20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

112<br />

with a Disinfect Test (see p. 112). Purging software in this manner restores<br />

the program completely to its normal use and present rating.<br />

new Matrix actionS<br />

Matrix actions are sets of commands or instructions a Matrix<br />

user issues to a node via a certain program to perform a specific<br />

task. Note that a character logged onto a node using an account<br />

with certain account privileges (see p. 216, SR4) may automatically<br />

succeed at specific system operations, according to the limits<br />

of their account. The following system actions follow the same<br />

guidelines and rules as described in Shadowrun, Fourth Edition.<br />

corrupt data<br />

The Corrupt Data action unleashes a Corrupt program on<br />

a particular node or device. Similar to Browse, the program is set<br />

to seek out and destroy a particular piece of information with an<br />

Extended Hacking + Corrupt Test with an interval of 1 Combat<br />

Turn. The gamemaster sets the threshold based on the complexity<br />

of the data, the size of the node, and the abundance of the data,<br />

as suggested on the Corruption Table (p. 112). The gamemaster<br />

may also modify the dice pool or threshold to account for addition<br />

factors, like encryption and protection of data.<br />

The OS or the integrity of a node cannot be comprised by the<br />

use of the Corrupt program.<br />

disarm program<br />

To disarm a program, the hacker must make a Hacking +<br />

Disarm (<strong>Firewall</strong> + System, 1 Initiative Pass) Extended Test. When<br />

the threshold is reached, the targeted software can no longer be<br />

used against the hacker (i.e., Analyze will not detect the hacker,<br />

Attack will not target the hacker, and so on). The disarmed software<br />

still functions normally against others. Likewise, the hacker<br />

is still vulnerable to similar software wielded by others. Disarmed<br />

software will remain neutralized until it has been reloaded or until<br />

the hacker logs off the node.<br />

<strong>Firewall</strong>s may also be disarmed, but they feature coded countermeasures<br />

that make such attempts likely to trigger an <strong>alert</strong>. The<br />

node makes an Analyze + <strong>Firewall</strong> (Stealth) Extended Test each<br />

time a Disarm Test is made. If it meets its threshold before the<br />

Disarm Extended Test succeeds, an <strong>alert</strong> is triggered, and the<br />

<strong>Firewall</strong> immediately reconfigures itself so that the Disarm attempt<br />

must be restarted.<br />

Note that Disarm may not be used against Data Bombs—<br />

Defuse is required for that.<br />

corrUption taBLe<br />

Threshold Corrupted Data Task<br />

2 Corrupt some specific information on a basic commlink<br />

4 Compromise a criminal dossier in a police database<br />

8 Impair all copies of a file in a corporate nexus<br />

15 Corrupt every mention of Aztechnology’s secretive board<br />

of directors from Jackpoint<br />

20+ Scramble all SINs with the same biometric data in the<br />

Global SIN Registry nexus<br />

tHe cUtting edge:<br />

Military Grade Software<br />

Although normal programs are only commercially<br />

available to a maximum rating of 6, cutting edge<br />

software with a rating of 7 or higher does exist. Socalled<br />

military-grade or prototype software is usually<br />

used and distributed only among governmental and<br />

military spiders, special unit hackers (like GOD or ARM<br />

agents), or the operatives of the megacorporations<br />

that develop these programs.<br />

To prevent military programs from leaking into the<br />

shadows and black markets, copies of these programs<br />

are closely monitored. Use or loading of these programs<br />

is often restricted by biometric identification<br />

or the use of Limitation or Timer program options.<br />

It is rumored that some agencies and corporations<br />

purposely infect these programs with special viruses<br />

that leave dormancy as soon as the software is transferred<br />

to a different commlink or computer system<br />

in order to wreak havoc on those systems, delete the<br />

software, and/or report its location to its originators.<br />

The gamemaster designs exactly when and where<br />

to include such potent programs in his campaign. They<br />

should be rare at best, and finding, stealing, or otherwise<br />

acquiring such software could be an adventure<br />

unto itself—not to mention keeping it.<br />

disinfect<br />

In order to disinfect a virus, you must first have detected<br />

the virus (see Viruses, p. 120). Once detected, the virus can be<br />

purged with a Complex Action and an Opposed Test pitting<br />

Computer + Purge vs. the Virus Rating x 2. If successful, the<br />

virus and all copies of it residing in different programs in that<br />

node are removed.<br />

If a node is infected by more than one virus, a test must be<br />

made for each separate virus (this is considered part of the same<br />

Complex Action, however).<br />

new aUtoSoftS<br />

Autosofts are specialized programs that expand the options<br />

and capabilities of Pilot programs. Autosofts provide a specific<br />

skill or new ability that goes beyond the normal programming<br />

of either the drone’s dog brain or an agent’s<br />

frame programming.<br />

Unwired<br />

agent aUtoSoftS<br />

Agent autosofts are expert programs<br />

designed to augment Matrix agents and IC;<br />

they are not compatible with drone Pilots.<br />

Programmed mainly by Matrix security<br />

companies (because of the complexity of an<br />

autosoft’s programming), these subroutines<br />

are adaptive add-ons designed to put IC on par<br />

with intruding hackers or malware agents (like<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!