 10: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

NetrunningSoftwares

Type/Name

Str

MU

Cost(eb)Function

From

Icon

Intrusion

Dwarf

33

230

Stronger

versionof

Worm

BB

Small,quietdiggingmachine.

Grubb

13

210

Weakerversionof

Worm

BB

Swarmofpuke-green

grubsthat

eattheirway

throughtheWall.

Ham

mer

41

400

2D6to

DataWallST

R,alertsprogramswithin10

spaces

CP20

Glowingredhammer.

Jackhammer

22

360

1D6to

DataWallST

RCP20

Glowing

red

jackhammer,

which

�res

astream

ofwhite

hotenergy

boltsat

theData

Wall.

Jap

Water

Tor-

ture

34

260

Min

of2turns,each

additionalturn

adds

+1ST

R(m

ax7)

BB

Tiny,random

dropsofglow

ing"w

ater"strike

theWall,causingripples.

Pile

Driver

84

800

4D6toDataWallSTR,alertsprogsin30

spaces,&

Netwatch

Chr3

Steam-pow

ered

pile

driver

onthevergeof

blow

ingup.

Portal

26

750

Opens

door

inDataWall,takes3turns,no

alert

NET

Metallic

door

that

slow

lymesheswiththe

DataWallthen

swings

open

fortheNetrun-

ner.

Ram

mingPiston

103

900

5D6to

DataWallST

R,"audible"to

anything

within50

spaces

BB

Huge

nuclearpowered

battering

ram,as

draw

nby

Jack

Kirby.

Sledgehammer

62

600

3D6to

DataWallST

R,alertsprogramswithin15

spaces

Chr3

Glowingwhite

Sledgehammer.

Termite

12

160

1D6to

DataWallST

RChr1

Brown,

�st-sized,

fractalinsect

withbright

blue

eyes.Emitslow-pitched

bleeps

asitbur-

rowsinto

Wall.

Worm

25

660

Opens

DataWallin

2turns,no

alert

CP20

Gold-metal,roboticworm,withgreenneon

eyes.

Decryption

Codecracker

32

380

Opens

CodeGates

CP20

Thinbeam

ofwhite

light,which

shootsfrom

theNetrunner'shandsandspreadsthrough

theCodeGate.

Cyfermaster

63

700

Stronger

versionof

Ra�

esBB

Fractalimageofaman

�oatingin

lotusposi-

tion.

Dupre

1-8

4900

Opens

CodeGates

&File

Locks

Chr3

Elegant

middle-aged

Victorian.Hespeaks

tothelocked

Gate,

andtakesnotesas

hedoes

so.

Ra�

es5

3560

Opens

CodeGates

&File

Locks

CP20

Dapperyoungman

wearing

eveningclothes

ofthe1990's.

Hespeaks

tothedoor

then

vanishes.

......

......

......

....

10/25 Instant Netrunning � Netrunning Softwares

Page 11: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Tinweasel

34

300

Sneaky

decryptor

BB

Shifty-eyed

characterwithan

insinceresm

ile.

Wizard'sBook

4/6

2400

Opens

CodeGates

&File

Locks

CP20

Stream

ofblazingwhite

symbols,�owingat

incredible

speedfrom

theNetrunner's

open

hand.

Detection/Alarm

Bloodhound

35

700

Detectsentry,traces,alertsmaster

CP20

Large,gun-metalgrey

hound.

Ithasglow

ing

blue

eyes

andwears

athickcircletof

blue

neon.

Bulldog

66

660

Detectsentry,alertsmaster,disconnectsintruder

Chr1

Short,burlyhumanoidin

metal

armour.

Aglow

ingvisorissituated

abovesnarling,

ca-

nine

jaws.

Canis

Ma-

jor/Minor

45

610

Detectentry,alertsow

ner

BB

Large

steelstatue

ofadog/acomputerised

chihuahua.

Cry

Baby

44

430

"Tags",adds

4to

traces

whencopied

Chr3

Noneuntilactivated,

then

itappearsas

ababy,hangingaround

theNetrunner'sneck,

scream

ing.

Clairvoyance

44

720

SeeYa3.0,detectsandIDsIcons(+

invisibles)within2sub-

grids

Chr3

The

eyes

oftheNetrunner'sicon

glow

�ery

blue,or

apairof

glow

ingeyes

appear

ifthe

icon

hasnone.

DataRaven

56

1000

Detectsentry,traces,alertsmasterwhenevertarget

appears

BB

Metal-platedblackbird.

Fang

46

1300

Detectsentry,traces,disconnectstarget

untildestroyed

BB

Glowinggreenpitbull.

Fang

2.0

56

1600

Detectsentry,traces,disconnectstarget

untildestroyed

BB

Roboticpitbullwitharedhead.

Fetch4.01.1

35

700

Detectsentry,traces,alertsmaster

BB

Chrom

egreyhoundwithglow

ingblue

collar.

Guard-Dog

45

720

Invisible;detectsentry,alertsmaster

Chr1

Detected

itappearsas

astandard

Blood-

hound,

otherwiseitisaslight

�icker

atthe

peripheryof

vision.

HiddenVirtue

31

280

Detects"real"things

inVR

CP20

Glowinggreenring

which

theNetrunnerlooks

through.

Hunter

55

900

Detectsentry,traces,alertsmaster

BB

Hound

head

lungingdownthetarget'sline.

Looking

Glass

1-6

3250+

20/strDetectsdisguisedIcons

Chr3

Series

ofmirrors

appearsin

frontof

the

Netrunner,p

assing

over

andthroughthetar-

geticon.

Mouse

55

350

Creepsinto

fortsandmakes

arecord

ofwhat'sinside

BB

Small,innocuousmouse.

NetspaceInverter

3/5

4540

Travelsthroughafort

at2subgrids/turnIDingprograms

and�les

BB

Flyingeyeball;turnsinvisiblewhenactivated.

PitBull

26

780

Detectsentry,traces,disconnectstarget

untildestroyed

CP20

Short,heavily

built,steeldog.

