Net, you had to be willing to accept the fact that everyone could see your DataFortress ... and thanks to the I-G algorithms, if they knew where your Fortress was, they could find your facility. No longer! InfoNet announces the new Cloak systemware! With Cloak in place, your DataFortress is shrouded in a VFUInvisibility subroutine that essentially erases it from the Net-while still allowing you access. If you have outsiders that you want to have access, just give them the Net co-ordinates, and the password. They will be able to get in, but no one else can see the Fortress, so they won’t! Note: it has been found that the Cloak routine can impair processing power and is still very large. Cloak hides the ENTIRE DATAFORTRESS behind an Invisibility subroutine (Strength: 6). It is also very expensive, both in terms of processing power and memory. It uses up 5MU per CPU, and neutralizes an entire point of INT per CPU (in other words, a computer with 4 CPUs and a Cloak would have an effective INT of 8 while running Cloak). This sudden lobotomization can really freak with slightly unstable AIS. You are Warned. Monitor 950eb Class: DetectiodSystemware, STR Never worry about your software again! Sick and tired of everyone (even your own employees) slashing down your software, and you don’t even know it till long after the fact? No more! The Monitor, by Arasaka’s NetWare division, continuously checks each program on a set schedule, making sure that each is functioning properly. If it finds that a program is functioning improperly or has been corrupted by a virus (roll vs the virus STR+ldlO), it will de-rezz it (instantaneous for system programs, otherwise roll against the other program’s STR), and reload a new version from memory. If the program is missing from its assigned position in the DataFortress, it will sound an alarm, reload a new copy of the program from memory (takes one turn), and then goes and interrogates every active user it can find inside the Fortress (it does incorporate SeeYa subroutines, allowing it to detect invisible netrunners). The interrogation must be defeated via a Decryption program (treat as a Code Gate with Strength: 4). If it detects an unauthorized user, it will try and Trace him back to his real4, MU: 7 space location. Each Monitor can check a number of codegates and programs equal to the number of CPUs in the system minus one. It will either check them randomly, or according to a set schedule (usually the latter). Of course, the larger the DataFortress, the longer this takes. If detected, it can be killed. Of course, there could be a Monitor set to check the first Monitor.. . R RACHE SPECIAL This program was cooked up by Rache himself. As such, it violates a lot of what we know about Netrunning (like the 5 space movement limit). But then, that’s Rache for you. GMs should only allow access to such an item under special circumstances. Warning: improper use of this program may unbalance a campaign. Actually, proper use may as well.. . Rice Burner Rache ... STR 2, MU: 2 + special The rice burner adds +2 to your Icon’s movement allowance by running multiple net space navigation routines, attempting to second-guess the net access signals. This program takes 2 MU to run and then half of the remaining deck memory to increase movement in the Net. Any remaining memory can be used for regular data storage. ICON: Japanese-style racing motorcycle Cost: Gotta talk to EBM XR-10 Chip-Rack Deck Extension COST: 5000EB Approximately the size of a scientificfunction pocket calculator, this after-market deck upgrade plugs into nay available Inputloutput (option) port on most cyberdeck models, effectively providing an additional lOMU to maximum capacity. This option does not add memory in the traditional fashion of simply tacking on an extra memory core, but rather by linking ten micro-condensed RAM data cores with an ingenious “shuffling” system that allows floating memory substitutions. In