Programs
 

 

 

Any hacker whether a Corpse, Lancer or Edger extraordinaire will tell you without programs to back it up, even a Blitzkrieg 2400 is just a quick reason to get dead. And that's just threats in the matrix... While hackers greedily horde the bits and pieces of circuitry and chips that compose their cyberdecks they have been known to freely help other hackers with snippets of code or even programming, as long as they see eye to eye that is. Most Lancers will charge for their work regardless of the scope involved as will most Corpse, though obviously payment for services rendered can literally equate to almost anything. By and large it's the Edgers who readily support each other. "As in the streets, so in the matrix." as they like to say...

   
  Despite this generosity, any hacker who wants to do more than be the matrix equivalent of a hard-edged razor with nothing but chipped skills, he or she has to know the nooks and crannies of coding. As hacks, encryption, decryption, and cyphers are used the various secure elements of the matrix attenuate to them, in turn. Thus the flow of virals, worms, trojans, and other symphonies of code roll on a sea of fluctuation that calls the usefulness of any utility into question if the hacker isn't capable of altering and fine-tuning them on the fly. The matrix is the realm of the quick and the dead.

 

   

Program - Utility Quickjump

   
   

 

   
   

Defensive

   
   

OffensivE

   
   

GENERAL

   
   

Virals

   

 

 

 
   

Defensive

   
 

 

 

 

 

Type

Function

Cost

INDEX

   

 

   
 

Fortitude

Diffusion Array Bonus     Matrix DRR     Diffusion Points     Storage Memory 

 

 

1:                   -                          -                      2                         48

1:2000 20
 

2:                   1                          -                      4                         74

2:5000 24
 

3:                   2                         -1                     8                         90

3:12000 28
 

4:                   3                         -2                    12                        106

4:20000 32
 

5:                   4                         -3                    16                        132

5:29000 34
  The Fortitude mod is specialized software that works hand in hand with the matrix diffusion array of a cyberdeck to augment its points and potentially its damage reduction rating and the strength of the diffusion array itself. The matrix diffusion array of a cyberdeck is the second and final line of defense that exists between a hacker and access to all systems and memory modules attached to the hacker and his deck. If this barrier is beaten potentially even the hacker's mind is at risk.
   

 

   
 

Protean Ether

Cloaking Bonus                    Iconic DRR                    Storage Memory 

 

 

1:                    -                                 -1                                 42

1:2000 20
 

2:                    1                                 -1                                 60

2:5000 24
 

3:                    2                                 -2                                 78

3:12000 28
 

4:                    3                                 -3                                 96

4:20000 32
 

5:                    4                                 -4                                114

5:29000 34
 

6:                    5                                 -5                                132

6:42000 36
  This impressive utility is specialized software that enhances the iconic cloaking integrity of a cyberdeck to potentially augment its cloaking rating, as well as its ability to reduce damage. The iconic cloaking integrity of a deck is primarily tested in matrix sensor array sweeps and whenever a subject initially attempts to penetrate a matrix sub-system or data-node beyond their jackpoint. If the enemy cannot see you, they cannot attack you.
   

 

   
 

Deception

Deception Rating                              Active Memory 

 

 

1:                                 6                                             14

1:2000 20
 

2:                                 8                                             26

2:5000 24
 

3:                                10                                             38

3:12000 28
 

4:                                12                                             50

4:20000 32
 

5:                                14                                             62

5:29000 34
 

6:                                16                                             74

6:42000 36
  The Deception program attempts to convince everyone that the hacker is legitimate and has authorized access when utilizing any of the countless nodes and subsystems. Unlike the ghost utility which tries to avoid all notice, the deception utility attempts to outright lie to queue and query programs, sys-ops, and ICE entirely. Keeping in mind that the ability to deceive other hackers or sys-ops is heavily contingent upon where exactly the hacker is at that particular moment. (ie. If the hacker is in a node that only the sys-op who has discovered the hacker is allowed to be in, obviously the Deception utility is far more limited in effect.) The deception utility also acts as the hacker's opposed defense against non-damaging attacks that are meant to hinder the hacker and or trace them to their point of origin. If successful, the trace or attack programs are deceived into backtracking the wrong trail or missing the hacker entirely. Aware of this hindrance, in most cases tracing ICE or programs are generally launched at least 3 times against any given hacker to try and ascertain the hacker's true location.
 