Ithasglow

ing

redeyes

andwearsacircletof

redneon.

......

......

......

....

Instant Netrunning � Netrunning Softwares 11/25

Page 12: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Rex

36

1000

Detectsentry,traces,disconnectstarget

untildestroyed

BB

Rathernasty,metalplated

dogwithreallybig

teeth.

SeeYa

31

280

DetectsInvisibleIcons

CP20

Shimmeringsilver

screen.

Shadow

43

540

Degradesevasionprograms

Chr3

Netrunner's

icon

gainsa

long,humanoid

shadow

.Sm

arteye

34

620

Detectsprogswithin10

spaces,IDsattack

progs

Chr1

Spinning

crystalball;

theballstopsandthe

appropriateicon

appearswithin.

Speedtrap

44

600

Detectsattack

programswithin10

spaces

CP20

Flat,glow

ingplateof

glass,in

which

images

appear.

Watchdog

45

610

Detectsentry,alertsow

ner

CP20

Large,black,

metal

dog.

Ithasglow

ingred

eyes

andaspiked

metalcollar.

Anti-System

Asp

42

800

Killscyberdeckinterface

BB

Glowinggolden

snake.

Cascade

74

900

Erases2D

6MUof

random

mem

ory

Chr3

Show

erofrandom

neon-colouredpods

&cap-

sulessprays

thetarget's

icon

andareab-

sorbed

oncontact.

Cascade

II3

2800

20%

chance

that

program

changes.

Decks

chose

new

prog/turn

BB

Floatingballof

energy.

Clown

35

1130

Disruptsdata

transm

ission,progsare-1

STR,'runners

-1Initiative

BB

Annoying,

loud,obnoxious,

white-faced

cir-

cusclow

n,completewithslapstick,

seltzer

bottle,pies,etc.

DecKRASH

42

600

Crashes

'deckfor1D

6turns

CP20

Cartoon

stickof

dynamitewithfuse.

Feedback

43

960

Killsdeck'sinterfaceand"jam

s"'runnerplugs

I.3

Beam

oforange

neon

which

shoots

from

the

Netrunner's�ngertips.

Flatline

32

570

Killscyberdeckinterface

CP20

Beam

ofyellowneon

which

shoots

from

the

Netrunner's�ngertips.

Fragmentation

Storm

43

1000

Killssystem

RAM

BB

Hugewhite

electricalarcthat

strikesthetar-

getandfollowshislineback

tohisdeck.

GridWave

78

20K

DistortsI-Galgorithms

Chr4

Black

sphere

withtwisting

light

waves

sur-

rounding

it.

HellBurner

65

1000

Destroystarget

CPU

Chr3

Giant,disembodied

�stwhich

burnswith

blue,fractal�re,grabsonto

target,engul�ng

itin

blue

�ames.

Krash

32

570

Crashes

closestCPUfor1D

6+1turns

CP20

Large,cartoonanarchistbomb,

withasiz-

zlingfuse.

Murphy

32

600

Causessystem

torandom

lyactivate

programs

CP20

You

neverknow

......

......

......

.......

12/25 Instant Netrunning � Netrunning Softwares

Page 13: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Piin

theFace

54

800

Makes

CPUcalculatePi

Chr3

Large

cartoonpie,forthrowing.

PoisonFlatline

22

540

Killssystem

RAM

CP20

Beam

ofgreenneon

which

launches

from

the

Netrunner's�ngertips.

Poltergeist

53

660

Randomly

erases

one�leeach

turn

BB

Random

�ashes

ofenergy

from

everyw

here,

wipingdata

and�les.

Pox

42

800

Causesaglitch

inam

bush

ICE,30%

chance

ofderezzing

BB

Floatingballof

energy

that

explodes

into

awashof

sickly

coloured

globules.

ScatterShot

43

660

Killssystem

RAM

BB

Shotgunshooting

fractalshot.

Swarm

17

3000

Causestarget

system

toreplicateSw

arm

programs

Chr4

Cartoon-y

beethat

�ies

towards

aCPU,

stinging

it.

Typhoid

Mary

68

2400

In�ltrates

'runneranddeletes�les

Chr3

FemaleKiller

robot.

Weed

23

630

-1target

speedpersuccessful

attack

Chr4

Tangled

weeds

grow

ingon

theicon

ofthesys-

tem'sCPU(s).

Vacuum

53

1200

Attacks

location

algorithms,forces

'runnerto

where

heen-

teredfort

BB

Seriesofhexagonalframesthat

suck

the'run-

ner'sIcon

outof

thedata

fort.

Virizz

42

600

Tiesup

1system

action

untilturned

o�or

destroyed

CP20

Glittering

DNA

shapemadeof

lightsand

neon.

Viral15

42

590

Randomly

erases

one�leeach

turn

CP20

Swirlingmetallic

blue

fogwithawhite

neon

DNAhelix

embedded

inthecentre.

Evasion/Stealth

Black

Mask

1-5

3-4

200/ST

RMakes

your

Icon

look

likesomething/one

else

NET

Anythingprogrammed

into

it.

Cloak

52

2000

Pow

erfulvariantof

Invisibility

BB

Makes

theuser'sIcon

invisible.

Dom

ino

53

1500

Makes

your

Icon

look

likeonecommon

tothelocale

BB

Depends

onthedata

fort.

George

41

300

Adds4to

Trace

Di�culty

Chr3

Cartoon

signpost

withsignspointing

inall

directions.

Invisibility

31

300

Makes

cybersignalinvisible

CP20

Flickering,iridescentsheet,which

drapesover

theNetrunner.

Open-Ended

Mileage

45

330

AddsanotherLDLto

maketraces

harder

whenactivated

BB

Bluespheresurrounded

bytwostylized

light-

ning

bolts.

Rabbit

5/1

2360

Drawso�

"Dog"programs,+2Initiative

whenreleased

BB

Fractalrabbit

goingliketheblazes.

Also

BugsBunny

variantsaround.

Replicator

3/4

2180

ConfusesattackingICEwithmillions

offalsesignals

CP20

Chrom

esphere

creating

millions

ofholo-

graphicimages

oftheNetrunner.

