Difference between revisions of "SR5:Matrix:Programs"

From Shadowrun Wiki
Jump to: navigation, search
(Agents)
m (Common Programs)
Line 34: Line 34:
  
 
==Common Programs==
 
==Common Programs==
 +
 +
===Bootstrap===
 +
;Format Device:Set up a variety of tasks to in the boot record.
 +
An IT expert’s tool of choice when work-
 +
ing with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function.
  
 
===Browse===
 
===Browse===
Line 51: Line 56:
 
;Firewall:+1 to Attribute
 
;Firewall:+1 to Attribute
 
Activating the Encryption utility gives you a +1 bonus to your Firewall attribute.
 
Activating the Encryption utility gives you a +1 bonus to your Firewall attribute.
 +
 +
===Search===
 +
;Matrix Search: +2 for looking for paydata on the same host as the decker.
 +
When loaded, this cyberprogram tailors the cyberdeck’s search algorithms to match the specific iconography of the host, making the decker’s Matrix Search results more likely to contain the paydata he’s looking for. This is quite popular with Mr. Johnsons, who often provide copies with pre-loaded search requirements that are programmed to self-destruct after use, so that they can only be run once. The program provides 2 extra dice on a Matrix Search action when looking for specific data on a host that contains that data. There is no bonus is if the decker is searching for something that originates from outside the host.
 +
 +
===Shredder===
 +
:
  
 
===Signal Scrub===
 
===Signal Scrub===

Revision as of 21:26, 24 December 2017

5th Edition Rules
Basics // Combat // Magic // Matrix // Driving // Character Creation
Basics Skills/Attributes Actions Jargon Cyberdecks Programs How To Complex Forms Echoes Sprites Sprite Powers IC

Agents

Type Avail Cost Source
Agent (Rating 1-3) Rating*3 Rating*1000¥ Core
Agent (Rating 4-6) Rating*3 Rating*2000¥ Core

Agents are autonomous programs that are rated from 1 to 6. Each agent occupies one program slot on your deck. Agents use the Matrix attributes of the device they run on, and their rating (up to 6) for attributes. Agents also have the Computer, Hacking, and Cybercombat skills at a rating equal to their own. An agent runs as a program and can use programs running on the same device as them.

You can have your agent perform Matrix actions for you. When an agent is running, it has its own persona (and icon). An agent is about as smart as a pilot program of the same rating.

Any attack on an agent damages the device on which it is running, rather than the agent itself (which is, after all, merely a program). This means that if you’re running an agent on your deck, you and it share the same Matrix Condition Monitor.

Commlink Apps

Simple little programs, apps are useless for hacking against other devices or hosts. They usually only enhance a user’s augmented reality or virtual reality experience, with a few minor options for support programs. A commlink can run as many apps as half its Device Rating, rounded up.

AR Games: Typically casual games that are displayed in augmented reality, allowing a user to enjoy them as a pastime while also still somewhat paying attention to reality. The number on the market is huge, with some older flatscreen and trid games being modified to run on commlinks.

Diagnostics: An ongoing self-evaluation system that monitors all the devices in a user’s PAN, giving constant vital statistics on their behavior. Popular with computer-literate and interested users who enjoy trying to squeeze every last bit of usefulness out of devices, they are also popular in keeping people aware of attacks against their PAN in a manner similar to a biomonitor.

P2.1: A dramatic update to the old P2.0 system put into place by Horizon, this social networking app monitors and supports all other social networks that a person might use, incorporating it all into a dramatic web of information. It also generates a P-Score that is a major piece of status in a lot of virtual places and within Horizon as a whole.

Theme Music: An algorithm that constantly monitors the owner of the PAN in all their interactions with devices. Taking this data, it attempts to determine the emotional state of the person and generates a playlist of songs to better support said user, either enhancing the feelings or dampening them. Essentially the mood ring of the Sixth World.

Ticker: A series of commlink apps that provide an information feed from a specified source, the vast majority being legitimate, such as stock markets and news organizations. Some shadow services also use these apps to give details on other shadowrunners, fixers, Mr. Johnsons, police response times, and current payment rates for a variety of services and bribes. Ticker reduces the time for subject-related Matrix Searches in half. Obviously, there are a great many topics out there that don’t generate enough traffic to merit an information feed—for example, you can’t subscribe to a feed with up-to-the-minute news about Medieval Europe when Mr. Johnson sends you after a weird-looking cup and expect results to come flooding in.

Common Programs

Bootstrap

Format Device
Set up a variety of tasks to in the boot record.

An IT expert’s tool of choice when work- ing with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function.

Browse

Matrix Search Action
Halve Time

This handy browser and search engine cuts the time for a Matrix Search action in half.

Configurator

Swap Two Attributes
Change to preset configuration instead
Un/Load Program
Load preset programs instead

When you run this program, choose a configuration for your deck other than its current one. This alternate configuration is stored in the Configurator program. The next time you reconfigure your deck, you may switch to the full configuration stored in this program instead of just swapping two attributes or programs, even if it means Configurator stops running at that point. The configuration stored in this program doesn’t change when you use it, so you can recall it again if you reconfigure your deck to something else (assuming the Configurator program is running when you want to recall the stored information).

Edit

Edit Action
+2 to Data Processing Limit

This program makes editing easier with a smart interface that learns your style and can even give you suggestions. Add 2 to the Data Processing limit for any Edit tests made while this is running.

Encryption

Firewall
+1 to Attribute

Activating the Encryption utility gives you a +1 bonus to your Firewall attribute.

Search

Matrix Search
+2 for looking for paydata on the same host as the decker.

