What EVERY Netrunner Should Know...
Steps in Cracking a Datafortress
1. Library Research to determine little facts about the corporation. May
come in handy.
1a. Load up a good selection of software. Neccessary applicatioons
include one Decryption, one Intrusion, one Anti-ICE, one Protection, and a
selection of utilities depending on the purpose of the intrustion, e.g.
Viddy-Master for taking control of the computer controlled monitor system,
Kneivel for controlling vehicles, etc. Reading and Copying files are
functions of the Menu. Other programs like Demons, Daemons,
Anti-Personnell and others are useful but the extremely lucky
weefie-runner might survive a low-level datacrack without them.
Most programs require an activation and act once. Anti-ICE,
Anti-Personnell, Decryption and Intrusion work once per activation. They
may be activated again, but requires another action. Oter programs like
Stealth and Protection and Demons are activated once and stay on until
de-rezzed or deactivated.
2. Decryption vs. Codegate (Decryption Program Str+1d10 vs. Codegate
Str+1d10). If successful, proceed to step 4. If unsuccessful, continue
to step 3.
3. Intrusion vs. Datawall (Intrustion Program Str+1d10 vs. Datawall
Str+1d10). If successful, proceed to step 4. If unsuccessful and
unnoticed, try again. If unsuccessful and noticed, either a SysAdmin or
an Anti-Personnell Program has been notified of your presence and will
attempt to apprehend or discourage you, proceed to Combat!
4. Stealth vs. Detection (Detection Str+1d10 vs. Stealth Str+1d10). If
successful, proceed to step 5. If unsuccessful, the Detection Program has
notified either a SysAdmin or an Anti-Personnell Program to apprehend or
discourage you, proceed to Combat!
5. Locate CPU and either run a Menu Command or operate a remote using the
approprate utility. Often, CPU's contain further defenses that may need
to be averted and step 4 or Combat! may need to be repeated.
Combat!
-------
1. Initiative:
Human Intelligence + Deck Speed + 1D10
Computer Intelligence (CPUx3) + 1d10
2. Winner declares first amd takes one action, then each successive
highest result acts in descending order.
or, an optional rule that I prefer...
2a. Loser declares first, Winner acts first. Therefore, if an opponent is
launches an Anti-Personnell Program towards the intruder, the intruder may
either activate a suitable defense or take a chance and attack the
opponent first.
2b. Combat Options:
Intruder attacks ICE
Anti-ICE Program Str + Intelligence + Interface vs.
Program Str + Computer Intelligence (CPUx3).
Intruder attacks SysAdmin or SysAdmin attacks Intruder
Anti-Personnell Program Str + Intelligence + Interface
vs.
Protection Program Str + Intelligence + Interface
Defending CPU attacks Intruder
Anti-Personnell Program Str +
Computer Intelligence (CPUx3) vs.
Protection Program Str + Intelligence + Interface
Defending CPU attacks Intruder's Cyberdeck
Anti-System Program Str +
Computer Intelligence (CPUx3) vs.
Cyberdeck's Datawall Str + Protection Program Str +
1d10
4. Damage is allocated to affected systems or programs Strength (or Health
in the case of Black ICE).
|