Signpost

41

300

Adds4to

Trace

Di�culty

BB

Signpostwithsignspointing

inalldirections.

Silhouette

64

600

'Runnerlookslikehe'sjacked

outandisinvisiblefor5turns

I.3

Looks

asittheNetrunner

hasjacked

out.

Spore

77

2320

AIsuicide-replication,

sendsmultiplecopies

into

Net

tore-

produce

NET

Eachsporelookslikeasm

allmoteof

light.

......

......

......

....

Instant Netrunning � Netrunning Softwares 13/25

Page 14: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Stealth

43

480

Mutes

cybersignal,makingdetectionharder

CP20

Sheetofblackenergy

draped

overtheNetrun-

ner'sIcon.

Superballs

34

500

Distractstargets,causing-3

Initiative

Chr4

Thousands

ofprimary-coloured

rubb

erballs

bouncing

around

target's

square,as

ifin

aglasscube.

Vew

yVew

yQuiet

42

400

Concentrateson

avoiding

detection

BB

The

'runner

makes

nosound

and

turns

translucent.

Protection

Arm

or4

2170

Reducesattacksfrom

Stun,H

ellbolt,Zom

bie,etcby

3points

CP20

Glowinggolden

armor

inahigh

tech

design.

DeckShieldOne

62

320

Adds+3to

deck'sDataWalls

Chr4

Deck's

data

fort/position

innetspace

issheathed

infractalarmor-plating.

Flak

4/2

2180

Creates

static

Wallto

blindattackers;ST

R2vs

Dog

pro-

gram

sCP20

Cloud

ofblinding,glow

ing,

multicoloured

lights,swirlingin

alldirections.

ForceShield

42

160

Stopsattacksagainst'runner

CP20

Flickering

silver

energy

barrier.

Joan

ofArc

32

190

Rem

ains

"active"

andtakesdamagemeant

forcurrentpro-

gram

BB

Wom

an'sface

that

grimaces

inpain.

OutJack

24

150

Jacks'runneroutof

Net

ifhe'stakenCriticaldamage

Chr3

None.

Re�ector

52

160

Re�ectsStun,Hellbolt,Knockoutattacks

CP20

Flare

ofblue

greenlight,coalescing

into

amirroredbowl.

Shield

31

150

Stopsattacksto

'runner

CP20

Shiftingcircular

energy

�eld

appearingin

frontof

theNetrunner.

Anti-Program

Aardvark

43

1000

Detectsanddestroys

Worms

CP20

Matrixof

thin

yellowneon

lines,which

close

around

theWorm,then

dematerialisewithit

trapped.

Banpei

15

1280

1D6to

program

STR

BB

Roboticsamurai.

Black

Dahlia

77

2000

Interactive,super-realisticKiller.2D

6damage

BB

Incredibly

seductive

wom

anin

ablack

eveningdress.

Bunnies

43

440

Overloads

Vam

pyres

Chr1

Rapidly-m

ultiplying

bunchofburnishedgun-

metal

coloured

bubbles,withclassic"rabbit

ears"antennae.

Chameleon

46

1650

Killer

IVwithactive

Disguise

NET

Killerwithapolishedmirrorface

that

re�ects

theIcon

oftheprogram

itisattacking.

Codeslinger

43

2500

Killer

written

to�t

lessMU.1D

6damage

BB

Cow

boywithsix-shootercodeguns.

D'Arc

Knight

35

1360

1D6to

program

STR

BB

Svelte

knight

inarmor.

......

......

......

....

14/25 Instant Netrunning � Netrunning Softwares

Page 15: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

DataNaga

65

1480

1D6to

program

STR

BB

Exoticwom

anwithaserpentine

lower

torso

andsixarms.

Dogcatcher

107

1176

Chasesanddestroys

tracing"D

ogs"

Chr3

Basicmaleor

femalehumanoidshapecarry-

inganeton

apole.

Dragon

43

960

Attacks

andderezzes

Dem

ons

CP20

Great

golden

dragon

robot,wreathedin

elec-

tricaldischarges.Laserbeam

sshootfrom

it's

eyes.

Dropp

44

800

1D6damage,andjacksthe'runneroutof

thesystem

BB

Arippleacrosstheimmediatearea

likeadrop

inapond.

Eradicator

8/5

71600

Actsas

Killer

V,destroys

AISp

ores

NET

Glowingam

oeba

withhuge

jaws.

Exorcist

43

600

Rem

oves

e�ectsof

Possession

Chr3

Fractalpriest

infullregalia,carrying

alarge

religious

symbol.

Hydra

33

920

Attacks

andderezzes

Dem

ons

CP20

Glittering

blue

fogthat

encirclesitstarget

anddematerializes

it.

IcePickWillie

25

1320

1D6to

program

STR

BB

Classic'30s

gangster

hitm

an.

Killer

II2

51320

1D6to

anyprogram

STR

CP20

Large

manlikerobot,

dressedas

ametallic

samurai.

His

eyes

glow

redandhe

carries

aglow

ingKatana.

Killer

IV4

51400

1D6to

anyprogram

STR

CP20

Large

manlikerobot,

dressedas

ametallic

samurai.

His

eyes

glow

redandhe

carries

aglow

ingKatana.

Killer

VI

65

1480

1D6to

anyprogram

STR

CP20

Large

manlikerobot,

dressedas

ametallic

samurai.

His

eyes

glow

redandhe

carries

aglow

ingKatana.

Loony

Goon

14

900

1D6damage.

Strength

0to

defend

againstotherKillers

BB

Cartoon

characterof

the'runner'schoice.

Manticore

23

880

Attacks

andderezzes

Dem

ons

CP20

Huge,

lionlikeshape,

draw

nin

red

neon

schematic

lines.

Alargescorpion

tailarcs

over

oneshoulder.

Mirror

54

1200

ReboundsHellbolts

Chr4

Large,square

mirror�oatingin

frontof

the

'runner.

The

bolt

goes

inthen

comes

out

again.

