User Tools

Site Tools


rpg:granite_city_limits:encyclopedia:computers:programs

Programs on File

Hacking Programs

Name Execution Skill Defaults Complexity Effect
Alter Single-Execution Computer Hacking-3 or Computer Programming-3 4 Change target program or data object in such a way as to serve a different purpose, but still function and appear valid. Use Alter to insert technically consistent records into a database, build a back door into an ICE program (add margin of success on Alter to subsequent rolls to Breach the ICE; see p. 8), or change the way that a program works (e.g., a scheduled money transfer moves the funds into a numbered Swiss account instead of its usual destination). Successfully made, such changes will go unnoticed until their results become apparent (disinformation spread, funds missing, etc.), unless the program or datum is successfully Analyzed (see below) – the Analyze roll must succeed by a greater margin than the original Alter roll.
Analyze Continuous or Single Execution Computer Programming-3 or Expert(Computer Security)-2. 3 Get information about the target user, computer, program, or data object. A successful roll returns useful information – file or user ID, running programs (and their Complexity), profile, network address, physical access location, or whatever the GM determines is available. If Alter, Spoof, or Stealth programs have been used to obscure or change the target, the Analyze program must win a Quick Contest against the deceptive program in order to detect the forgery and get accurate information. A victory on this roll also tells the program user about the presence of the obscuring programs, which can then be investigated further. Analyze can be invoked as a single-execution program to examine a specific target, or set to run continuously to monitor the status of a particular file, computer, or program. Analyze can be run on a target protected by an ICE program, but Analyze will only give information about the ICE and any programs that are running through it (Analyze, Listen, or Search). It can also be set to cyclically scan all programs and data on a single computer, looking for irregularities (Alter, unauthorized instances of Control, etc.), or Triggered (p. 9) to scan users or programs that meet certain criteria. In all cases, it can call a Trigger program when certain results are obtained, or pass information to a sysadmin (or AI) for a more thorough examination.
Breach Single-Execution Computer Hacking-2 3 Penetrate a target ICE program to gain unauthorized access to the network, computer, program, or data it protects. Breach must win a Quick Contest against the ICE; victory grants the hacker access to the target, allowing him to execute other programs on it. A target protected by multiple layers of ICE can only be accessed after all instances are defeated.
Control Single-Execution Computer Hacking-2 or Computer Operation-3 4 Take over function of the target computer. A successful roll allows the netrunner to cause a compromised computer to carry out any function known to him of which it’s normally capable – shut down, erase or transfer data, run or halt installed programs, etc. It can also allow remote control of a networked device (security cameras, machine-gun sentries, etc.), in which case the program defaults to the appropriate Electronics Operation specialty. This roll is only contested if another user is trying to Control the same computer to make it do something different. An individual program, device, or database that is protected by its own layer of ICE cannot be Controlled (or otherwise accessed) until the ICE protecting it is defeated. Each instance of internal ICE on a computer (protecting a particular program, database, or system) protects itself from tampering, and cannot be Controlled until it’s been individually Breached or Spoofed.
Damage Single-Execution Computer Hacking-3 or Expert (Computer Security)-3 5 Create a destructive feedback loop in the target computer, causing physical damage; hardened computers impose a -3 to the program’s skill level. Against most computers, a success will cause a crash and disable the system until 1d days and 1d x 10% of the computer’s original cost have been put into repairs. (Any permanent data loss is up to the GM; most important systems will have multiple redundant, off-site backups.) Against a cyberdeck, it forces the decker to make an immediate HT roll (+3 for a hardened cyberdeck); success incurs 1d burning damage to the decker’s brain, but allows him to act normally, though any programs are rolled at a penalty equal to the damage taken. (Most deckers opt to jack out at this point.) Failure causes 2d damage, and totally incapacitates the decker; critical success avoids all damage, while critical failure increases damage to 3d. Successive uses of the Damage program against an incapacitated decker are resisted at -5. This is the phenomenon known as “flatlining” – a flatlined character can do nothing on his turn but attempt to recover with a HT roll, at a penalty for the damage taken that round, but at +3 for a hardened cyberdeck. If he recovers, he can jack out immediately, but if he chooses to remain jacked in, he can’t invoke any new programs until the next round.
