Difference between revisions of "SR5:Matrix:Programs"
(→Hacking Programs) |
m (→Bootstrap) |
||
Line 37: | Line 37: | ||
===Bootstrap=== | ===Bootstrap=== | ||
;Format Device:Set up a variety of tasks to in the boot record. | ;Format Device:Set up a variety of tasks to in the boot record. | ||
− | An IT expert’s tool of choice when | + | An IT expert’s tool of choice when working with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function. |
− | |||
===Browse=== | ===Browse=== |
Revision as of 22:28, 28 December 2017
5th Edition Rules |
---|
Basics // Combat // Magic // Matrix // Driving // Character Creation |
Basics | Skills/Attributes | Actions | Jargon | Cyberdecks | Programs | How To | Complex Forms | Echoes | Sprites | Sprite Powers | IC |
---|
Contents
- 1 Agents
- 2 Commlink Apps
- 3 Common Programs
- 4 Hacking Programs
- 4.1 Armor
- 4.2 Baby Monitor
- 4.3 Biofeedback
- 4.4 Biofeedback Filter
- 4.5 Blackout
- 4.6 Cat's Paw
- 4.7 Cloudless
- 4.8 Crash
- 4.9 Decryption
- 4.10 Defuse
- 4.11 Demolition
- 4.12 Detonator
- 4.13 Fly on a Wall
- 4.14 Exploit
- 4.15 Evaluate
- 4.16 Fork
- 4.17 Guard
- 4.18 Hammer
- 4.19 Hitchhiker
- 4.20 Lockdown
- 4.21 Mugger
- 4.22 Nuke-from-Orbit
- 4.23 Paintjob
- 4.24 Shell
- 4.25 Smoke-and-Mirrors
- 4.26 Sneak
- 4.27 Stealth
- 4.28 Swerve
- 4.29 Tantrum
- 4.30 Tarball
- 4.31 Track
- 4.32 Wrapper
Agents
Type | Avail | Cost | Source |
---|---|---|---|
Agent (Rating 1-3) | Rating*3 | Rating*1000¥ | Core |
Agent (Rating 4-6) | Rating*3 | Rating*2000¥ | Core |
Agents are autonomous programs that are rated from 1 to 6. Each agent occupies one program slot on your deck. Agents use the Matrix attributes of the device they run on, and their rating (up to 6) for attributes. Agents also have the Computer, Hacking, and Cybercombat skills at a rating equal to their own. An agent runs as a program and can use programs running on the same device as them.
You can have your agent perform Matrix actions for you. When an agent is running, it has its own persona (and icon). An agent is about as smart as a pilot program of the same rating.
Any attack on an agent damages the device on which it is running, rather than the agent itself (which is, after all, merely a program). This means that if you’re running an agent on your deck, you and it share the same Matrix Condition Monitor.
Commlink Apps
Simple little programs, apps are useless for hacking against other devices or hosts. They usually only enhance a user’s augmented reality or virtual reality experience, with a few minor options for support programs. A commlink can run as many apps as half its Device Rating, rounded up.
AR Games: Typically casual games that are displayed in augmented reality, allowing a user to enjoy them as a pastime while also still somewhat paying attention to reality. The number on the market is huge, with some older flatscreen and trid games being modified to run on commlinks.
Diagnostics: An ongoing self-evaluation system that monitors all the devices in a user’s PAN, giving constant vital statistics on their behavior. Popular with computer-literate and interested users who enjoy trying to squeeze every last bit of usefulness out of devices, they are also popular in keeping people aware of attacks against their PAN in a manner similar to a biomonitor.
P2.1: A dramatic update to the old P2.0 system put into place by Horizon, this social networking app monitors and supports all other social networks that a person might use, incorporating it all into a dramatic web of information. It also generates a P-Score that is a major piece of status in a lot of virtual places and within Horizon as a whole.
Theme Music: An algorithm that constantly monitors the owner of the PAN in all their interactions with devices. Taking this data, it attempts to determine the emotional state of the person and generates a playlist of songs to better support said user, either enhancing the feelings or dampening them. Essentially the mood ring of the Sixth World.
Ticker: A series of commlink apps that provide an information feed from a specified source, the vast majority being legitimate, such as stock markets and news organizations. Some shadow services also use these apps to give details on other shadowrunners, fixers, Mr. Johnsons, police response times, and current payment rates for a variety of services and bribes. Ticker reduces the time for subject-related Matrix Searches in half. Obviously, there are a great many topics out there that don’t generate enough traffic to merit an information feed—for example, you can’t subscribe to a feed with up-to-the-minute news about Medieval Europe when Mr. Johnson sends you after a weird-looking cup and expect results to come flooding in.
Common Programs
Bootstrap
- Format Device
- Set up a variety of tasks to in the boot record.
An IT expert’s tool of choice when working with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function.