Ninja

55

1520

InvisibleKiller

Chr4

Whenseen

itappearsas

aninjacarrying

aglow

ingsword.

Orion

77

6240

TracksSp

ores,'runners,&programs.DestroysSp

ores

I1.3

Pow

erfulm

anor

wom

anwithbowand�ying

platform

oran

angelwithwings

anddivine

radiance.

......

......

......

....

Instant Netrunning � Netrunning Softwares 15/25

Page 16: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Possessor

43

1000

"Possesses"programs

Chr3

Hoodedrobe,withnothinginside.Robewill

coveranotherIcon,which

canbe

seen

inthe

hood.

Raptor

2-6

31900

Killer

that

strikesat

range,1D

6damage.

+80eb/levelover

2BB

Realisticfalcon

which

swoops

downup

onit's

prey.

Raven

54

1000

"Blinds"anyprograms

Chr3

Raven

that

attemptsto

peck

outtheeyes

ofthetarget.

SentinelsPrime

55

1440

1D6to

program

STR

BB

Goldenhumanoidwithabiggun.

Shaka

45

1400

1D6to

program

STR

BB

Zuluwarrior

withspearandshield.

Snow

ball

2+5

3000

1D6damage,

+2ST

Rforeach

program

itdestroys

while

active

BB

Snow

ballthat

grow

sin

size

foreach

program

itdestroys.

Start-UpIm

mola-

tor

45

1280

Destroystarget

ifused

intheroundwhenprogram

was

rezzed

upBB

Boltof

�amethat

shoots

from

the'runner's

mouth

andburnsthetarget

program

toash.

Triggerman

45

1480

1D6to

program

STR

BB

Film

noire-styledetective.

Wildcard

13

1400

1D6to

program

STR

BB

Representation

oftheold

Caponeganger

"Wild

Card".

Wolf

46

1500

Killer

disguisedas

Watchdog

Chr1

Identicalto

theWatchdogicon,except

that

itwill

�ash

entirely

redas

itattacks.

Anti-Personnel

BallandChain

33

5000

Slow

s'runnersmovem

entto

1square

for1D

6+3turns

Chr3

Classicprisoner'sballandchainclam

pedto

somepartof

thetarget

icon.

BolterCluster

44

8000

Pow

erfulHellboltthat

does

4D6damage

BB

Wickedlookingturret

springsforthto

blast

thetarget.

Brainwipe

34

6500

Reduces

INTby

1D6/turn,killing

'runner

CP20

Acid-greenelectrical

arc,

which

leapsfrom

the�oor

andengulfs

andkills

the'runner.

Cerebus

68

9500

PitBullthat

shootsHellbolts

NET

Dark,

metallic

dogwith2heads.

One

�res

Hellbolts

from

itseyes,theotherhowlsas

itpursuestarget.

Cinderella

64

9000

High-powered

Firestarter

BB

Lovelywom

anwithgreenglow

ingeyes,in

18th

centuryballgown,Anythingshetouches

ignites.

CodeCorpse

54

7500

Reduces

INTby

1D6/turn,making'runnermindless

BB

Skeleton

inacloakwithascythe

attacksthe

target.

CorticalScrub

34

6500

Reduces

INTby

1D6/turn,killing

'runner

BB

Green

globethat

send

outelectricalarcs.

DataDarts

34

5500

Hellboltvariantthat

does

3D6damage

BB

Swarmofredglobes

that

strike

atthetarget.

FatalAttractor

77

10750

AttractivelydisguisedHellhound

Chr1

Attractiveyoungwom

anin

askintightbody-

suit.DIFFSysKnowto

recogniseher.

......

......

......

....

16/25 Instant Netrunning � Netrunning Softwares

Page 17: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Firestarter

44

6250

Pow

ersurgeelectrocutes

'runner

CP20

Blazing

pillar

of�re,

which

speaks

the

Netrunner's

name

ina

hissing,

boom

ing

voice,then

leapsat

him.

Glue

54

6500

Locks

'runnerin

placefor1D

10turns

CP20

Shiftingpatternofredshapes�ickeringacross

the�oor

toentangletheNetrunner.

Hellbolt

44

6250

1D10

physicaldamageto

'runner

CP20

Bolt

ofcrimson

�re

launched

from

the

Netrunner'sraised

hand.

Hellhound

66

10,000

Trackstarget,waits,causes

heartattack

CP20

Huge,black,metalwolf.It'seyesglow

white,

and�reripplesover

itsbody.Repeats

the

'runner'sname.

Hom

ewrecker

54

8000

High-powered

Firestarter

BB

Fiery

electricalarcthat

shootsat

thetarget's

eyes.

Jack

Attack

33

6000

'Runnercan'tlogo�

for1D

6turns

CP20

Pairof

glow

ingschematic

handcu�s

encir-

clingtheNetrunner'swrists.

KingTrail

32

3500

Leavesglow

ingtrailbehind

'runnerfor3D

6turns

NET

Glowingyellowbanana

slug.

Knockout

43

6250

Causescomafor1D

6hours

CP20

Yellow

neon

schematic

boxerappearsand

strikesoutat

theNetrunner'sIcon.

Liche

44

7250

Erases'runnersmem

oryandover-writespersonality

CP20

Metallic

skeleton

dressed

inblack

robes.

Grabs

the'runnerin

itsgraspanddragshim

underthe�oor.

Masti�

56

12000

Tracks&

tags

target,does

1D6damageandreducesINT

1D6

BB

Glowingblue

masti�withahuge

spiked

col-

lar.

NeuralBlade

34

6750

1D6physicaldamageto

target

BB

Glowing,rune-etchedbroadsword.

PepeLePue

65

7750

Reduces

'runnersINTandREFfor1D

6+1turns

NET

Cartoon

skunkthewraps

around

theNetrun-

ner'sIcon.

Psychodrome

4(5)

1114000

Unconscious

for1D

6hours,scares

victim

Chr1

Disguised

assystem

.'Runnerisplaced

invir-

tual

room

offaceted,

mirroredwallsdisplay-

ingtorture.

Red-Out

54

6750

Paralyses

'runnerfor1D

6turns

Chr4

Shiftingcontexturalhaze

ofredpixels

that

descend

onthe

Netrunner;

changing

the

colour

ofhisIcon.

Shock.r

45

6300

Freezes'runnerfor1D

6turns

BB

Goldenboltfrom

theNetrunner'spalm.

Sleeper

64

7250

Non-lethalBrainwipe,makes

target

doatask

(di�

20-30to

resist)

I.3

Electricalarc,w

hich

leapsfrom

the�oor

and

engulfs

the'runner.

Spazz

43

6250

Halves'runnersREFfor1D

6turns

CP20

Nimbusof

electrical

energy

surroundingthe

target.

......

......

......

....

Instant Netrunning � Netrunning Softwares 17/25

Page 18: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Stationery

46

10000

Prevents'runnerfrom

movingfor5turns

Chr3

Piecesof

paper,

with'You'reNicked!'

onthem

,appearsin

asort

ofsnow

storm

over

theNetrunner.

Stun

33

6000

Freezes'runnerfor1D

6turns

CP20

Boltofblue

�amestreakingfrom

theNetrun-

ner'sopen

palm.

Sword

34

6750

1D6physicaldamageto

target

CP20

Glowingenergy

katana.

The

AudioVirus

55

8000

Reduces

INTandREFuntil'runnerdestroys

program

Chr4

Photo-realistic

stereo

system

,which

will

trem

bleandvibratefrom

thenoiseitmakes.

Threat

56

7000

Makes

'runnerso

nervoushe

jacksout

Chr3

Any

minor

o�ensive

ordefensiveprogram.

Setat

timeof

purchase.

TKO2.0

43

6250

Causescomafor1D

6hours

BB

Chrom

eboxerwho

smacks

thetarget

witha

nastylefthook.

Werew

olf

66

13,000

InvisibleHellhound

NET

Nonenorm

ally,butastylishwolfin

asuit

whenrezzed.

Zom

bie

54

7500

Reduces

INT1D

6/turn,making'runnermindless

CP20

Shrouded,skeletal

form

,envelopedin

stink-

inggrey

mist.

Itlunges

outandrips

the

Netrunner'shead

o�.

Multi-Purpose

APicture'sWorth

26

1200

Hides

data

withinVRs

Chr4

Slot

machine.

Data�owsin

though

coin

slot,m

achine

spinsajackpot,scrambled

data

poursinto

MU.

AlBoon

1D6

73600

GoesthroughGates,d

oes1D

6damageto

Walls&programs

BB

Stream

offractalcode

that

rapidlycoalesces

into

afractalsolid.

Black

Sky

58

4480

Hides'runnerinacloudwhich

attacksprogramswith"light-

ning"

Chr3

Black

cloudwhich

form

sbetweentheenem

yprogram

andtherunner.

Blink

57

1500

1D6damageto

Walls

andprograms,

goes

throughGates.

50%

rel

BB

Swirlingcloudof

fractalcode

that

coalesces

into

arandom

fractalsolid

(whenitworks).

Orblow

sup.

Dum

my

12

450

Fake,disguisableprogram

Chr3

Smallspinning

chromepyramid

that

re�ects

theIcon

ofanyprogram

itencounters.

EvilTwin

87

2700

Com

bination

Shield/K

rash

Chr3

The

Netrunner'sIcon

seem

sto

�yaround

inlargearcs.

IGOR

47

4800

On-line�unky

Chr4

Classic"m

ad-scientist's"assistant;complete

withlabcoat

andhunchback.

Lightning

Bug

26

1540

6"bugs"

that

killICEbefore

itcanattack

NET

6motesoflight

that

slow

lyalternatebetween

redandwhite.

The

motes

lazily

circle

the

Netrunner.

......

......

......

....

18/25 Instant Netrunning � Netrunning Softwares

Page 19: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Omnivore

38

18500

Derezzesprograms,friesCPUs,temporarilyreducesINTby

2D6

Chr3

Whirring,

buzzing,

screeching

ballof

blades

which

careensinto

itstarget

andthoroughly

mangles

it.

SatchelCharge

87

18500

5D6damageto

'runner&

progsin

1subgrid,

3D6to

Walls

&Gates

SWAbombin

abackpack.

Scribe

68

NA

Stopsanddisassem

bles

programsforcopying.

Program

roll

47+

Chr4

Cow

ledchromemonkwithfeatherpen.

Wolfpack

68

15200

Does1D

6damageto

ICE/D

emon

STR,1D

10damageto

'runners

Chr3

Pack

ofelectrically-charged

wol�ike

form

swhich

pounce

upon

theirtarget,rippingit

apart.

Controller

CrystalBall

41

140

Operatesvideocameras,remotesensors,etc

CP20

None.

Dee-2

31

130

Operatesrobots,cleaning

machines,autofactories,etc

CP20

None.

Genie

51

150

Operatesdoors,elevators

CP20

None.

Hotwire

31

130

Operatesremotevehicles

CP20

None.

Knevil

43

220

Limited

AIvehiclecontroller,no

safeguards

Chr3

Wildly-dressed

motorcyclist,

with

madly

glinting

eyes.Hegrabstheremote'sicon

and

begins

movingit.

New

sAt8

41

140

Allowsaccessto

DataTerms&Scream

sheetsviatheNet

CP20

None.

OpenSesame

31

130

Weakerprogram

tooperatedoors,elevators

CP20

None.

Phone

Hom

e5/2

1150

Can

place/receivecalls

while

intheNet,caninterceptat

STR2

CP20

None.

Rockerbit

42

200

Limited

AImicrophone/voxbox

controller,broadcastat

pre-

settime

Chr3

Cartoonish

Rockerthat

hangsaround

the

speakerremoteand'yells'into

itas

appro-

priate.

Soundm

achine

41

140

Controlsmikes,speakers,vocoders,etc

CP20

None.

Terminator

42

260

Controlterm

inals

Chr3

Adisembodied

cyberarm

begins

typing,w

rit-

ing,

ordraw

ingon

theremoteicon

inques-

tion.

