Some programs are designed to attack, only systems and
cyberdecks. They operate by penetrating the data walls
that protect the system, then running their attack
programs. Anti System attacks include Intrusion and
Anti-System Programs. These attacks are made with the
formula:
ATTACKING PROGRAM'S STR
+ 1D10 VS. CODE OR DATA WALL'S STRENGTH + 1D10 |
If the attacking program's roll is
greater than the data wall's the wall is penetrated.
Some Intrusion programs are
"noisier" than others. Hammer will
always alert the system to a break in, allowing it to
send offensive programs to deal with the break. Jackhammer
will alert the system on a roll of 8, 9 or 10 on a 1D10
roll; this check is made after the program is run,
whether the wall is breached or not. Worm will
alert the system on a roll of 9 or 10 in a 1D10 roll.
Anti-system attacks are also made against the data
walls of the system. The formula is the same as with
Intrusion attacks. If the Anti-system program's roll is
greater than the data wall's, the wall is penetrated and
the program takes effect in the next turn.
For example, if a Poison Flatline breaks
through a level 5 data wall, in the next turn, one of the
system or deck's memories will be erased each turn until
the Flatline is stopped. This could be done with a Killer
or other anti IC program.
Decryption programs attack Code gates and file
locks. Code gates are entryways into a computer
system. File locks are often placed on files to protect
them from entry. Decryption attacks are made as are other
anti-system attacks.
|