ICE Continuous Computer Hacking-2 or Expert (Computer Security) 3 Intrusion Countermeasure Electronics deny unauthorized access to a network, computer, program, or data object. ICE runs continuously, generally alongside a Listen program to grant access to those with the proper credentials. As long as it’s in effect, no program can be executed on the protected object without satisfying the Listen program or successfully Breaching the ICE, or Spoofing the gatekeeper Listen program. An ICE program that has been successfully Breached is considered “off” until it’s restarted by a sysadmin or automated defense system (or a hacker covering his tracks); ICE that’s been Spoofed is still “on,” but has granted access to the netrunner for the current session (until he disconnects from that computer). Highly secure systems often run several instances of ICE – one to restrict access to the computer itself, and others to protect critical programs, classified databases, etc. ICE can allow some communication through. For example, a Listen program that’s functioning as gatekeeper for the ICE, or an Analyze or Search that’s reaching through the computer’s ICE to look around the network (or monitor the ICE), can still be Spoofed. ICE doesn’t prevent the protected object from being found in a Search, but it does prevent the object’s contents from being Altered, Controlled, Searched, or otherwise accessed. For example, a Search executed over a penetrated network can find an individual computer protected by its own ICE, but that ICE would have to be defeated before the computer could be Controlled, or a Search invoked to find a specific program or datum on it.
Jam Continuous Computer Hacking-2 2 Overwhelm an Analyze, Listen, or Search program, or a specific mode of communication, with static or meaningless input. If the Jam is successful (no contested roll needed), the target can’t receive any input from the jammed source – programs error out, and comm channels buzz with white noise – until the Jam is terminated, or its source is disconnected from the network. This is an easy, brute-force way to interrupt communication, but it does nothing to “fool” the target – so if, for example, an Analyze program is set to alert the sysadmin of any errors in an ICE program, jamming it will draw as much attention as allowing it to report a Breach.
Listen Continuous Computer Hacking-2 or Expert (Computer Security) 2 Passive reception of communications. This program can either listen for specific kinds of messages (login attempts, etc.) or capture all traffic over a specific communication channel. When used for access control, Listen can be set to allow authorized users through a particular instance of an ICE program. In this case, it can be Spoofed (see below); the Spoof program must win a Quick Contest against Listen to allow a user through the ICE. When used to snoop, Listen only captures data – if it’s encrypted, the hacker will have to decrypt it (see Code-Cracking). Listen must overcome Stealth, winning a Quick Contest, in order to detect a cloaked communication; it has no chance to overcome Jam (see above), and will simply capture any misinformation presented by Spoof. Whatever mode it’s used in, Listen can call a Trigger program if received information meets certain criteria (unsuccessful access attempts, etc.).
Search Continuous or Single-Execution Computer Operation-2 or Expert (Computer Security)-1 3 Actively seek out a particular program or piece of data on a computer, or a particular computer on a network. A success finds the target, allowing further programs to be executed on it (once its ICE is defeated, of course!). Search must win a Quick Contest against Stealth, or Spoof used to mask a target’s identity, in order to find targets protected by those programs. Run continuously, Search can scan a computer or network for a certain class of target, such as “unauthorized programs.” Search can be set to activate a Trigger program when specified types of targets are found.
Spoof Continuous or Single-Execution Computer Hacking-3 4 Feed false information to an Analyze, Listen, or Search program. Use Spoof to actively fool a program that’s looking for specific information, or to continuously masquerade as a legitimate user. For example, if an Analyze program is set to monitor the status of an ICE program, Spoof can attempt to convince Analyze that the ICE is still up after it’s been Breached. Analyze and Search can see through a Spoof if they win a Quick Contest against it; Listen only needs to tie the Contest to deny access through ICE, but gets no roll when simply recording Spoofed information.
Stealth Continuous Computer Hacking-3 or Expert (Computer Security)-3 4 Mask a user, program, computer, or data object from Analyze, Listen, and Search. While running, Stealth resists any attempt to find or examine the cloaked object – such programs must win a Quick Contest with Stealth in order to get any information at all. Of course, to many sysadmins, inconclusive results on an Analyze attempt are cause for further investigation . . .
Trigger Continuous Computer Operation or Expert (Computer Security) 3 Delayed, conditional execution of one or more other programs. Trigger can function as an automated link between information-gathering programs (Analyze, Listen, and Search), and other programs that are activated in response to certain information. It can also perform normal functions of the computer (shutdown, send alerts to the sysadmin, etc.), and can be set to activate on a schedule rather than in response to other programs. Trigger requires no roll; it’s called after Analyze, Listen, or Search have successfully defeated any Spoof or Stealth programs. The number of programs that a single instance of Trigger can initiate is equal to its Complexity; the programs can be called all at once (with the normal penalties for invoking multiple programs), or staggered to execute in stages. A single instance of Trigger can only be set to respond to one instance of a specific info-gathering program, but multiple Triggers can be keyed to multiple programs and instances. Many combinations are possible; some of the more common are Triggers set to run an Analyze on any user attempting to access a given computer, or to shut down a system when unauthorized access is detected.