Note: Only either the deception or ghost program can be active at one time, never both at once.

   

 

   
 

Doppelganger

Doppelgangers                              Storage Memory 

 

 

1:                             1d4+1                                         44

1:2000 20
 

2:                             1d4+2                                         64

2:5000 24
 

3:                              2d4                                           84

3:12000 28
 

4:                             2d4+1                                        104

4:20000 32
 

5:                             2d4+2                                        124

5:29000 32
 

5:                             3d4+1                                        124

6:29000 34
  A single use per copy, the Doppelganger utility is relatively simple in function but has proven itself to be invaluable in a tight spot. This utility instantly creates multiple facsimiles of the hacker in the area/node where the program is run. These mirror-images mimic the hacker in the sense that if the hacker attacks, all the Echoes appear to attack as well, and if the hacker retreats through to another locale or node, each Echo seemingly does the same, their paths however being random and dislocated from the hacker's. This is one of the very few methods by which a hacker can potentially break off matrix sensor array lock and escape combat if desired.
   

 

   
 

Ghost

Ghost Rating                              Active Memory 

 

 

1:                                 6                                           28

1:2000 20
 

2:                                 8                                           42

2:5000 24
 

3:                                10                                          56

3:12000 28
 

4:                                12                                          70

4:20000 32
 

5:                                14                                          84

5:29000 34
 

6:                                16                                          98

6:42000 36
  The Ghost utility is just what its name seems to imply. A utility that attempts to avoid leaving any traces whatsoever over the course of utilizing the matrix or any of its countless connected sub-systems. Unlike the deception utility which tries to fool everything into thinking it's legitimate, the ghost utility is used to avoid queue and query programs, ICE and other hackers entirely. A matrix run that utilizes Ghost and manages to come off without a hitch leaves no apparent trail or tracks for ICE, trace utilities, hackers or the like to use in trying to ascertain the hacker's point of entry, real-time location in the meat-world or even how and where they breached a system at. The ghost utility also acts as the hacker's opposed defense against non-damaging attacks that are meant to hinder the hacker and or trace them to their point of origin. If successful, the trace or attack programs simply fail as if the ghosted hacker simply doesn't exist.
 

Note: Only either the ghost or deception program can be active at one time, never both at once.

   

 

   
 

Vanguard

Iconic Form Points     Diffusion Points     Reflex Penalty     Storage Memory 

 

 

1:               10                         15                       +4                        46

1:2000 24
 

2:               15                         20                       +6                        64

2:5000 28
 

3:               20                         25                       +8                        82

3:12000 28
 

4:               25                         30                      +10                       100

4:20000 32
  The Vanguard mod enhances iconic and cyberdeck resilience at some penalty to the hacker's effective reflexes. It is a one shot application, its number of uses limited to how many copies are held in some form of stored memory accessible by the hacker. Unlike weird which doesn't take too long to transfer and run, this utility, dependant upon the deck and the strength of the utility itself, can take quite some time to fully load and run. The vanguard grants the hacker additional iconic form points and diffusion points that act as the first line of defense in the matrix equivalent of a firefight.
 

Note: A hacker cannot use both the weird or protean ether simultaneously with vanguard. Likewise, while protected with the vanguard mod the cyberdeck's effective iconic cloaking integrity is halved with respect to actual cloaking, making this primarily a utility that is used when the proverbial shit has already hit the fan and the hacker decides to go to war.

   

 

   
 

Weird

Iconic Form Points                              Storage Memory 

 

 

1:                               10                                               36

1:2000 20
 

2:                               15                                               54

2:5000 24
 

3:                               20                                               72

3:12000 28
 

4:                               25                                               90

4:20000 32
  The Weird program grants the hacker additional iconic form points, allowing for a greater grace period before a hacker can be incapacitated by ICE or other hackers. It is a single use per loaded utility that doesn't stay in active memory and that once run stays in effect until the hacker jacks out or the additional iconic form points are lost in conflict, at which point to gain the benefits of the program again, the hacker must have another copy available in some form of connected storage medium.
   

