Difference between revisions of "SR5:Matrix:Programs"
(→Agents) |
m (→Common Programs) |
||
Line 34: | Line 34: | ||
==Common Programs== | ==Common Programs== | ||
+ | |||
+ | ===Bootstrap=== | ||
+ | ;Format Device:Set up a variety of tasks to in the boot record. | ||
+ | An IT expert’s tool of choice when work- | ||
+ | ing with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function. | ||
===Browse=== | ===Browse=== | ||
Line 51: | Line 56: | ||
;Firewall:+1 to Attribute | ;Firewall:+1 to Attribute | ||
Activating the Encryption utility gives you a +1 bonus to your Firewall attribute. | Activating the Encryption utility gives you a +1 bonus to your Firewall attribute. | ||
+ | |||
+ | ===Search=== | ||
+ | ;Matrix Search: +2 for looking for paydata on the same host as the decker. | ||
+ | When loaded, this cyberprogram tailors the cyberdeck’s search algorithms to match the specific iconography of the host, making the decker’s Matrix Search results more likely to contain the paydata he’s looking for. This is quite popular with Mr. Johnsons, who often provide copies with pre-loaded search requirements that are programmed to self-destruct after use, so that they can only be run once. The program provides 2 extra dice on a Matrix Search action when looking for specific data on a host that contains that data. There is no bonus is if the decker is searching for something that originates from outside the host. | ||
+ | |||
+ | ===Shredder=== | ||
+ | : | ||
===Signal Scrub=== | ===Signal Scrub=== |
Revision as of 21:26, 24 December 2017
5th Edition Rules |
---|
Basics // Combat // Magic // Matrix // Driving // Character Creation |
Basics | Skills/Attributes | Actions | Jargon | Cyberdecks | Programs | How To | Complex Forms | Echoes | Sprites | Sprite Powers | IC |
---|
Agents
Type | Avail | Cost | Source |
---|---|---|---|
Agent (Rating 1-3) | Rating*3 | Rating*1000¥ | Core |
Agent (Rating 4-6) | Rating*3 | Rating*2000¥ | Core |
Agents are autonomous programs that are rated from 1 to 6. Each agent occupies one program slot on your deck. Agents use the Matrix attributes of the device they run on, and their rating (up to 6) for attributes. Agents also have the Computer, Hacking, and Cybercombat skills at a rating equal to their own. An agent runs as a program and can use programs running on the same device as them.
You can have your agent perform Matrix actions for you. When an agent is running, it has its own persona (and icon). An agent is about as smart as a pilot program of the same rating.
Any attack on an agent damages the device on which it is running, rather than the agent itself (which is, after all, merely a program). This means that if you’re running an agent on your deck, you and it share the same Matrix Condition Monitor.
Commlink Apps
Simple little programs, apps are useless for hacking against other devices or hosts. They usually only enhance a user’s augmented reality or virtual reality experience, with a few minor options for support programs. A commlink can run as many apps as half its Device Rating, rounded up.
AR Games: Typically casual games that are displayed in augmented reality, allowing a user to enjoy them as a pastime while also still somewhat paying attention to reality. The number on the market is huge, with some older flatscreen and trid games being modified to run on commlinks.
Diagnostics: An ongoing self-evaluation system that monitors all the devices in a user’s PAN, giving constant vital statistics on their behavior. Popular with computer-literate and interested users who enjoy trying to squeeze every last bit of usefulness out of devices, they are also popular in keeping people aware of attacks against their PAN in a manner similar to a biomonitor.
P2.1: A dramatic update to the old P2.0 system put into place by Horizon, this social networking app monitors and supports all other social networks that a person might use, incorporating it all into a dramatic web of information. It also generates a P-Score that is a major piece of status in a lot of virtual places and within Horizon as a whole.
Theme Music: An algorithm that constantly monitors the owner of the PAN in all their interactions with devices. Taking this data, it attempts to determine the emotional state of the person and generates a playlist of songs to better support said user, either enhancing the feelings or dampening them. Essentially the mood ring of the Sixth World.