Other Programs

Name Skill Complexity Effect
Swarm Controller Software Electronics Operation (Robots) 4 Lets a user command and control microbot swarms using a radio, laser, or infrared communicator. The GM can make a secret Electronics Operation (Robots) roll to see if the swarm understands the orders (apply penalties for confusing instructions). Failure means the swarm does not do exactly what was intended. A separate program is needed for each swarm type. Complexity 4, normal cost. LC is that of the swarm.
Holotech Editing Program Electronics Operation (Media) 6 Software for creating or editing holotech and 3D camera images. It can be used to produce computerized holographic animation, special effects, etc. Use Electronics Operation (Media) skill. Complexity 6 software, normal cost. LC4.
VR Environmental Database - - Virtual wilds, streets, malls, cities, and worlds include simulations of animals or people as well as live users, but they are not really “alive” until someone else encounters them. Large areas may also use “generic scenery” to fill in backgrounds. A virtual city may only have a few thousand specific building interiors, assembling other rooms from “cut and paste” programs whenever individuals visit them. Divide the required database space by 10 for a “cartoon” level of imagery; multiply by 10 for “lifelike” imagery with fewer generic details. “Lifelike” imagery experienced with full or total VR is nearly indistinguishable from reality.
Packaged Characters and Settings: prices are about $1,000 per PB for off-the-shelf realities or standard character avatars. These costs drop by a factor of 1,000 per TL beyond TL9; however, customized settings and characters, may cost 10 times as much as generic material. Many system managers prefer to program their own characters and environments.