 

   
 

Vanish

Succor Rating                                        Active Memory 

 

 

1:                             8                                                   44

1:2000 24
 

2:                            12                                                  64

2:5000 28
 

3:                            16                                                  84

3:12000 32
  The Vanish utility essentially acts as a random coordinate teleport within a given system or a given grid of the matrix, dependent upon where the program is utilized. This is one of the very few methods by which a hacker can potentially break off the matrix sensor array lock that enemy hackers or ICE might have on him or her, and escape combat which is the primary purpose of this mod. In the case of an in-system vanish, the hacker is limited to teleporting only to those nodes that he or she has already been within. The vanish rating is pitted against the matrix sensor array of the attacking ICE or hacker in an opposed test. If the hacker who used the vanish utility wins, all traces are lost, if however the other hacker or ICE wins, essentially the vanish rating of the utility is how many matrix combat rounds the hacker has until the ICE or hacker can reacquire them. Depending on how much the ICE or hacker beats the vanish rating, subtract that from the number of combat rounds to establish how long it will take the ICE or hacker to reacquire the hacker who used this utility.
   

 

   
 

Echo Mirage

Boost Bonus                              Active Memory 

 

 

1:                                +2                                         12

1:2000 24
 

2:                                +4                                         24

2:5000 28
 

3:                                +6                                         36

3:12000 32
  The Echo Mirage utility potentially enhances either the ghost or deception utilities, dependent upon whichever the hacker is utilizing. Whenever an attack or query that targets the hacker's deception or ghost utility is directed at them, the echo mirage mod temporarily augments the rating of the base utility to resist the attack or query.
   

 

   
 

Disperse

Warp Winds Rating                    Layers                    Storage Memory 

 

 

1:                       8                                  3                              64

1:2000 20
 

2:                      10                                 3                              80

2:5000 24
 

3:                      12                                 3                              96

3:12000 28
 

4:                      14                                 3                             112

4:20000 32
 

5:                      16                                 3                             128

5:29000 34
  The Disperse utility is memory intensive, expensive, and in the right circumstances invaluable. Because of its usefulness most hackers guard it jealously, keeping only a single copy in memory (In case their memory becomes compromised.) and running it upon their initial entry into the matrix. This program is used and no longer takes up active memory as it interposes 3 layers of protection, wherein matrix coordinates are redirected as an extra line of defense against various other programs and virals. If the hacker would be affected, roll an opposed rating test, if it's successful the offensive attack, trace, viral, etc. is reflected back on the offending hacker (if applicable) otherwise the attack simply disperses elsewhere, and one layer of protection is removed from the total number.
 

Note: Disperse is ineffective against the Sigil or Void Sigil attack utilities.

   

 

   

 
   
  Much like the cyber-enhanced razors who run the ops and rule the streets like the legendary samurai of old and who have even adopted that appellation to some degree, hackers have their own vernacular and sub-culture. Where the street samurai have adopted an ancient feudal Japanese traditional paradigm, hackers have gone the route of techno wizardry, equating themselves with the larger than life icons that digitally represent themselves.

 

 

   

Offensive

   
 

 

 

 

 

Type

Function

Cost

INDEX

   

 

   
 

Darkness

Darkness Rating                                                  Storage Memory 

 

 

1:                        6                                                              42

1:2000 20
 

2:                        8                                                              60

2:5000 24
 

3:                       10                                                             78

3:12000 28
 

4:                       12                                                             92

4:20000 32
 

5:                       14                                                            110

5:20000 32
 

6:                       16                                                            128

6:29000 34
  The Darkness utility targets the ICE, program, or hacker's matrix sensor array in an attempt to weaken and potentially even blind it. The Soul Sear rating is pitted against the target's matrix sensor array rating and if it prevails, deals 1 point of rating damage for every 2 points it exceeds the matrix sensor array's opposed roll. Each time the sensor array's rating is reduced by 2 points or more, the target must reacquire the target to pursue combat. The sensor array's rating remains reduced however much it is until or unless the hacker is able to cycle the power on their deck.
   

