Glossary:
The Net is an expansive "potential space," formed by interconnecting phone lines and fiberoptic control cables. Governed by lhara-Grubb Transformation algorithms, it appears as a wire-skeleton topography with grids and shapes. Line resistance manifests as mountains, while low resistance creates plains and valleys. Computer systems are depicted as ICONS, comprised of numerous tiny bits of color and light. Navigation is simplified by an endless blue-white grid representing the communications lines, marked with red beacons.
Relative to their physical locations in Realspace, computer systems in Netspace occupy analogous positions within individual subgrids. Each time a new computer connects to the NET, it expands the Net, continually creating new areas. While some speculate about the possibility of alien intelligence accessing the Net, the focus remains on the complexities of the lhara-Grubb Transformations in shaping this virtual landscape.
Regions, also called "kingdoms," are large areas on the world NETmap, like Atlantis in the southern Atlantic/African Basin. They have distinct names and hazy, shifting boundaries. New regions emerge, and existing ones change as Net reality evolves. They define areas where specific groups or governments exert the most control.
Long Distance Links (LDLs) provide instant transfer between cities. The global Internet Communications Corporation oversees most LDLs as part of their long-distance services, while large corporations have private LDLs exclusively for interoffice communication.
Wilderspace is the mysterious realm between Long Distance Links in the Net. It's uncharted and vast, as most traffic jumps over it, leaving it largely unknown. When individual computers activate, they create isolated areas independent of the Net, forming Wilderspace. The concept was theorized by J.A. Grubb in 2004, envisioning it as a dormant, potential reality.
The Brainwave Broadcast System (BBS) is a secure neural network hub for tech enthusiasts. Inside, users explore various themed "NEXUS Zones" for information exchange, chat rooms, software sharing, and even a discreet "Black Market" corner. It's a futuristic cyber-city where virtual dreams meet advanced technology.
NetWatch is a policing organization tasked with patrolling the Net for illegal activity. Governments, corporations, and large groups contribute resources and top Netrunners to this effort. NetCops, equipped with powerful software, patrol specific areas, from cities to continents.
Interface Plugs are essential for navigating the Net, serving as plastic connectors built into a Netrunner's wrists, temples, or back of the neck. They link to a cybermodem through cables. While you can manage with 'trodes—self-sticking electrodes picking up neural signals—they're slower and less responsive in the Net. However, they are cheaper and don't incur any humanity cost. Alongside Interface Plugs, the other crucial requirement is a cyberdeck.
Cyberdecks are portable devices, resembling a paperback book in size and made of plastic. Weighing about half a kilogram, they feature six plug-in ports for extra options and six output ports for jacking in other people. Only the owner can control the deck, making others mere passengers. Starting prices range from 500€$ for used models to 1,000€$ for new ones. Some cyberdecks are mobile, allowing Netrunners to hit the streets for their endeavors.
Programs are the backbone of Netrunning, fulfilling vital tasks like fighting, protecting, decrypting, and sneaking for the Netrunner. Considered the spells of a cybernetic magician, programs are readily available at the Netrunner's mental fingertips. Each program is assessed based on Strength, Class, Memory Units used, Cost, and ICON, making them essential tools in the digital world.
A Data Fortress is a heavily fortified computer system protected by robust programs and formidable data walls. Netrunners face ultimate challenges when attempting to breach and conquer these digital strongholds, with the hope to steal, sabotage or destroy valuable information.
Black Ice is a formidable type of security program prevalent in the virtual world. Employed to safeguard valuable data and computer systems, encountering Black Ice can be treacherous for unauthorized hackers. When triggered, it launches aggressive and lethal countermeasures, posing significant risks to the intruders.
No se si haré una pagina de glosario, pero por si acaso.
Netrunning Basics - Movement and Tracing
-Basic Movement-
Each turn, you can move five spaces no matter the scale of the grid.
The size of spaces varies:
- Net World Map: 1 space = 1,000 square miles.
- City Grid Map: 1 space = a dozen blocks.
- Subgrid Map: 1 space = a few yards.Movement is done in straight lines. Travel between cities is done through LDLs that connect you to the Net World Map. Once you enter an ICON in a City Grid you pass to a Subgrid Map. Most action takes place in Subgrids. A Subgrid Map covers twelve blocks.
Data Fortresses in the City Grid Map have identifying ICONS indicating their known security levels.
Security Levels:
- Grey Systems: Low security, used by city governments, universities, and small businesses.
- Level 1: Small corporations, large private businesses, and police services.
- Level 2: Medium-sized corporations and very large private businesses.
- Level 3: Large corporations, state governments, and moderately powerful groups.
