Attacks Against Systems and Cyberdecks

 

Some programs are designed to attack, only systems and cyberdecks. They operate by penetrating the data walls that protect the system, then running their attack programs. Anti System attacks include Intrusion and Anti-System Programs. These attacks are made with the formula:

ATTACKING PROGRAM'S STR + 1D10 VS. CODE OR DATA WALL'S STRENGTH + 1D10

If the attacking program's roll is greater than the data wall's the wall is penetrated.

Some Intrusion programs are "noisier" than others. Hammer will always alert the system to a break in, allowing it to send offensive programs to deal with the break. Jackhammer will alert the system on a roll of 8, 9 or 10 on a 1D10 roll; this check is made after the program is run, whether the wall is breached or not. Worm will alert the system on a roll of 9 or 10 in a 1D10 roll.

Anti-system attacks are also made against the data walls of the system. The formula is the same as with Intrusion attacks. If the Anti-system program's roll is greater than the data wall's, the wall is penetrated and the program takes effect in the next turn.

For example, if a Poison Flatline breaks through a level 5 data wall, in the next turn, one of the system or deck's memories will be erased each turn until the Flatline is stopped. This could be done with a Killer or other anti IC program.

Decryption programs attack Code gates and file locks. Code gates are entryways into a computer system. File locks are often placed on files to protect them from entry. Decryption attacks are made as are other anti-system attacks.

Hosted by uCoz