 

   
 

Sigil

Sigil Rating                                       Active Memory 

 

 

1:                             6                                                 64

1:2000 20
 

2:                             8                                                 60

2:5000 24
 

3:                            10                                                78

3:12000 28
 

4:                            12                                                92

4:20000 32
 

5:                            14                                               110

5:20000 32
 

6:                            16                                               128

6:29000 34
  The Sigil program manifests within the matrix as a specific weapon or set of weapons, that are as specific and singular in nature as is a hacker's icon. Though the doppelganger mod duplicates remain a fair defense against this weapon, other defenses such as Reflection are bypassed as the hacker closes in on enemy ICE or hackers and joins combat. This is an opposed test pitting the hacker against the targets ICI/IFI/IDRR and if successful the hacker does damage to the target's iconic form points. Once the hacker reduces the IFP to 0 the targeted ICE pixelates or the hacker's MDA/MDP/MDRR become vulnerable to attack. (Damage is equal to the rating of the Focai utility.)
   

 

   
 

Hoar Wail

Hoar Sprite Rating     Reflex Penalty - Data Transfer Penalty     Storage Memory 

 

 

1:            6                                      -4   -    -2                                   36

1:2000 20
 

2:            8                                      -6    -   -4                                   52

2:5000 24
 

3:           10                                     -8    -   -6                                    78

3:12000 28
 

4:           12                                    -10   -   -8                                    94

4:20000 32
 

5:           14                                    -12   -  -10                                   110

5:20000 32
 

6:           16                                    -14   -  -12                                   126

6:29000 34
  The Hoar utility blasts the targeted ICE, program, or hacker with an icy frost effect that can slow the target's MR and DTR. Resisted by either the target's Deception or Ghost utility in an opposed test, if the Hoar attack is successful the target can find that their ability to fight and recover has been severely hampered.
   

 

   
 

Void Sigil

Range Focai Rating                                       Active Memory 

 

 

1:                             2                                                       64

1:2000 20
 

2:                             4                                                       60

2:5000 24
 

3:                             6                                                       78

3:12000 28
 

4:                             8                                                       92

4:20000 32
 

5:                            10                                                     110

5:20000 32
 

6:                            12                                                     128

6:29000 34
  The Ranged Focai utility manifests within the matrix as a specific weapon or set of weapons, that are as specific and singular in nature as is a hacker's icon. Though Mirror utility duplicates remain a fair defense against this weapon, other defenses such as Reflection are bypassed as the hacker closes in on enemy ICE or hackers and joins combat. This is an opposed test pitting the hacker against the targets ICI/IFI/IDRR and if successful the hacker does damage to the targets IFP. Once the hacker reduces the IFP to 0 the targeted ICE pixelates or the hacker's MDA/MDP/MDRR become vulnerable to attack. The benefit of the Ranged Focai over Focai is the ability to attack foes adjacent to the hacker, ICE or program though the damage output is slightly lessened. (Damage is equal to the rating of the Ranged Focai utility.)
   

 

   
 

Censure

Reveal Rating                                        Storage Memory 

 

 

1:                            6                                                    64

1:2000 20
 

2:                            8                                                    60

2:5000 24
 

3:                           10                                                   78

3:12000 28
 

4:                           12                                                   92

4:20000 32
 

5:                           14                                                  110

5:20000 32
 

6:                           16                                                  128

6:29000 34
  The Reveal utility essentially focuses on limiting or completely ruining a hacker's Deception or Ghost capabilities by degrading the effective rating of either. The Reveal rating is pitted against the Deception or Ghost utility's rating and if the Reveal utility prevails, for each point it beats the other program by, reduce that program's effective rating by an equal amount. (Round down.) This reduction is essentially permanent with respect to that specific operating version of the given utility, however the Ghost or Deception program can be reloaded from the victim's SMMU and essentially regain its full potency. (Assuming of course that the hacker has a backup available.) If the hacker is not protected by Deception or Ghost, Reveal instead affects the Cloaking value of the targeted hacker's ICI rating at half strength though the effect persists until the hacker is able to cycle the power on their deck.
   