game terms, if a program is loaded into an XR-10 is activated, the hostdeck ignores an equal amount of program space in it’s own memory and runs the selected program and then returns to normal operation (The Netrunner decides the memory to be overridden). The unusual operation of this system has the benefit of isolating inactive programming from the host-deck, protecting it from any damage that the deck may sustain. This includes the effects of interface killers such as Poison Flatline and Firestarter. Normal deck memory is not protected by this system. Neural Recognition Security Circuits COST: 2000EB The ultimate in cyberdeck security system, neural recognition circuitry scans the brainwave pattern of anyone who studs into the secured interface and checks it against a re-recorded pattern (presumably, that of the rightful owner). If the patterns don’t match, the secured system will not operate. Also available for vehicular interface systems. Hardened Cyberdeck Circuitry COST: Adds 20% to total cost. Have you every wondered why a military cyberdeck is on every hacker’s wish list? It’s more than just the armored casing. By enclosing all vital hardware and wiring within a composite shell of ceramics and polymers, interwoven with special metallic alloy threads, a combat deck is rendered immune to the effects of EMP, microwaves, magnetic fields, electric shocks, and mild radiation exposure. Standard decks may be upgraded by a skilled Tech if they can get ahold of the required materials. (I’m sure you’ll think of something.. .) Sealed Combat Assault Cyberdeck COST: Models vary. Base is 6000EB + upgrades Developed for the U.S. Navy’s SEAL teams, a sealed deck is a cellular combat assault deck with an airtight polymerXevlar casing (SP 20) and memory-plastic seals for all option ports and chipslots. Two layers of rubberized insulation inside the casing ensure that the user is safe from electric shock. This type of deck may even be used underwater, provided that the user first jacksin above water. Includes a Flip-Switch. Langley Autosystems Datastick@* Mark VI1 cyberdeck COST:9500 eb Known for its unique flattened-baton shaped, chrome-on-black design, the ‘Datastick is J IlegiatcreJ TraJemark of Stwc Sdxam
Datastick@ has been the choice of stylish netrunners all over netspace. A typical “‘stick deck has the following stats: Speed +3, MU: 3, Memory: 25, Data Walls: +4, cellular capable. Liz Cyber SpanDeck Wearable Net runner Suit COST: 17,000 per jumpsuit + 2000 to 5000 per Interface Ieuelw Using the latest in flexibldfloppable circuitry, the SpanDeck, jumpsuit is a cyberdeck with dozens of pieces of redundant circuitry are woven into this skin-tight outfit that will shutdown in a picosecond by just commanding one of it’s passive, woven-in trode’s so one can pass the most inquisitive security search for a cyberdeck when you enter a corporate center. The accommodating belts and jewelry are the connections to traditional cyberdeck peripherals. Stats: AwarenesslNotice modification to detect cyberdeck: -5, Speed: +2, MU: 2, Memory: 10, Data Walls: +2. . . . . . . . . . . . . . . . . Throughout the text, we’ve described the various netrunners encountered as variations of the following templates. These templates were designed to show the broad variety of skills that can be useful for a netrunner. For example: the Composition skill is intended to reflect a creative ability with the programs in addition to the Programming skill itself. It should not be construed to indicate any musical or other ability (unlcss that fits thc GM’s conception of the NPC). Thcsc arc intended merely as frameworks on which you can hang your own details. The skills and nttributcs listed on these templates can range up or down by one point or more if the GM sccs fit. Plcasc adjust them as your campaign rcquircs. All of the netrunners are assumed to have neural processors, plugs, and cybcrniodcm links as basic equipment; and