Browse
- Matrix Search Action
- Halve Time
This handy browser and search engine cuts the time for a Matrix Search action in half.
Configurator
- Swap Two Attributes
- Change to preset configuration instead
- Un/Load Program
- Load preset programs instead
When you run this program, choose a configuration for your deck other than its current one. This alternate configuration is stored in the Configurator program. The next time you reconfigure your deck, you may switch to the full configuration stored in this program instead of just swapping two attributes or programs, even if it means Configurator stops running at that point. The configuration stored in this program doesn’t change when you use it, so you can recall it again if you reconfigure your deck to something else (assuming the Configurator program is running when you want to recall the stored information).
Edit
- Edit Action
- +2 to Data Processing Limit
This program makes editing easier with a smart interface that learns your style and can even give you suggestions. Add 2 to the Data Processing limit for any Edit tests made while this is running.
Encryption
- Firewall
- +1 to Attribute
Activating the Encryption utility gives you a +1 bonus to your Firewall attribute.
Search
- Matrix Search
- +2 for looking for paydata on the same host as the decker.
When loaded, this cyberprogram tailors the cyberdeck’s search algorithms to match the specific iconography of the host, making the decker’s Matrix Search results more likely to contain the paydata he’s looking for. This is quite popular with Mr. Johnsons, who often provide copies with pre-loaded search requirements that are programmed to self-destruct after use, so that they can only be run once. The program provides 2 extra dice on a Matrix Search action when looking for specific data on a host that contains that data. There is no bonus is if the decker is searching for something that originates from outside the host.
Shredder
- Edit File
- 2+ to Data Processing for deleting a file.
Designed to assist in erasing files and all their redundant back-up options that might be around inside a host and grid that the host inhabits, Shredder adds 2 to a cyberdeck’s Data Processing attribute for the purpose of deleting a file with the Edit File action. It functions by entering a large amount of random junk data into designated files, overwriting them repeatedly to help deter attempts at recovering them. A nice security option that is legal for users to use. Recovering a file that has been Shredded (or destroyed by a Data Bomb, for that matter) requires constant access to the host or grid the file was originally on, and a Computer (File Recovery) + Logic [Mental] (18, 1 week) Extended Test, which explains why offline back-ups are quite popular.
Signal Scrub
- Noise Reduction
- Rating 2
By analyzing the background noise and incoming signals, Signal Scrub gives you Rating 2 noise reduction.
Toolbox
- Data Processing
- +1 to Attribute
The memory management utilities in the Toolbox give you a +1 bonus to your Data Processing attribute.
Virtual Machine
- Programs
- +2 Capacity
- Matrix Damage
- +1 Unresisted Damage when persona is damaged
This program creates a virtual memory space in your deck, giving you increased program capacity at the cost of system stability. Your deck can run two additional programs, but whenever your persona takes Matrix damage, it takes an additional box of Matrix damage that cannot be resisted.
Hacking Programs
Armor
- Resist Matrix Damage
- +2 DP Modifier
This program works with your firmware as a second firewall, giving you a +2 dice pool modifier to resist Matrix damage.
Baby Monitor
- Overwatch Score
- Always know score
The Baby Monitor program uses algorithms stolen from the Grid Overwatch Division and keeps track of your movements in the Matrix, so you always know your current Overwatch Score.
Biofeedback
- Matrix Attacks
- Damage caused adds Stun/Physical (cold/hot-sim) as well
- Failed Attacks against also inflict Stun/Physical (cold/hot-sim)
- Resist Biofeedback
- Willpower + Firewall
When you’re attacked, this program laces all of the attacks you make against other icons with dangerous biofeedback signals, the sort of drek that Black IC and G-men use. This program only works if the target is biological in nature (a security spider, for instance). When your attack causes Matrix damage, the target is hit with an equal amount of Stun (if the target is using cold-sim) or Physical (if the target is using hot-sim) biofeedback damage. This program also applies to damage caused by failed Attack actions against you. Biofeedback damage is resisted with Willpower + Firewall.
Biofeedback Filter
- Resist Biofeedback
- +2 DP Modifier
This program is like a firewall for your sim module, giving you a +2 dice pool modifier to resist biofeedback damage.
Blackout
- Matrix Attacks
- Damage caused adds Stun
This is a kinder version of Biofeedback. It works the same way, but only causes Stun damage, even if the target is using hot-sim.
Cat's Paw
- Data Spike
- Deals no damage, but the target takes a -[2+Number of Marks] penalty to all actions.
A low-offensive attack program that distracts the user instead of damaging the device he is using, Cat’s Paw is useful to prevent a user from performing Matrix actions while not bricking the device they may be using. This program fills the AR display or VR experience with annoying errors, spam pop-ups and pop-unders, or other distracting garbage. On a successful Data Spike action (p. 239, SR5), instead of doing damage, the program generates a negative dice pool modifier equal to two plus the number of marks the user has on his target. Marks added or removed after using Cat’s Paw will also modify the penalty accordingly.
Cloudless
- Edit File
- Remove a file from the Matrix and into the memory of a device.
Not comfortable with your data stored only in the Matrix’s cloud? This program uses legacy code from previous incarnations of the Matrix to place data in physical media and physical media only. In addition to saving a file, it allows the user to use a successful Edit File action to move a file off the Matrix into the memory of a single designated device. This test is an Opposed Test, using the normal rules for Edit File (p.239, SR5). The Public grid has a dice pool of 6, local grids a dice pool of 8, and global grids a dice pool of 10 for the purposes of this test.
Crash
- Reboot Device
- +2 to Data Processing
One thing deckers have learned about the new Matrix protocols is that the ability to force devices to reboot can be very beneficial. Crash is there to help deckers who want to do this. When running, it attempts to fill a targeted device with an exceptional amount of reboot-worthy errors, adding 2 to the Data Processing attribute of a deck running this program when it attempts a Reboot Device action (p. 242, SR5).
Decryption
- Attack
- +1 to Attribute
The code-cutting algorithms in this program give you a +1 bonus to your Attack attribute.
Defuse
- Resist Data Bomb Damage
- +4 DP Modifier
This program creates predictive barriers between you and a Data Bomb, giving you a +4 dice pool modifier to resist damage from one.
Demolition
- Set Data Bomb
- +1 to Rating
Demolition comes with the latest and most effective Data Bomb-coding techniques, adding 1 to the rating of any Data Bomb you set while this is running.
Detonator
- Set Data Bomb
- Set a Data Bomb that goes off after the file has been accessed by a certain number of times.
With delicate monitoring, this cyberprogram is able to determine how often a file is accessed, and it sets a data bomb to go off after it has been affected a set number of times. To use this program, a decker attempts a Set Data Bomb action; if successful, they can then select how many actions can be executed with the file before the bomb goes off. They can also choose whether the Data Bomb does Matrix damage or just deletes the file. Similar to a Data Bomb, a Detonator can be detected with a Matrix Perception Test and defused with a Disarm Data Bomb action. Notoriously difficult to spot, Detonator-enabled data bombs are considered to have a Device Rating of 3 and a Sleaze attribute equal to [Remaining actions before detonation – 1] for the purposes of opposing Matrix Perception tests. This program costs twice as much as normal hacking cyberprograms, meaning it costs 500 nuyen.
Fly on a Wall
- Hide
- Overwatch increases only by 1d6 per half-hour.
Haven’t you always wanted to be the fly on a wall, in order to see the look on the faces of people when the final tally of their lives comes up? Well, GOD tends to prevent long-term surveillance by unauthorized personnel, but this program helps rebalance the scales. While this program is running, and the decker is performing no actions other than Matrix Perception tests, the Overwatch Score only increases by 1D6 per half-hour (rolled in secret by the gamemaster as normal). The program requires a Hide action in order to activate properly, and it does not assist in any way in preventing any other icon from noticing the decker.
Exploit
- Hack on the Fly
- +2 to Sleaze
This program analyzes and scans a target for weaknesses in its Firewall. You receive a +2 bonus to your Sleaze attribute when attempting a Hack on the Fly action.
Evaluate
- Paydata
- The user would know the worth of a piece of paydata
With constant updates from a series of Black BBS that specialize in monitoring paydata auctions, this program calculates how much a certain amount of paydata might be worth, in order to allow the decker to only take an amount that would limit the amount of heat they would generate in stealing a little extra while on the job.
Fork
- Single Matrix Action
- May have two targets
You can perform a single Matrix action on two targets with this program. You make a single test, with modifiers from each target both counting toward your dice pool. Each of the targets defend with their own dice pools. Determine the result of the actions separately against each target.
Guard
- Mark Damage
- -1 DV Matrix Damage Received Per Mark
This program keeps an eye out for weaknesses the same way an attacker would, reducing the extra damage you take from marks by 1 DV per mark.
Hammer
- Matrix Damage
- +2 DV Matrix Damage caused
Whenever you cause Matrix damage with an action, this offensive program lets you inflict +2 DV worth of Matrix Damage. This does not apply against targets that take damage from failing an Attack action against you.
Hitchhiker
There are some special parts of the Matrix where you can take others with you--and where you definitely don’t want to be alone. Grab this program to take your non-hacker friends to foundations and UV hosts.
Lockdown
- Link-Lock
- Matrix Damage to persona link-locks them
When you cause damage to a persona, he or she is link-locked until you stop running this program or they successfully Jack Out.
Mugger
- Mark Damage
- +1DV Matrix Damage Caused Per Mark
By actively tracking your marks, the bonus damage from them is increased by 1 DV per mark.