Ticker: A series of commlink apps that provide an information feed from a specified source, the vast majority being legitimate, such as stock markets and news organizations. Some shadow services also use these apps to give details on other shadowrunners, fixers, Mr. Johnsons, police response times, and current payment rates for a variety of services and bribes. Ticker reduces the time for subject-related Matrix Searches in half. Obviously, there are a great many topics out there that don’t generate enough traffic to merit an information feed—for example, you can’t subscribe to a feed with up-to-the-minute news about Medieval Europe when Mr. Johnson sends you after a weird-looking cup and expect results to come flooding in.
Common Programs
Bootstrap
- Format Device
- Set up a variety of tasks to in the boot record.
An IT expert’s tool of choice when work- ing with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function.
Browse
- Matrix Search Action
- Halve Time
This handy browser and search engine cuts the time for a Matrix Search action in half.
Configurator
- Swap Two Attributes
- Change to preset configuration instead
- Un/Load Program
- Load preset programs instead
When you run this program, choose a configuration for your deck other than its current one. This alternate configuration is stored in the Configurator program. The next time you reconfigure your deck, you may switch to the full configuration stored in this program instead of just swapping two attributes or programs, even if it means Configurator stops running at that point. The configuration stored in this program doesn’t change when you use it, so you can recall it again if you reconfigure your deck to something else (assuming the Configurator program is running when you want to recall the stored information).
Edit
- Edit Action
- +2 to Data Processing Limit
This program makes editing easier with a smart interface that learns your style and can even give you suggestions. Add 2 to the Data Processing limit for any Edit tests made while this is running.
Encryption
- Firewall
- +1 to Attribute
Activating the Encryption utility gives you a +1 bonus to your Firewall attribute.
Search
- Matrix Search
- +2 for looking for paydata on the same host as the decker.
When loaded, this cyberprogram tailors the cyberdeck’s search algorithms to match the specific iconography of the host, making the decker’s Matrix Search results more likely to contain the paydata he’s looking for. This is quite popular with Mr. Johnsons, who often provide copies with pre-loaded search requirements that are programmed to self-destruct after use, so that they can only be run once. The program provides 2 extra dice on a Matrix Search action when looking for specific data on a host that contains that data. There is no bonus is if the decker is searching for something that originates from outside the host.
Shredder
Signal Scrub
- Noise Reduction
- Rating 2
By analyzing the background noise and incoming signals, Signal Scrub gives you Rating 2 noise reduction.
Toolbox
- Data Processing
- +1 to Attribute
The memory management utilities in the Toolbox give you a +1 bonus to your Data Processing attribute.
Virtual Machine
- Programs
- +2 Capacity
- Matrix Damage
- +1 Unresisted Damage when persona is damaged
This program creates a virtual memory space in your deck, giving you increased program capacity at the cost of system stability. Your deck can run two additional programs, but whenever your persona takes Matrix damage, it takes an additional box of Matrix damage that cannot be resisted.
Hacking Programs
Armor
- Resist Matrix Damage
- +2 DP Modifier
This program works with your firmware as a second firewall, giving you a +2 dice pool modifier to resist Matrix damage.
Baby Monitor
- Overwatch Score
- Always know score
The Baby Monitor program uses algorithms stolen from the Grid Overwatch Division and keeps track of your movements in the Matrix, so you always know your current Overwatch Score.
Biofeedback
- Matrix Attacks
- Damage caused adds Stun/Physical (cold/hot-sim) as well
- Failed Attacks against also inflict Stun/Physical (cold/hot-sim)
- Resist Biofeedback
- Willpower + Firewall
When you’re attacked, this program laces all of the attacks you make against other icons with dangerous biofeedback signals, the sort of drek that Black IC and G-men use. This program only works if the target is biological in nature (a security spider, for instance). When your attack causes Matrix damage, the target is hit with an equal amount of Stun (if the target is using cold-sim) or Physical (if the target is using hot-sim) biofeedback damage. This program also applies to damage caused by failed Attack actions against you. Biofeedback damage is resisted with Willpower + Firewall.