Viddy

Master

41

140

Allowscontrolof

videoboards

CP20

None.

WADController

21

150

Di�culty10-35to

patchinto

signal

Chr3

None.

Utility

Alias

62

160

Replaces�lenamewithfalseone

CP20

None.

Backup

41

140

Usedto

copy

programs

CP20

None.

Baedeker's

Net

Map

21

130

Routescalls

public

2or

3dataterm

numbers.+3System

Know

BB

AgreenlineextendingacrossaNet

map.

......

......

......

....

Instant Netrunning � Netrunning Softwares 19/25

Page 20: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Bakdoor

32

600+

Routeslinkthroughat

leastoneprivatesystem

BB

AgreenlineextendingacrossaNet

map.

Breadcrum

bs4

4290

Finds

newLDLlinkroutes

(legally),1roundperuplinkor

LDL

NET

Lineof

glow

ingsparks

form

ingatrail.

Butcher

Boy

37

550

Creates

apapertrail,whilstfunnellingfundselsewhere

BB

Takes

theappearance

ofasystem

accounting

program.

Cartographer

63

200

STRvs

CPUINT/2

formap

ofdata

fort,m

ustbe

runinside

thefort

Chr3

None.

Databaser

82

180

Stores

upto

10,000

pagesper�le

CP20

None.

Dolphin

Pro-

gram

s3

5310

Clean

Paci�ca

ofjunk

data

NET

Sleek,

chromedolphin.

ElectroLock

72

170

Locks

�les

atST

R3

CP20

None.

Expert

Schedule

An

43

250+

Skims�les

at1M

Uperturn.Shelflifeof

amonth

BB

Noneneeded,butmight

appear

asahu-

manoidicon

that

leadsyouto

the�les

you

requested.

Filelocker

41

140

Locks

�les

withcode

word,

equalto

STR5CodeGate

CP20

None.

File

Packer

41

140

1/2MUsize,2turnsto

unpack

CP20

None.

Flare

Gun

22

300

Message

travels3spaces

perturn

for2D

6turns

Chr3

Big-barrelled�are

gun.

Flip

Switch

2.0

100

225

Flip

Switch

controller,-5

Net

Initiative

whenactive

Chr3

None.

Flip

Switch

3.0

100

250

Flip

Switch

glogocontroller,3settings

BB

None.

GateM

aster

51

150

Anti-virus,detects&destroys

Virizz&Viral15

CP20

None.

GuestBook

42

200

Detects'runnerswithin2squares,treatas

STR3CodeGate

Chr4

Anold-stylehotelguestbook

andquill.

InstantReplay

82

180

Records

'runnerstrip

CP20

None.

Mictotech

AIIn-

terface

24

330

Pseudo-AIthat

scans�les

lookingforkeyw

ords

BB

Floatinghollowmask.

Multinetter

1020

2000

Allowsmultiple'runnersto

runthroughonecomputer

Chr3

None.

Multi-Tasker

56

1140

Extra

actionson

mainframes

NET

None.

Mystery

Box

54

300

Searches

forandcopies

programsfrom

�les

BB

Cartoon

boxwithstrangegearsandwidgets

oneach

surface.

NetMap

41

140

Major

region

locatormap,+2to

System

Knowledge

CP20

None.

New

sgroup

Filter

44

200

Goesoutandskimsnewsandinterest

groups

forspeci�ed

info

BB

AsimpleIcon

oftheuser'schoice.

Padlock

42

160

Accesscode

needed

tologonto

deck

CP20

None.

Re-Rezz

31

130

Recom

pilesdamaged

programsand�les

CP20

None.

R&D

Protocol

Files

43

250+

SkimsR&D�les

at1M

Uperturn.Shelflifeof

twoweeks

BB

Noneneeded,butmight

appear

asahu-

manoidicon

that

leadsyouto

the�les

you

requested.

......

......

......

....

20/25 Instant Netrunning � Netrunning Softwares

Page 21: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Shredder

Uplink

53

250

Reconstructs�les

intheTrash

bu�er

BB

Janitorprogramwho

ri�esthroughthepieces

inside

atrashcanandpulls

outcomplete�les.

Translator2000

42

240

Takes

pictures

tomakevirtualobjects

Chr4

None.

ZetatechInstaller

11

300

Com

pressesprogramsto

halfsize

butreducesSp

eedby

1BB

'Tronnichumanoidupperbody

mounted

ina

roundmetallic

base,w

hofeedsprogramsinto

base.

Demons

AfreetII

34

1160

Carries

3programs

CP20

Tall,powerfulblackman,dressedin

evening

clothes,wears

afezandspeaks

inaform

al,

deep

voice.

BalronII

55

1240

Carries

4programs

CP20

Huge,male�gure.

Dressed

infuturisticblack

armor.Carries

aredglow

ingenergy

blade.

ImpII

33

1000

Carries

2programs

CP20

Small,

orange

sphere

oflight,with

two

amused

lookingredeyes.Beeps,whistles,&

pings.

Reaper

57

12500

Seeksout&

destroys

usersin

asetarea.

1D6to

'run-

ners/progs

SWClassicGrim

Reaper,completewith�aming

sickleandcloakmadeof

outerspace.

Soulkiller3.0

745-

4000+NA

1D6INT

loss/to

DataWalls&

programs,-4

todetect,3

actions

SWSw

irlingvortex

that

speaks

inahigh

crys-

talline

voice,andsucksthe'runnerinto

it.

Succubus

II4

41200

Carries

4programs

CP20

Voluptuous,nude,hairlessfemale,madefrom

shinychromemetal.Has

largebatlikewings,

blue

eyes.

Thug

36

10440

Permanentsubroutines,1D

6damageto

programsand'run-

ners

Chr3

Genericcartoonthug.

Vam

pyre

II6

72300

Can

absorb

upto

6programs

Chr1

Figurein

grey

robes,

withgolden

eyes,&

fangs.

Transform

sinto

misty

cloudthat

dis-

solves

othericons.