Nuke-from-Orbit
- Edit File
- A program deleted with Edit File will be completely erased from the Matrix.
A hugely powerful file destruction program that requires frequent updates as adjustments in file recovery technology continue to progress. This upgraded and outright illegal program is designed to ensure that no one will ever be able to recover a file that it destroys. If used to delete a file (the Edit File action should be used), this program ensures that no one will ever be able to recover the file from the Matrix. A brutal and decidedly unsubtle cyberprogram, any Overwatch Score generated from the Opposed Test is doubled. Offline back-ups and the Resonance realms are the only options for getting the file back. Nuke-From-Orbit has an Availability Rating of 12F
Paintjob
- Erase Marks:+2 to Attack
Resprays and textures a persona’s icon, assisting in erasing or knocking off marks as it does so, ensuring the decker is able to trust in the fact that his cyberdeck is not being affected by outsiders. This program adds 2 to the Attack attribute for the purpose of making Erase Mark tests.
Shell
- Matrix Damage
- +1 DP Modifier to Resist
- Biofeedback Damage
- +1 DP Modifier to Resist
This program uses a set of filtering algorithms to give you a +1 dice pool modifier to resist both Matrix and biofeedback damage. This modifier stacks with similar modifiers from other programs.
Smoke-and-Mirrors
- All actions
- Select a value between 1 - 5
- Add the value to Sleaze
- Add the value to Noise
- The GM applies the value as a dice pool penalty for Trace Icon tests targeting the user
Adds significant amounts of misleading location information in order to keep the decker from being located IRL. This program increases the cyberdeck’s Sleaze attribute between 1 and 5 (user’s choice) with an equivalent amount of noise added to any tests performed with the deck. The noise also affects Trace Icon tests performed against the deck using the program. This program has no effect against convergence (p. 231, SR5), as GOD and all the demiGODs cannot be distracted by so simple a trick.
Sneak
- Trace User
- +2 DP Modifier to Resist
- Convergence
- DemiGOD doesn't get physical location
This utility bounces your Matrix traffic through unnecessary routes, giving you a +2 dice pool modifier to defend against Trace User actions. Additionally, if a demiGOD converges on you while this program is running, they don’t get your physical location, although you’re still hit with all the other bad stuff they throw at you.
Stealth
- Sleaze
- +1 to Attribute
This clever program gives you a +1 bonus to your Sleaze attribute.
Swerve
- Firewall
- Add +1 to Firewall when resisting Reboot Device attempts for any device in the PAN
Just as deckers have seen the benefits of forcing other devices to reboot, they have seen a need to keep their devices safe from those efforts. Swerve adds redundant code to the OS of the cyberdeck and any connected devices in the decker’s PAN, making it easier for the devices to resist crash attacks. This program adds 1 to the Firewall attribute of a device for the purpose of resisting Reboot Device attempts.
Tantrum
- Data Spike
- Does no damage
- A living target in VR suffers Nausea for 3 turns.
This program overlays cold simsense sensations on top of a Data Spike action, hitting the target with a quick and disgusting sensation if even a single box of Matrix Damage is scored. The program is effective against all technomancers, as well as cold sim or hot sim deckers, but it does nothing to users working in the Matrix in AR, any form of IC, and agents. The program does no damage from the Data Spike; instead, the targeted user experiences Nausea (p. 409, SR5) for three Combat Turns due to the sensory input. Popular options this program uses to make targets feel queasy include the smell of a dirty diaper or the feeling of being punched in the junk.
Tarball
- Crash Program
- +2 to Attack
- +1 to Crash Program tests
A powerful but inaccurate combat program based on the old tar-based IC used for decades, Tarball adds 2 to the Attack attribute and 1 to the dice pool of Crash Program attempts (both of these bonuses only apply to Crash Program attempts), but its broader-based attack affects a random program rather than a chosen one.
Track
- Trace User
- +2 to Data Processing
- Or negates Sneak
- Can't do both
The Track program keeps an eye on your targets for you, making it easier to find their meat world equivalents. Add 2 to your Data Processing attribute when making Trace User tests with Track running. Alternately, if the target is running Sneak, Track negates the +2 dice pool bonus from that program. Note that the program delivers one of the listed benefits, not both.
Wrapper
- Change Icon
- Can disguise programs/personas as something they're not
- Matrix Perception
- Sees through Wrapper
This program overrides the Matrix’s protocols for icons. While this program is running, your icons can be anything you want them to be when you use the Change Icon action. From the lens of the Matrix, your Hammer program could look like a music file, your Ares Predator icon could look like a credstick, and your own persona could look like a Mitsubishi Nightsky. Another persona can see what the disguised icon really is with a Matrix Perception Test, but they need to at least suspect enough to check (Matrix Perception, p. 241).