Friday, December 17, 2010

Programming

Creating a program is based on B/R computers (programs). The base time to create a program is 24 hours (though you need not spend the entire time at once).

A program can aid a decker in several ways. Each way has a seperate TN, and extra successes cause it to take less time to create the program. The TN is usually the rating of the program, (which is the number of dice it provides to a test).

Analyze a Program: A program can be considered a piece of Rank 1 information to digitally trace a decker. If the decker has distinctive style this will work against him (as he uses the same varible names or something all the time). This assumes the program is left behind in someone else's system.

Disguise a Program: A programmer can use computers to create a digital stealth roll for the program. This is the TN for people who've located it to use it to trace the decker. Distinctive style gives -1 penalty to this roll. If they can't beat the disguise, they might find the program, but be unable to trace anyone using it.

Most of these programs must be specially designed for the system you're trying to use them on- you can't just make a bunch of programs to be used whenever. They are also disposable, you can't use the same program to break into the same system over and over.

Uses for Programs:

Extra Dice: A program may add extra dice to a hacking pool for use in either digital stealth, digital perception, or hacking itself. The TN is the number of dice the program will provide. (So a program which provides 12 dice is TN 12 and takes 24 hours). Each program is designed for a specific system, you can't use the same program over and over.

Operate System: A program may be implanted into a system and watch for a scenario where it operates things. Perhaps it turns on the lights, copies files, deletes things, etc. Such a program has a TN equal to 5+ the dice it will have to use this function, and typically must be left behind in the system afterwards.

Digitial Perception: A program can be set up to always watch for you. It counts as decker support on your behalf, and will help alert you if you are being digitally traced. The TN is 4, and the number of successes is the number of dice it will provide. This program can be left going all the time. Divide successes between lowering time and increasing dice.

TRAP: You can build a trap for your own system, each trap has a cost and rating assoicated with it as left up to the GM. (See Matrix Security).

Tracer: The program can try to do your digital tracing on your behalf. The TN is the number of dice it will have to work with, and it must also split those dice between successes, stealth, and perception. Many deckers with a good digital stealth roll don't bother with stealth or perception, instead allowing people to find a program, confidant that the can't be tracked by it. Of course, since it is openly copying data (and sending it somewhere) that connection might be traced.

Destructive Message: The program can display a message in certain circumstances, then attempt to delete itself. A clever decker can stop the deletion process, rolling computers against the rating of the program, and then they can try to trace it backwards. Most deckers would rather send the message themselves, using their own skill, but sometimes that is not possible.

Protect System: This program can try to prevent access to a system, similar to a TRAP, except that there are no consequences for failure, no disconnect, and you can keep trying until you get it. You must defeat this program before accessing the system, and the program has a TN equal to its rating. There is usally no need to disguise such a program, since you usually use it to protect your own systems.

No comments:

Post a Comment