while some suggestions are given, any additional cyberware is up to the GM. INT:8, REF:7, TECH%, COOL:7, AllR:6, LUCK:6, MA3 BODY:5 EMP: 6 Skills: Interface 2 AwarenesslNotice 4, Composition 3, EducationlGen.Know. 5, Programming 5, System Knowledge 5, Basic Tech 4, Cyberdeck Design 4 Cyber Tech 3, Electronics 5 +15 points of Pickup Skills Cvberdeck: Basic: 10 MU, Speed 0, Data walls 2 Options: keyboard, vidboard, printer, maybe one level of Speed or Data Wall upgrade Proaram Mix hot all will fit in deck at oncel: Bloodhound SeeYa Shield Stun News at 8 Phone Home Databaser Gatemaster Electrolock INT:8, REF:7, TECH%, COOL:7, AllR:6, LUCK:6, MA$, BODV7 EMP: 5 Skills: Interface 4 AwarenesslNotice 4, Composition 2, Education/Gen.Know. 4, Programming 6, System Knowledge 6, Basic Tech 6, Cyberdeck Design 6, Cyber Tech 2, Electronics 3 +17 points of Pickup Skills Cvberdeck Mid-range deck 10-20 MU, Speed +1-+3, Data walls 3-5 Options: vidboard, chip readerlrecorder or miniprinter, maybe auto-punchout (Chromebook l), or Deckmate Micro-comp combo (Chromebook 2). Possibly a portable model. At this level, combat runners would use a Cybermodem Helmet (Chromebook I) or Armdeck (Chromebook 2). Prouram Mix (not all will fit in deck at oncel: Pit Bull or Bulldog (Chromebook 7) SeeYa Hidden Virtue Invisibility Forceshield or Hack Killer II or IV Manticore Span or Knockout Imp II Viddy Master Phone Home Hotwire or Dee-2 or Crystal Ball Rerezz Filelocker IW9, REF& TECH$, COOL%, AllR:6, LUCK:7, MA:7, BODY3 EMP:4 Skills: Interface 6 AwarenesslNotice 5, Composition 4, EducationlGen.Know. 6, Programming 6, System Knowledge 6, Basic Tech 4, Cyberdeck Design 2, Cyber Tech 1, Electronics 5 +22 points of Pickup Skills Cvberdeck Same deck as a Mid-Runner with: 30 MU, Data walls 6-7 Options: Cellular portable or Cyberlimb model with most standard options. Maybe WetOrives wllinks (Chromebooks 1 & 2), micro-computer links (Chromebook 2), cyberdeck security systems (Chromebooks1 ), Virtual BBS add-ons (Chromebook 2) Combat runners would use a Cybermodem Suit (Chromebook I). At this level, some runners would be using work-
station-level (CPU 2-3) computers wlcyber-controls and add-on modems for netrunning. Proaram Mix (not all will fit in deck at once): Raffles Guard-Dog (Chromebook r) SmartEye (Chromebook l) Hidden Virtue DecKrash Invisibility Forceshield or Reflector Killer IV or VI Hydra Sword or Hellbolt or Firestarter Spazz or Jack Attack Glue Imp H or Afreet II Crystal Ball Dee-2 Databaser Alias Rerezz Gatemaster Filelocker INT9, REF:8, TECH:9, COOL:9, ATTR:7, LUCK:8, MA:8, BODY7 EMP: 3 - Skills: Interface 8 AwarenesslNotice 6, Composition 3, EducationlGen.Know. 5, Programming 7, System Knowledge 7, Basic Tech 5, Cyberdeck Design 5, Cyber Tech 3, Electronics 6 +22 points of Pickup Skills Cvberdeck Completely custom-built deck 40 MU, Speed: +4- +5, Data walls 8-10 Options: Anything you want. The deck will be fully portable and protected. Some people will be running out of modified workstations and through Corporate mainframes wlcyber-controls and add-on modems. Prouram Mix hot all will fit in deck at once): Pit Bull Guard-Dog (Chromebook l) SmartEye (Chromebook r) Hidden Virtue SeeYa Poison Flatline DecKrash Viddy Master Invisibility Hotwire Forceshield Crystal Ball Reflector Dee-2 Killer VI Alias Hydra Rerezz Hellbolt Gatemaster Jack Attack Packer Afreet II Backup Vampyre II (Chromebook r)
, Aras ke vni irnn reiis 1 bablv Wi le i ir New Net[,.. i t -- An entir ' tt Mic CHICI -.J Your. 7, AND GET READY CI \"'DE YOU WON'T I ha rin ' is R. Talsorian's trademark name for its game of tne aark ture. Rache Bartmoss' Guide To The Net is a trademark of R. Talsorian Games Inc. All Rights Reserved. All incidents, situations, and ersons portrayed within are fictional and any similarity, without satiric intent, to characters livin ' dead is strictly coincidental. rightw 1993 R. Tal: an Games All Rights Resen CP3241 =SEN# r --- -- .I