When loaded, this cyberprogram tailors the cyberdeck’s search algorithms to match the specific iconography of the host, making the decker’s Matrix Search results more likely to contain the paydata he’s looking for. This is quite popular with Mr. Johnsons, who often provide copies with pre-loaded search requirements that are programmed to self-destruct after use, so that they can only be run once. The program provides 2 extra dice on a Matrix Search action when looking for specific data on a host that contains that data. There is no bonus is if the decker is searching for something that originates from outside the host.

Shredder

Signal Scrub

Noise Reduction
Rating 2

By analyzing the background noise and incoming signals, Signal Scrub gives you Rating 2 noise reduction.

Toolbox

Data Processing
+1 to Attribute

The memory management utilities in the Toolbox give you a +1 bonus to your Data Processing attribute.

Virtual Machine

Programs
+2 Capacity
Matrix Damage
+1 Unresisted Damage when persona is damaged

This program creates a virtual memory space in your deck, giving you increased program capacity at the cost of system stability. Your deck can run two additional programs, but whenever your persona takes Matrix damage, it takes an additional box of Matrix damage that cannot be resisted.

Hacking Programs

Armor

Resist Matrix Damage
+2 DP Modifier

This program works with your firmware as a second firewall, giving you a +2 dice pool modifier to resist Matrix damage.

Baby Monitor

Overwatch Score
Always know score

The Baby Monitor program uses algorithms stolen from the Grid Overwatch Division and keeps track of your movements in the Matrix, so you always know your current Overwatch Score.

Biofeedback

Matrix Attacks
Damage caused adds Stun/Physical (cold/hot-sim) as well
Failed Attacks against also inflict Stun/Physical (cold/hot-sim)
Resist Biofeedback
Willpower + Firewall

When you’re attacked, this program laces all of the attacks you make against other icons with dangerous biofeedback signals, the sort of drek that Black IC and G-men use. This program only works if the target is biological in nature (a security spider, for instance). When your attack causes Matrix damage, the target is hit with an equal amount of Stun (if the target is using cold-sim) or Physical (if the target is using hot-sim) biofeedback damage. This program also applies to damage caused by failed Attack actions against you. Biofeedback damage is resisted with Willpower + Firewall.

Biofeedback Filter

Resist Biofeedback
+2 DP Modifier

This program is like a firewall for your sim module, giving you a +2 dice pool modifier to resist biofeedback damage.

Blackout

Matrix Attacks
Damage caused adds Stun

This is a kinder version of Biofeedback. It works the same way, but only causes Stun damage, even if the target is using hot-sim.

Decryption

Attack
+1 to Attribute

The code-cutting algorithms in this program give you a +1 bonus to your Attack attribute.

Defuse

Resist Data Bomb Damage
+4 DP Modifier

This program creates predictive barriers between you and a Data Bomb, giving you a +4 dice pool modifier to resist damage from one.

Demolition

Set Data Bomb
+1 to Rating

Demolition comes with the latest and most effective Data Bomb-coding techniques, adding 1 to the rating of any Data Bomb you set while this is running.

Exploit

Hack on the Fly
+2 to Sleaze

This program analyzes and scans a target for weaknesses in its Firewall. You receive a +2 bonus to your Sleaze attribute when attempting a Hack on the Fly action.

Fork

Single Matrix Action
May have two targets

You can perform a single Matrix action on two targets with this program. You make a single test, with modifiers from each target both counting toward your dice pool. Each of the targets defend with their own dice pools. Determine the result of the actions separately against each target.

Guard

Mark Damage
-1 DV Matrix Damage Received Per Mark

This program keeps an eye out for weaknesses the same way an attacker would, reducing the extra damage you take from marks by 1 DV per mark.

Hammer

Matrix Damage
+2 DV Matrix Damage caused

Whenever you cause Matrix damage with an action, this offensive program lets you inflict +2 DV worth of Matrix Damage. This does not apply against targets that take damage from failing an Attack action against you.

Lockdown

Link-Lock
Matrix Damage to persona link-locks them

When you cause damage to a persona, he or she is link-locked until you stop running this program or they successfully Jack Out.

Mugger

Mark Damage
+1DV Matrix Damage Caused Per Mark

By actively tracking your marks, the bonus damage from them is increased by 1 DV per mark.

Shell

Matrix Damage
+1 DP Modifier to Resist
Biofeedback Damage
+1 DP Modifier to Resist

This program uses a set of filtering algorithms to give you a +1 dice pool modifier to resist both Matrix and biofeedback damage. This modifier stacks with similar modifiers from other programs.

Sneak

Trace User
+2 DP Modifier to Resist
Convergence
DemiGOD doesn't get physical location

This utility bounces your Matrix traffic through unnecessary routes, giving you a +2 dice pool modifier to defend against Trace User actions. Additionally, if a demiGOD converges on you while this program is running, they don’t get your physical location, although you’re still hit with all the other bad stuff they throw at you.

Stealth

Sleaze
+1 to Attribute

This clever program gives you a +1 bonus to your Sleaze attribute.

Track

Trace User
+2 to Data Processing
Negates Sneak
Either +2 or Negate, not both

The Track program keeps an eye on your targets for you, making it easier to find their meat world equivalents. Add 2 to your Data Processing attribute when making Trace User tests with Track running. Alternately, if the target is running Sneak, Track negates the +2 dice pool bonus from that program. Note that the program delivers one of the listed benefits, not both.

Wrapper

Change Icon
Can disguise programs/personas as something they're not
Matrix Perception
Sees through Wrapper

This program overrides the Matrix’s protocols for icons. While this program is running, your icons can be anything you want them to be when you use the Change Icon action. From the lens of the Matrix, your Hammer program could look like a music file, your Ares Predator icon could look like a credstick, and your own persona could look like a Mitsubishi Nightsky. Another persona can see what the disguised icon really is with a Matrix Perception Test, but they need to at least suspect enough to check (Matrix Perception, p. 241).