Daemons

Boardwalk

37

1080

Records

messages

and

conversation

inadmin/budget

database

BB

Stylized

porcupine-likeshapethatinvadesthe

database.

Cockroach

57

1600

Eats�les,turnsthem

into

morecockroaches

BB

Smallcockroach-likeimagethat

multiplies

acrosstheface

ofthedatabase.

Cream

Pie

77

1715

Carries

3programs(PoisonFlatline,Killer

IV,&Murphy)

BB

Acream

pie.

DeepThought

37

1080

Records

messagesandconversation

inresearch

database

BB

Darkdepression/holethat

slow

lyworks

it's

way

into

thedatabase

(whenit's

visibleat

all).

......

......

......

....

Instant Netrunning � Netrunning Softwares 21/25

Page 22: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Eavesdropper

36

1365

Carries

Databaser.Records

messagesandconversation

insystem

BB

Nonespeci�c,it'ssupp

osed

toblendin.

FaitAccom

pli

37

570

Subtly

messesup

project�les

BB

Cloaked

andhooded

man,withaglimmer

ofasinister

smirkunderthehood.

FalseEcho

26

380

Triggersfalsesystem

alerts

BB

Shimmering"hologram"mirrorimageof

the

'runner.

Gremlins

47

7000

Producesmoregrem

linsandrandom

lyshootso�

programs

BB

Littlegreen

men

runningaround

carrying

monkeywrenches.

ISpy

36

400+

Com

mercialversionof

Eavesdropper

BB

Hollowmaskwithpiercing

light-beam

eyes.

Incubator

26

760

Reproducesotherprograms

BB

Translucent

pyramid

withthenucleusof

an-

otherprogram

alwaysgrow

inginside

it.

Pattel's

Virus

67

2200

Weakens

1type

ofICE

BB

Swirlof

hundreds

ofcrystalline

fragments.

Skivviss

47

1320

In�atesprojectcosts,so

that

they

getcancelled

BB

Bulbous

chromerobotwithfour

armsthat

actas

a�ndersubroutine

while

corrupting

data.

Ambushes

Chimera

54

100,000

Invisibleanti-dem

on.Ifundetected

itgetsafree

turn

toact

BB

Fully

animated

chimerawhich

breaths�re

andchokinggasat

thetarget

demon.

Soulkiller1.0

4NA

500,000

Drainstarget's

intellect,etc(1D6INT/turn)

into

adata

matrix

BB

Swirlingvortex

that

speaks

inahigh

crys-

talline

voice.

The

vortex

sucksthe'runner

into

it.

Trap!

4x3

NA

200,000

3Asp

programshidden

ina�leor

node

that

attack

ifunde-

tected

BB

Three

Asps�owingoutof

the�le/node.

Systemware

CloakMore

65/cpu4000/cpu

Cloaksan

entire

data

fort.Neutralizes

1INT/C

PU

NET

None.

Dazzler

514

14800

Disguised

VR

"cell"

withtrace,

di�15-25Interfacerollto

detect

Chr3

Usually

disguisedas

apieceof

system

archi-

tectureor

simpledefenceprogram.

Monitor

47

950

RovinginternalNet

security

NET

None.

Panzer

87

20000

Monitor

that

does

1D6damageto

'runnersandprograms

BB

Big

computergeneratedtank.

Often

cus-

tomised

byin

Corpdata

forts.

PocketVR

413

13000

Disguised

VR

"cell"

withtrace,

di�15-25Interfacerollto

detect

BB

Usually

disguisedas

apieceof

system

archi-

tectureor

simpledefenceprogram.

Too

ManyDoors

33

1000

Gives

'runnerachoice

ofdoors,disconnected

ifwrong

one

chosen

BB

Junction

of3or

moreaccess

routes.These

"doors"canbe

unlabelled,

labelledidenti-

cally,or

wrongly.

......

......

......

....

22/25 Instant Netrunning � Netrunning Softwares

Page 23: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Data

Walls

DataWall

1-10

-1000/levelBasicDataWall.ST

R=CPUs+

0to

+9(m

ax10)

CP20

Standard

DataWall.

DataWall2.0

+1

-1000

FlashyDataWall.ST

R=CPUs+

1BB

Picketfence.

Wallof

Static

+2

-2000

FlashyDataWall.ST

R=CPUs+

2BB

Shiftingwallof

static

surroundingthedata

fort.

CrystalWall

+3

-3000

FlashyDataWall.ST

R=CPUs+

3BB

Crystallinewall.

FireWall

+4

-4000

FlashyDataWall.ST

R=CPUs+

4BB

Wallof

�ame.

ReinforcedWall

+4

-4000

FlashyDataWall.ST

R=CPUs+

4BB

Verysturdy

lookingconcrete

wall.

RockisStrong

+5

-5000

FlashyDataWall.ST

R=CPUs+

5BB

Hugestonewall.

UpgradedDataWalls

Anti-Program

Wall

1-5

-4800+

Attacks

Intrusionprogramsas

Killer,+160eb/ST

RNET

Looks

likeastandard

DataWall.

Anti-Personnel

Wall

1-5

-30000+

Attacks

'runners,

2-3

Stun,

4Spazz,

5Hellbolt,

+1000eb/STR

NET

Looks

likeastandard

DataWall.

Laser

Wire

+2/2

-34000

1D6damageto

'runner(STR2),goes

inertafter3rounds

BB

Meshoflaserlight

that

reachesoutto

engulf

the'runner.

Razor

Wire

+3/3

-36000

2D6damageto

'runner(STR3),goes

inertafter3rounds

BB

DataWallsthat

cansprout

buzzsaw

blades

toattack

the'runner.

ShotgunWire

+5/5

-40000

2D6damageto

'runner(STR5),goes

inertafter3rounds

BB

Anaimpointappearson

the'runner'sIcon,

atwhich

theWallwill

�reaburstof

neural

feedback.

Wallof

Ice

+6/6

-44000

4D6damageto

'runner(STR6),goes

inertafter3rounds

BB

Huge,brain-likeimageem

ergesfrom

theData

Wallto

bombard

the'runnerwithspheresof

programming.

