20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

prone to degradation. This is in part due to the continual improvement<br />

of the virus detection abilities of programs such as<br />

Analyze or Purge. A virus’s rating decreases at the rate of one<br />

point per month.<br />

Only viruses that carry a so-called metamorphic engine are immune<br />

to this degradation. The metamorphic engine is a subroutine<br />

that allows the virus to adapt and update itself in order to subvert<br />

detection and removal programs. Viruses with metamorphic engines,<br />

however, are much harder to acquire or program.<br />

infection of programs<br />

Whenever virus-ridden software is actively used in a Matrix<br />

action or test, the virus tries to infect another piece of software<br />

(gamemaster’s choice) that the user has access to either on the<br />

same node or in other accessible nodes (for example, a slaved node,<br />

or another node in a cluster). The gamemaster determines what<br />

software the virus targets; some viruses target particular programs,<br />

others choose randomly. Both active and inactive programs may<br />

be infected.<br />

Make an Opposed Test pitting the virus rating x 2 against<br />

the node’s <strong>Firewall</strong> + System. If the virus succeeds, it infects the<br />

targeted software, embedding a copy of its virus code into that<br />

other program. If the node wins, it has successfully located the<br />

virus and prevented infection and will alarm the user or system<br />

administrator.<br />

Note that infection is not only restricted to programs that<br />

“belong” to the node the virus is on (i.e., programs stored somewhere<br />

on that node). The virus may also infect programs run by a<br />

persona that is accessing the node—this is, in fact, how viruses are<br />

commonly spread. In this case, the infection test is made against<br />

the persona’s node, not the node the virus is in.<br />

detection and purging of viral Software<br />

The detection of virus-infested software depends on how the<br />

virus passes the <strong>Firewall</strong>. If a virus-carrying program is (down)<br />

loaded on a commlink or computer system, the system makes an<br />

Opposed Test pitting its <strong>Firewall</strong> + Analyze versus the Virus rat-<br />

tecHnoMancerS and MaLware<br />

As complex forms and the living persona are<br />

fueled by Resonance rather than regular code, technomancers<br />

are virtually immune to malware. Viruses<br />

usually fail to recognize complex forms as a viable<br />

host and are not able to infect them. Trojans cannot<br />

enter a technomancer’s living node, though technomancers<br />

can exploit trojan horses just like any hacker.<br />

Though worms will also fail to infect the living node of<br />

a technomancer, they can attack technomancers they<br />

encounter in a normal node.<br />

Amazingly, no technomancer has managed (so<br />

far … ) to create or shape a complex form that has<br />

the abilities of either a virus, worm, or trojan horse,<br />

though it is rumored that the creation of malware is<br />

within the capabilities of dissonant technomancers<br />

and entropic sprites (p. 179).<br />

Unwired<br />

ing x 2 to see if it detects the virus, applying a –4 modifier to the<br />

firewall’s roll. If it succeeds, it will block the download and alarm<br />

the user or system administrator.<br />

To detect a virus post-infection, the Matrix user must actively<br />

search for it (i.e. Observing in Detail, p. 136, SR4) by performing a<br />

Matrix Perception Test (p. 217, SR4). The virus opposes this test,<br />

rolling Rating x 2.<br />

Since virus code is actually copied into the infected software,<br />

viruses cannot be attacked in cybercombat, nor will rebooting a<br />

node make a virus go away (it respawns with the infected program).<br />

Infected programs may, of course, be crashed or deleted. To<br />

remove a virus and recover the original program, however, the user<br />

must perform a Disinfect Test with an antiviral Purge program<br />

(p. 111).<br />

viral warfare<br />

Virus-seeding hackers will often help a virus circumvent<br />

a firewall by installing the virus directly while hacking a node.<br />

Infecting a targeted program this way requires a Hacking + Edit<br />

(Virus Rating x 2, 1 Initiative Pass) Extended Test.<br />

SaMpLe virUSeS<br />

The following section describes the most annoying and<br />

dreaded viruses currently floating around in the 2070s. This<br />

is by no means an exhaustive list of the countless versions and<br />

species that have been compiled by insidious hackers, just a<br />

representative sample of the most common ones that hackers<br />

and other characters may deal with while interacting with the<br />

Matrix. Gamemasters and players are encouraged to explore<br />

these and expand upon them with their own, as necessary for<br />

their games.<br />

Buzz<br />

Infected Program Types: Simsense (Skillsoft)<br />

This virus contains BTL-like subroutines that are written<br />

into the target program, thereby creating a brain-bending<br />

skillsoft. For example, a moodchip-program (see Moodchips, p.<br />

250, SR4) may be integrated so that the user receives a sensual or<br />

invigorating sensation whenever the skillsoft is accessed. Because<br />

the user is receiving BTL effects, he could become addicted in<br />

the same way as if he used the BTL directly (see Addiction Test,<br />

p. 247, SR4).<br />

flicker<br />

Infected Program Types: Common, Hacking, Autosoft<br />

The virus opens or closes the node’s wireless connections<br />

randomly, causing the node to switch between different modes<br />

(active, passive, hidden), thereby impairing it.<br />

inertia<br />

Infected Program Types: Common, Hacking, Simsene,<br />

Autosoft<br />

Inertia viruses infect programs to render them functionally<br />

inert—they appear to be running, but they fail to respond as<br />

needed. Whenever a character tries to use the program, it fails to<br />

perform as desired (though the virus still tries to infect another<br />

program in the node of the same type). In game terms, the software<br />

does not provide its rating in dice to an attempted test.<br />

Simon Wentworth (order #1132857) 9<br />

121<br />

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!