Virtual character 0.001 TB; Virtual room 0.001 TB; Virtual house or park 0.01 TB; Virtual mansion or wilderness 0.1 TB; Virtual street or mall 1 TB; Virtual neighborhood 10 TB; Virtual town 100 TB; Virtual city 1,000 TB; Virtual small nation 10,000 TB; Virtual large nation 100,000 TB; Virtual planet 1,000,000 TB; Virtual interplanetary state 10,000,000 TB; Virtual interstellar state 100,000,000 TB; Virtual galactic empire 1,000,000,000 TB.
Memory Augmentation AR - - This “mug shot” database is a common AR program. It uses stored or net-accessible databases ranging from the commonplace (such as celebrities) to the job-specific (a cop’s database of wanted criminals). Most people accumulate personal databases of people they meet or expect to meet, co-workers, and so on. If the user’s wearable camera (or eyes, if he uses a brain implant) spots someone whose face is in the database, the program will automatically display that person’s name and a brief identifier. The program can be told to ignore relatives and other constant companions. Similar remembrance-agent programs and databases can be acquired for other tasks, such as recognizing artwork, wildlife, and vehicles. For instance, a bounty hunter’s computer might be linked to a database of “Earth’s Most Wanted.” If he saw someone on that list, the computer would make a match and instantly send him the file, which would appear before his eyes. Then he might zero in on the weapon his target was carrying and upload its specs. Memory augmentation can be used with data-mining programs that continually search private or public networks for content relevant to the user’s current situation, then present that information as appropriate. For example, if the user encounters a person who isn’t in his standard database, that person’s picture and identity are very likely to be available online.
Visual Enhancement AR Vision 4 This gives +1 to Vision rolls.
Cosmetic Filter AR Attractiveness 4 A common augmented reality program, this controls the audio-video display on a communication system. When activated, the video uplink picks up the user’s image as usual, but filters it through a preprogrammed “ideal” of beauty before transmitting it to the receiver. The user still looks like himself, but the program tightens sagging jowls, erases crow’s feet and wrinkles, and removes or minimizes blemishes. The user’s video Appearance rises by one level, but cannot exceed Very Handsome. Any enhancement above Attractive has the Off-the-Shelf Looks modifier applied. Cosmetic filters designed for one species often produce very strange results for another species! A cosmetic filter is Complexity 4, $400. LC4.
Video Masking Disguise 5 This works like a cosmetic filter, except that it can change the user’s features and voice. The user may resemble another person, or adopt a persona created by the program. Complexity 5, $800. LC4.
Smart Diagnostics - - Many TL9+ objects incorporate built-in sensors to monitor their own status. This could be a milk carton checking to see if the milk is spoiled, or a precision machine measuring microstresses in its components. The data from these sensors can be continuously uploaded to local (or planetary) networks, and accessed by looking at the object.

Virtual Tutors

These systems simplify tasks such as repairing a car engine or building a prefabricated house. A mechanism may have dozens (or thousands) of different parts tagged with microcommunicators and positional sensors. Integral databases know where each part goes, and virtual tutoring software can track both the parts and the user’s own hand movements, aiding in assembly, disassembly, preparation, or maintenance.

For example, when a repair technician (human or machine) walks up to a broken device, the device’s components transmit diagnostics and positional information to the tech’s computer. The computer then presents step-by-step guides for the technician to follow. Since all the parts and tools are tagged, often with additional sensors that monitor things such as stress, current flow, etc., an object-specific “virtual repair manual” can warn the technician if he is taking apart or putting the object back together the wrong way, or if there are internal faults.

The same technology can apply to other tasks requiring rote manual actions. Each widget, brick, pipe, or module has a chip and sensor in it that knows where it goes and whether it’s been installed correctly. Augmented reality has enabled a resurgence in unskilled labor, since these technologies permit untrained individuals to perform complex tasks.

Virtual Tutor Program

This augmented reality program coaches the user in a specific task, such as assembling electronics or fixing a car engine. The user has an effective skill of 12. Complexity 3 if the task normally uses an Easy skill, Complexity 4 if it uses a harder skill or if it uses several skills in concert (such as building a house). Any necessary parts must be purchased as instructor kits. Normal cost. LC4.

Invisible Friends

Computers may be inhabited by digital minds. If so, it may be popular to have a computer manifest through augmented reality as a virtual companion standing or sitting a few feet away from its owner. The “invisible friend” might truly only be visible to the user, or the image could be transmitted to anyone else sharing the same network who would be in a position to see the person.

rpg/granite_city_limits/encyclopedia/computers/programs.txt · Last modified: 2024/10/06 14:00 by wizardofaus_doku

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki