comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
112<br />
with a Disinfect Test (see p. 112). Purging software in this manner restores<br />
the program completely to its normal use and present rating.<br />
new Matrix actionS<br />
Matrix actions are sets of commands or instructions a Matrix<br />
user issues to a node via a certain program to perform a specific<br />
task. Note that a character logged onto a node using an account<br />
with certain account privileges (see p. 216, SR4) may automatically<br />
succeed at specific system operations, according to the limits<br />
of their account. The following system actions follow the same<br />
guidelines and rules as described in Shadowrun, Fourth Edition.<br />
corrupt data<br />
The Corrupt Data action unleashes a Corrupt program on<br />
a particular node or device. Similar to Browse, the program is set<br />
to seek out and destroy a particular piece of information with an<br />
Extended Hacking + Corrupt Test with an interval of 1 Combat<br />
Turn. The gamemaster sets the threshold based on the complexity<br />
of the data, the size of the node, and the abundance of the data,<br />
as suggested on the Corruption Table (p. 112). The gamemaster<br />
may also modify the dice pool or threshold to account for addition<br />
factors, like encryption and protection of data.<br />
The OS or the integrity of a node cannot be comprised by the<br />
use of the Corrupt program.<br />
disarm program<br />
To disarm a program, the hacker must make a Hacking +<br />
Disarm (<strong>Firewall</strong> + System, 1 Initiative Pass) Extended Test. When<br />
the threshold is reached, the targeted software can no longer be<br />
used against the hacker (i.e., Analyze will not detect the hacker,<br />
Attack will not target the hacker, and so on). The disarmed software<br />
still functions normally against others. Likewise, the hacker<br />
is still vulnerable to similar software wielded by others. Disarmed<br />
software will remain neutralized until it has been reloaded or until<br />
the hacker logs off the node.<br />
<strong>Firewall</strong>s may also be disarmed, but they feature coded countermeasures<br />
that make such attempts likely to trigger an <strong>alert</strong>. The<br />
node makes an Analyze + <strong>Firewall</strong> (Stealth) Extended Test each<br />
time a Disarm Test is made. If it meets its threshold before the<br />
Disarm Extended Test succeeds, an <strong>alert</strong> is triggered, and the<br />
<strong>Firewall</strong> immediately reconfigures itself so that the Disarm attempt<br />
must be restarted.<br />
Note that Disarm may not be used against Data Bombs—<br />
Defuse is required for that.<br />
corrUption taBLe<br />
Threshold Corrupted Data Task<br />
2 Corrupt some specific information on a basic commlink<br />
4 Compromise a criminal dossier in a police database<br />
8 Impair all copies of a file in a corporate nexus<br />
15 Corrupt every mention of Aztechnology’s secretive board<br />
of directors from Jackpoint<br />
20+ Scramble all SINs with the same biometric data in the<br />
Global SIN Registry nexus<br />
tHe cUtting edge:<br />
Military Grade Software<br />
Although normal programs are only commercially<br />
available to a maximum rating of 6, cutting edge<br />
software with a rating of 7 or higher does exist. Socalled<br />
military-grade or prototype software is usually<br />
used and distributed only among governmental and<br />
military spiders, special unit hackers (like GOD or ARM<br />
agents), or the operatives of the megacorporations<br />
that develop these programs.<br />
To prevent military programs from leaking into the<br />
shadows and black markets, copies of these programs<br />
are closely monitored. Use or loading of these programs<br />
is often restricted by biometric identification<br />
or the use of Limitation or Timer program options.<br />
It is rumored that some agencies and corporations<br />
purposely infect these programs with special viruses<br />
that leave dormancy as soon as the software is transferred<br />
to a different commlink or computer system<br />
in order to wreak havoc on those systems, delete the<br />
software, and/or report its location to its originators.<br />
The gamemaster designs exactly when and where<br />
to include such potent programs in his campaign. They<br />
should be rare at best, and finding, stealing, or otherwise<br />
acquiring such software could be an adventure<br />
unto itself—not to mention keeping it.<br />
disinfect<br />
In order to disinfect a virus, you must first have detected<br />
the virus (see Viruses, p. 120). Once detected, the virus can be<br />
purged with a Complex Action and an Opposed Test pitting<br />
Computer + Purge vs. the Virus Rating x 2. If successful, the<br />
virus and all copies of it residing in different programs in that<br />
node are removed.<br />
If a node is infected by more than one virus, a test must be<br />
made for each separate virus (this is considered part of the same<br />
Complex Action, however).<br />
new aUtoSoftS<br />
Autosofts are specialized programs that expand the options<br />
and capabilities of Pilot programs. Autosofts provide a specific<br />
skill or new ability that goes beyond the normal programming<br />
of either the drone’s dog brain or an agent’s<br />
frame programming.<br />
Unwired<br />
agent aUtoSoftS<br />
Agent autosofts are expert programs<br />
designed to augment Matrix agents and IC;<br />
they are not compatible with drone Pilots.<br />
Programmed mainly by Matrix security<br />
companies (because of the complexity of an<br />
autosoft’s programming), these subroutines<br />
are adaptive add-ons designed to put IC on par<br />
with intruding hackers or malware agents (like<br />
Simon Wentworth (order #1132857) 9