Superior

Net

Bar-

rier

+1

-300,000

Tighter

coding

makes

them

stronger,di�erenceeasily

noted

BB

UpgradedDataWallshave

atightmatrixwo-

veninto

them

.CodeGates

CodeGates

1-10

-1000/levelBasic

Code

Gates.

Many

variations

exist(Brainware

Blowout)

CP20

Normal

CodeGate,

butvariations

arecom-

monplace(see

BrainwareBlowout).

CorticalScanner

5-

20000

Usesabrainw

aveID

scanner.3Interfacerolls

needsto

pass

BB

Keyholethat

scansyour

Icon.

EndlessCorridor

44

8000

Requirestwopasswords.+3di�to

cracksecond

password

BB

The

Gatelookslikeacorridor

that

justkeeps

goingon

andon

andon.

Encryp

Break-

through

+1

-250,000

Tighter

coding

makes

them

stronger,di�erenceeasily

noted

BB

UpgradedCodeGateshave

atightmatrixwo-

veninto

them

.HauntingInquisi-

tion

8/6

880000

Ifyoufailto

getpastitlaunches

Psychodrome(STR6)

BB

Normal

Gateuntilit

activates.

Thenit's

whateveryour

worstnightm

areis.

......

......

......

....

Instant Netrunning � Netrunning Softwares 23/25

Page 24: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

Mazer

7-

7000

CodeGatevariant

BB

Looks

likeamaze.

Nerve

Labyrinth

6/4

NA

50000

Ifyoufailto

getpast

itdoes

4D6damageto

the'runner

(STR4)

BB

Green

labyrinththat

seem

sto

draw

inthe

'runnerandsqueezehisbrain.

Shrouded

Gate

1-10

43000+

Makes

aCodeGateinvisible.

+1000eb/1

STR

NET

Invisibleor

disguisedas

aDataWall.

Tutor

3/5

NA

50000

Easyto

crack,

buttags

'runnerso

that

ICEcanbreaklink

(STR5)

BB

Regular

CodeGatethat

givesyour

Icon

atail

which

otherICEcanyank.

Transportation

TrailerHitch

13

300

Adds20%

extraMU,Sp

eed-1

NET

Anopen-topped,

single-exittrailer.

18-W

heeler

14

500

Doubles

remaining

mem

ory(M

U-4),Sp

eed=

1NET

An18-wheeler

trailerwiththeNetrunner's

icon

onthesidesof

thetrailer.

Enhancement

Brain

Buster

46

4500

+4to

INT,+2speed

I.3

User'shead

looksas

it'ssteroids,andhe

ra-

diates

anaura

ofgreatintellect.

Gestalt

97

5600

Upto

3'runnerscancombine

INT,REF,andInterface

I.3

Whateveritwants,afterallitisasuperin-

telligence.

RacheSpecials

Mem

orial

ICE-

breaker

62

1500

Hold4programslikeaDem

on,buteach

program

hasfull

strength

BB

Anon-Euclideancorkscrew.

Bone

44

270

Attracts"D

og"programsfrom

allover

NET

RubberdogBone.

PirateUplink

57

NA

AlertsLDLsto

presence

ofillegalcalls

NET

None.

Rache'sSeeYa

62

NA

Prog15+.IDsIcon

aseither

prog,'runner,or

AI

NET

Shimmering

silver

screen,

show

snothing

(program

),sine

wave

(hum

an),

sawtooth

wave(A

I/PseudoInt).

RiceBurner

22+

NA

+1to

Net

movem

ent,-50%

deck

MU

NET

Japanese-styleracing

motorcycle.

SideWalker

33

NA

Allowsyouto

walkon

thesidesof

theOlympiasidewalks

NET

None.

Succubus

III

74

NA

Com

piler,carries2programs.2D

6anti-personneldamage

SWVeryclosevarianton

SpiderMurphy'sIcon,a

busty,

curvaceous,renditionof

ared-headed

animegirl.

Specials

EmergencySelf-

Construct

430

NA

Converts'runnerto

electronic

entity,roll1D

10+4formax

INT

BB

Swirlingvortex

ofblue

lightning

that

sucks

the'runner'sIcon

intoit;ifsuccessfulthe

Icon

laterem

erges.

Lunch

Moneyâ�

¢3

7145000

Com

piler(assassinto

killit),1D

6physical

damageto

the

'runner

BB

Super-realisticlittlegirlthat

playsinnocent,

then

getsan

evillook

init'seyes

andattacks

the'runner.

......

......

......

....

24/25 Instant Netrunning � Netrunning Softwares

Page 25: Instant Netrunning A Fuzion Plug-In by Christian Conklegabriel.chandesris.free.fr/gabysblog/docs/CyberAge2012/nethackNet... · Cyberpunk 2020's Netrunning rules and are intended

......

......

......

...Type/Name

Str

MU

Cost(eb)Function

From

Icon

SystemConstruction

Antiquated

Rou-

tines

NA

NA

50000

Circa

2013

interface.

All'runnerInitiative

rolls

at-2

BB

Older-styleandmoreprimitiveNet

imagery.

Bizzare

Encryp-

tion

NA

NA

10000

Allsystem

data

isencrypted(STR10

Gate),1-2hrsto

de-

code

BB

None.

Blood

Cat

10/5

NA

300,000

INT6pseudo-AI,ST

R5attacksvs

'runnersandprograms

BB

Dead-blackpantherwith

glow

ingred

eyes

andmouth.

TesseractConstructionNA

NA

100,000

Escherstyledata

fort,-3

to'runnerInitiative

untiluseto

itBB

Fort

Fort's

interior

de�esorientation,

up,

down

and

sideways

constantly

changing,

wallsat

impossibleangles.

Inform

ation

c ©R.Talsorian

Gam

esInc.

Allrightsreserved.

Collatedby

AndrewJames

25/11/[email protected]

New

collation

byGabyWald+AmaelAssour07/09/2012.

Instant Netrunning � Netrunning Softwares 25/25