 

   
 

Trace

Trace Rating                                        Storage Memory 

 

 

1:                             6                                                  64

1:2000 20
 

2:                             8                                                  60

2:5000 24
 

3:                            10                                                 78

3:12000 28
 

4:                            12                                                 92

4:20000 32
 

5:                            14                                                110

5:20000 32
 

6:                            16                                                128

6:29000 34
  The Trace utility initializes a backtrack on a hacker or program's signal in an attempt to locate their point of origin. (For each continental or satellite jump a hacker gains a +1 to their effect Ghost or Deception rating, but suffers a -2 for each jump, to their MR.) Once the Trace has located, (whether correctly or falsely) what it perceives to be the hacker or program's point of origin, it immediately reports that information back to the initiating ICE, program, system or hacker.
   

 

   
 

Garble

Trace Rating                                        Storage Memory 

 

 

1:                             6                                                  64

1:2000 20
 

2:                             8                                                  60

2:5000 24
 

3:                            10                                                 78

3:12000 28
 

4:                            12                                                 92

4:20000 32
 

5:                            14                                                110

5:20000 32
 

6:                            16                                                128

6:29000 34
  The Trace utility initializes a backtrack on a hacker or program's signal in an attempt to locate their point of origin. (For each continental or satellite jump a hacker gains a +1 to their effect Ghost or Deception rating, but suffers a -2 for each jump, to their MR.) Once the Trace has located, (whether correctly or falsely) what it perceives to be the hacker or program's point of origin, it immediately reports that information back to the initiating ICE, program, system or hacker.
   

 

   
   

 

   

 

 

 
Type Desc Credits Index
GENERAL

Cipher

Cipher/R          SMMU

   
1:                                 6                 42 1:2000

24

2:                                 8                 60 2:5000 28
3:                                10                78 3:12000 32
4:                                12                92 4:20000 36
5:                                14               110 5:20000 36
6:                                16               128 6:20000 40
Dubbed ASE (ACE), The All-Seeing Eye, this program is fairly straight forward in its purpose and application. The hacker utilizes this relatively large program to decipher or break the encryption that one can find attached to almost any and all data within the matrix. Those with the hacking skill can further augment this program by 1 step for every 2 skill levels they possess in hacking and multiple attempts can be made. However, for every failed attempt, the Cipher suffers a -2 to its rating per each previous failure for any and all future checks against said encryption.  
Abbreviation Key: (MSA - Matrix Sensor Array) (AMMU - Active Micro-Memory Units)
       

Crypto

Crypto/R          SMMU

   
1:                                 6                64 1:2000

24

2:                                 8                64 2:5000 28
3:                                10                64 3:12000 32
4:                                12                64 4:20000 36
5:                                14                64 5:20000 36
6:                                16                64 6:20000 40
Like the Cipher program, the Crypto program is fairly straight forward and obvious in both its purpose and use. Without some form of encryption the data both on a hackers cyberdeck as well as his own micro-memory can be sifted through for data by various programs if the hacker or cyberdecks other potential defenses have already been disabled or circumvented. With regards to encryption either with or sans Crypto, a hacker can add 1 step to the level of encryption difficulty for every 2 points he or she possesses in hacking.