- Black Systems: Multinational corporations and government agencies.
-Hidding your Trace-
To prevent Netwatch or Sysops from tracing your signal to your deck, you must hide your trail by jumping through the Net World Map and deleting connection logs. This requires an Interface Roll. Each auto-imposed difficulty penalty to your roll will also apply to the Tracing roll others make against you later.
Failure may result in the following consequences (roll 1D6):
1-4: You get cut off from the line.
5: You get cut off, and NETWATCH is given your access code.
6: NetCops try to bust you (roll 1D6).
- 1 or 2: You receive a 1D6x100€$ fine.
- 3 to 5: You escape, but they will patrol the zone for you for 1D6+1 days.
- 6: They issue an ANB on you, and they know you're out there. It's only a matter of time...
-Tracing-
If someone (such as a sysop, NETWATCH, or a Program) is attempting to track you back to your location, they need to roll their program's Strength + Wits against your previous Trace difficulty roll.
Infiltration
Once you locate your target on the City Grid, it's time to enter the subgrid of that Datafortress and attempt to infiltrate it. If you don't know the corresponding code for the Code Gate, you will need to attack the Code Gate or the Data Walls. From that moment forward, the system will be able to retaliate with its own programs.
Each NET round last 1 second, so a round in the real world is the equivalent of three rounds in the NET.
You can do the following actions (and move 5 squares) each round:
Locate Remote : Used in RealSpace to list Remote systems up to 400 around you, their location, type and possibilities.
Control Remote : Used in RealSpace to take control of a Remote system with the pertaining program on your deck memory.
Log On/Off : To enter the NetSpace or exit it. If you want to exit, make a Trivial (+3) Interface roll.
Run Program : Activate (and use) a program in your deck memory.
Long Distance Link : No roll necessary unless you want to jump without trace, then roll Interface vs Security Level.
Copy : You can copy a Memory Unit to a free MU in your deck.
Erase : Deletes a program or file from your deck, liberating MU's.
Read : It lets you read a file or its table of contents.
Edit : Modify, write and re-write the contents of a file.
Create/Delete : Open a special program called Creator to create or delete virtual items in the NetSpace.
When you execute a program, you need to check if it succeeds or not. Utilities, Anti-system, Stealth, and Evasion programs run their own scripts and cannot be influenced by your own skills. However, Anti-personnel or Anti-software attacks do require your expertise to work effectively.
Typical Rolls are:
Initiative: REF + Deck Speed. | |
Stealth and evasion: d8 + STR | Difficulty: Detection STR |
Anti-system attacks: d8 + STR | Difficulty: Data Wall or Code Gate STR |
Drivers and utilities: d8 + STR | Difficulty: Data Wall STR or Average (±0) |
Anti-personnel attacks: Interface + STR | Roll: vs Interface + STR |
Anti-software attacks: Interface + STR | Roll: vs Interface + STR |
The STR (Strength) attribute determines the power of attacking and defending programs. Check the STR attribute in the conversion table:
Strength (STR) | Attacking dice | Defending diff. |
1 to 2 | d6 | Easy (+1) |
3 to 4 | d6 | Average (±0) |
5 to 6 | d8 | Demanding (-1) |
7 to 8 | d10 | Hard (-2) |
9 to 10 | d12 | Formidable (-3) |
-------
Each Datafortress can execute up to one extra action for every two additional CPU present in the system. Each CPU costs around 10,000 €$. With 5 or more CPU the system is considered to be an Artificial Intelligence. Capable of independent action without an human overseer.
#CPU | INT | Actions x rnd | Extra |
1 | D | 1 | |
2 | C | 1 | |
3 | B | 2 | |
4 | A | 2 | |
5 | D* | 3 | IA |
6 | C* | 3 | IA |
7 | B* | 4 | IA |
* - Advantage on rolls |
With each CPU you get four memories of 10 MU size.
Datawalls encloses your system on all sides. Each Datafortress has a minimum Data Wall STR equivalent to the numbers of CPU present in the system. But can be upgraded up to STR 10 at the price of 1,000€$ per level.
Code Gates are how information moves between the Net and the system. Each CPU comes with one Code Gate that you may place in your system. Additional ones can be purchased at 2,000€$ each. They start at STR 2 and can be upgraded at 1,000€$ per level up to 10.
You can pick up Skills for the system so it can interact with Remote devices or realize plausible actions. Each Skill costs 200€$ and start at D, you can raise them for 200€$ per level. You can have as many skills as CPUs in the system.
Iba a cambiar los atributos de los programas uno a uno, peor mejor hago una tabla. Al final el objetivo es conseguir compatibilidad con el reglamento. Sin tener que reconvertir todo el juego.