(collab, Caellath)A joint-venture of several companies very soon grew into one thanks to their invention, which is most aptly described as a
omni-builder, adaptive machines that were capable of performing near-miracles of engineering and dominated factories, dishing out from everything from Toaster(s) to heavy military machinery. The company group called themselves C.A.E.
Soon enough almost all of the countries in the world had enormous C.A.E. industrial complexes built in the countryside. Even though they sell basically similar goods to all their consumers, the ones who were willing to pay more were given slight edges over their enemies. The world isn't in Cold War vibe—at least not officially—nor does it seem like the world is being dominated by a giant corporation—again, officially—but the beast's tendrils were already everywhere. The population at large is ignorant, and all of the conflicts waged using the brand new technologies took place in poor countries were the weapons of war can be honed and prepared in secrecy, while the developed nations pretended not to see what is going on in the hopes of gaining the latest treats from the most powerful organization worldwide.
Of course, you can not stop the Internet. Some people sniffed out trouble even though most of the information fed to the masses happened to be fabricated—at times not even fed at all—and some of those went beyond, uniting as a group and deciding to take action towards whatever is happening. These individuals managed to secure a few crates of the Corps material and a rudimentary SDK
* through luck and skill; their struggle against the deadly emerging world power starts now.
"Hacking" is mostly covered by automated programs; they can be either made, or purchased as obfuscated (=uneditable) code.
Programs have a few major classifications:
Sniffers "sniff" out the defenses of a target and determine how many programs you can deploy against the defending systems.
Hacking programs are all programs that are used to actively attack.
Defense programs are all programs for defense.
Viruses, trojans, worms, other are programs that aren't used in a normal way.
Programs all have the following stats:
Datatrail—The "stealthiness" of a program. The lower the better.
Padding—How much data the program can take before it is shut down.
Junk code—Basically "HP" for the program; it has a chance of taking a hit instead of the padding.
Encryption—The "armor" of a program. It makes it harder to attack its code.
Sniffers have these stats:
Sensitivity—The ability to find existing ports.
Force—The ability to create new ports. The downside to this approach is that all stealth is sacrificed.
Hacking programs and defense programs have these stats:
Attack—The ability to delete the code of a defending program.
Trojans, worms, and viruses are statted on a case-by-case basis.
ie, How Combat Is Resolved
1. Sniff out how many ports you can access, and the defending programs of the enemy.
2. Deploy programs to combat the enemy's.
3. Combat by <d20 + Attack> vs <Encryption>, deal rolls' difference of damage.
4. If the defending side deletes all the attacker's programs, the battle is ended.
4+: If the attacker deletes all the defender's programs, the attacker may conduct a few actions.
Deleted programs aren't permanently deleted by default. However, the attack may choose to delete the defender's programs permanently during his few actions.
Name:
Gender:
Appearance:
Other:
HP: 10/10
Inventory:
Money, 11 credits
Laptop
Wireless card
Omnibuilder:
Slot 1
Programs list:
(see spoiler below)
Though you can create custom programs, at first you will use standard ones.
Having multiple copies of the same program would be useful if you want to use more than one of it during a battle, for example.
Hacking programs:
Hack 1.0 / Datatrail 20; Padding 3; Encryption 3; Attack 2 / 1 credit
Your basic hacking program.
Bug / Datatrail 10; Padding 1; Encryption 0; Attack 4 / 1 credit
Quick, agile, fragile, and bites hard.
Hack 2.0 / Datatrail 20; Padding 5; Encryption 3; Attack 3 / 2 credits
Hack+
Mandel Bug / Datatrail 8; Padding 1; Encryption 0; Attack 5 / 2 credits
It's not a bug, it's a feature!
Kernel / Datatrail 5; Padding 1; Encryption 5; Attack 0 / 2 credits
Drop a kernel into a defeated system; it supports one hidden program.
Centipede / (sniffer) Sensitivity 10; Padding 1; Encryption 0; / 1 credit
Crawls like the creepy bug it is named after all over the ports.
Windows Firewall / Datatrail 50; Padding 20; Junk Code 20; Encryption 0; Attack 1 / 1 credit
Windows Quality, cerca 1995!
Other programs:
Visual Studio S3 / 4 credits
+1 to one programming roll out of three.
Snoop / Datatrail 12 / 2 credits
A hidden program that sends information of documents on that system.
((Any ideas for "Other programs" will be reviewed if you post them o_O It's hard to create.
As for hacking programs, there are more than the short list above. Just not now.))
Other than the hacking-related rolls, all rolls are with a d6.
5 players, probably.