Biofeedback Filter
- Resist Biofeedback
- +2 DP Modifier
This program is like a firewall for your sim module, giving you a +2 dice pool modifier to resist biofeedback damage.
Blackout
- Matrix Attacks
- Damage caused adds Stun
This is a kinder version of Biofeedback. It works the same way, but only causes Stun damage, even if the target is using hot-sim.
Decryption
- Attack
- +1 to Attribute
The code-cutting algorithms in this program give you a +1 bonus to your Attack attribute.
Defuse
- Resist Data Bomb Damage
- +4 DP Modifier
This program creates predictive barriers between you and a Data Bomb, giving you a +4 dice pool modifier to resist damage from one.
Demolition
- Set Data Bomb
- +1 to Rating
Demolition comes with the latest and most effective Data Bomb-coding techniques, adding 1 to the rating of any Data Bomb you set while this is running.
Exploit
- Hack on the Fly
- +2 to Sleaze
This program analyzes and scans a target for weaknesses in its Firewall. You receive a +2 bonus to your Sleaze attribute when attempting a Hack on the Fly action.
Fork
- Single Matrix Action
- May have two targets
You can perform a single Matrix action on two targets with this program. You make a single test, with modifiers from each target both counting toward your dice pool. Each of the targets defend with their own dice pools. Determine the result of the actions separately against each target.
Guard
- Mark Damage
- -1 DV Matrix Damage Received Per Mark
This program keeps an eye out for weaknesses the same way an attacker would, reducing the extra damage you take from marks by 1 DV per mark.
Hammer
- Matrix Damage
- +2 DV Matrix Damage caused
Whenever you cause Matrix damage with an action, this offensive program lets you inflict +2 DV worth of Matrix Damage. This does not apply against targets that take damage from failing an Attack action against you.
Lockdown
- Link-Lock
- Matrix Damage to persona link-locks them
When you cause damage to a persona, he or she is link-locked until you stop running this program or they successfully Jack Out.
Mugger
- Mark Damage
- +1DV Matrix Damage Caused Per Mark
By actively tracking your marks, the bonus damage from them is increased by 1 DV per mark.
Shell
- Matrix Damage
- +1 DP Modifier to Resist
- Biofeedback Damage
- +1 DP Modifier to Resist
This program uses a set of filtering algorithms to give you a +1 dice pool modifier to resist both Matrix and biofeedback damage. This modifier stacks with similar modifiers from other programs.
Sneak
- Trace User
- +2 DP Modifier to Resist
- Convergence
- DemiGOD doesn't get physical location
This utility bounces your Matrix traffic through unnecessary routes, giving you a +2 dice pool modifier to defend against Trace User actions. Additionally, if a demiGOD converges on you while this program is running, they don’t get your physical location, although you’re still hit with all the other bad stuff they throw at you.
Stealth
- Sleaze
- +1 to Attribute
This clever program gives you a +1 bonus to your Sleaze attribute.
Track
- Trace User
- +2 to Data Processing
- Negates Sneak
- Either +2 or Negate, not both
The Track program keeps an eye on your targets for you, making it easier to find their meat world equivalents. Add 2 to your Data Processing attribute when making Trace User tests with Track running. Alternately, if the target is running Sneak, Track negates the +2 dice pool bonus from that program. Note that the program delivers one of the listed benefits, not both.
Wrapper
- Change Icon
- Can disguise programs/personas as something they're not
- Matrix Perception
- Sees through Wrapper
This program overrides the Matrix’s protocols for icons. While this program is running, your icons can be anything you want them to be when you use the Change Icon action. From the lens of the Matrix, your Hammer program could look like a music file, your Ares Predator icon could look like a credstick, and your own persona could look like a Mitsubishi Nightsky. Another persona can see what the disguised icon really is with a Matrix Perception Test, but they need to at least suspect enough to check (Matrix Perception, p. 241).