Abbreviation Key: (ICI - Iconic Cloaking Integrity) (IFI - Iconic Form Integrity) (Iconic Damage Reduction Rating) (MDA - Matrix Diffusion Array) (MDP - Matrix Diffusion Points) (MDRR - Matrix Damage Reduction Rating) (AMMU - Active Micro-Memory Units)

       

Hollow Daemon

Nimbus/R          SMMU

   
1:                                 6                  64 1:2000

24

2:                                 8                  64 2:5000 28
3:                                10                 64 3:12000 32
4:                                12                 64 4:20000 36
5:                                14                 64 5:20000 36
6:                                16                 64 6:20000 40
Hollow Daemons are semi-autonomous programs that can be utilized for a host of functions, serving as advanced data gathering and correlation drones, to semi-autonomous attack drones within the matrix. The number of Hollow Daemons that can be in affect at any given time is the cyberdecks TR/5 and regardless of the level of the Hollow Daemon itself, its attributes in all primary categories are 1/2 those of the originating cyberdeck. Any programs or virals attached to a Hollow Daemon are limited in rating by the original viral or utility being used, and have no relation to the Hollow Daemon rating. For each variable or contingency with its own sub-set of utility protocols that is combined in a Hollow Daemon add 1 to its size. (ie. If encountering Trace ICE destroy yourself, etc.) 
Abbreviation Key: (ICI - Iconic Cloaking Integrity) (AMMU - Active Micro-Memory Units) (SMMU - Storage Micro-Memory Units)
       
loop report viral feed surge      
       
       
       
       
       
       
       
       
       
       

 

The various Sub-Utilities are as follows: All sub-utilities of Trace programs attack the target hackers deck directly, and are opposed by the target decks MDA/R (Master Diffusion Array Rating) and can likewise be combated by various programs and/or virals in some cases. The Report utility once having found the targets LTG reports the hackers LTG to the one who sent out the Trace. Loop causes the target hackers deck to recursively loop causing loss of active memory at a geometric rate starting at 6 per turn. (ie. 6-36-1296) Thus no deck lasts more than two turns. (Specific Defenses and/or Virals can provide a safeguard against this affect as will a VAI if the cyberdeck in question is equipped with such. In the case of Viral sub-utilities, the specific viral is released and functions as it normally. The Sim-Feed option usually involves sending some form of single shot sim-sense media to the target. (This option is unopposed by target cyberdecks except for use of the Data-Lock Viral.) Surge is directly opposed by a decks MDA/R and if successful disrupts the hackers connection causing him or her to be dumped and suffer the affects of dump shock. Fry is directly opposed by a decks MDA/R and if successful has various affects. (Paralysis - Neural Disorder - Brainwipe - Idiocy - Death) (Note: In the case of Surge and Fry their effective rating is the same as that of the initial Trace with respect to the opposed test against a target hackers MDA/R.)

Virals

The Dump viral, like all virals varies in effect based on what it is attacking. Against hackers the dump viral attacks the MDA/R of the target hackers deck and if successful causes a cessation in the hackers matrix signal which dumps the hacker out of the matrix and forces he or she to deal with dumb shock. When placed in nodes, whether they be data or link nodes, dump goes against the specific program, node or data-base's system rating and if successful anyone who tries to connect to the affected data, node, etc. will be be unable to until the viral has been wiped away.

The Nani viral was likewise intended as a tool for programming and modifying nanite tattoos and/or nanite based cybernetic systems and the like. Like Data-Lock, it has since been used as a virulent weapon against hackers. The viral makes an opposed test against a system or decks MDA/R and if successful carries out its specific orders and directs specific forms of nanites to alter or change their function.

Note:Anyone can launch a viral, but to code and direct the specific form of nanites to be affected a hacker requires the Nanite Interface skill. Likewise, most cyber or bioware nanites are hard-coded and notoriously difficult to alter. For purposes of altering any nanite save those recurrent in nanite tattoos, the Viral Rating of the Nani virus is lowered by 2. Likewise, for each grade of the cyberware above base level apply an additional -3 to the nani viral. (ie. Alpha: -5 Beta: -8 Delta: -11 with Omega being immune to this affect.) Usually tailored for generic affects that are known augmentations that hackers utilize. (Data-jacks - Micro Memory, etc.) Effects can vary from having the targets data-jack destroy itself, to removing the necessary buffers between micro-memory and brain tissue, potentially killing or causing brain damage to the hacker in question. (As of yet, there is no counter to Nani other than Data-Lock.