comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
prone to degradation. This is in part due to the continual improvement<br />
of the virus detection abilities of programs such as<br />
Analyze or Purge. A virus’s rating decreases at the rate of one<br />
point per month.<br />
Only viruses that carry a so-called metamorphic engine are immune<br />
to this degradation. The metamorphic engine is a subroutine<br />
that allows the virus to adapt and update itself in order to subvert<br />
detection and removal programs. Viruses with metamorphic engines,<br />
however, are much harder to acquire or program.<br />
infection of programs<br />
Whenever virus-ridden software is actively used in a Matrix<br />
action or test, the virus tries to infect another piece of software<br />
(gamemaster’s choice) that the user has access to either on the<br />
same node or in other accessible nodes (for example, a slaved node,<br />
or another node in a cluster). The gamemaster determines what<br />
software the virus targets; some viruses target particular programs,<br />
others choose randomly. Both active and inactive programs may<br />
be infected.<br />
Make an Opposed Test pitting the virus rating x 2 against<br />
the node’s <strong>Firewall</strong> + System. If the virus succeeds, it infects the<br />
targeted software, embedding a copy of its virus code into that<br />
other program. If the node wins, it has successfully located the<br />
virus and prevented infection and will alarm the user or system<br />
administrator.<br />
Note that infection is not only restricted to programs that<br />
“belong” to the node the virus is on (i.e., programs stored somewhere<br />
on that node). The virus may also infect programs run by a<br />
persona that is accessing the node—this is, in fact, how viruses are<br />
commonly spread. In this case, the infection test is made against<br />
the persona’s node, not the node the virus is in.<br />
detection and purging of viral Software<br />
The detection of virus-infested software depends on how the<br />
virus passes the <strong>Firewall</strong>. If a virus-carrying program is (down)<br />
loaded on a commlink or computer system, the system makes an<br />
Opposed Test pitting its <strong>Firewall</strong> + Analyze versus the Virus rat-<br />
tecHnoMancerS and MaLware<br />
As complex forms and the living persona are<br />
fueled by Resonance rather than regular code, technomancers<br />
are virtually immune to malware. Viruses<br />
usually fail to recognize complex forms as a viable<br />
host and are not able to infect them. Trojans cannot<br />
enter a technomancer’s living node, though technomancers<br />
can exploit trojan horses just like any hacker.<br />
Though worms will also fail to infect the living node of<br />
a technomancer, they can attack technomancers they<br />
encounter in a normal node.<br />
Amazingly, no technomancer has managed (so<br />
far … ) to create or shape a complex form that has<br />
the abilities of either a virus, worm, or trojan horse,<br />
though it is rumored that the creation of malware is<br />
within the capabilities of dissonant technomancers<br />
and entropic sprites (p. 179).<br />
Unwired<br />
ing x 2 to see if it detects the virus, applying a –4 modifier to the<br />
firewall’s roll. If it succeeds, it will block the download and alarm<br />
the user or system administrator.<br />
To detect a virus post-infection, the Matrix user must actively<br />
search for it (i.e. Observing in Detail, p. 136, SR4) by performing a<br />
Matrix Perception Test (p. 217, SR4). The virus opposes this test,<br />
rolling Rating x 2.<br />
Since virus code is actually copied into the infected software,<br />
viruses cannot be attacked in cybercombat, nor will rebooting a<br />
node make a virus go away (it respawns with the infected program).<br />
Infected programs may, of course, be crashed or deleted. To<br />
remove a virus and recover the original program, however, the user<br />
must perform a Disinfect Test with an antiviral Purge program<br />
(p. 111).<br />
viral warfare<br />
Virus-seeding hackers will often help a virus circumvent<br />
a firewall by installing the virus directly while hacking a node.<br />
Infecting a targeted program this way requires a Hacking + Edit<br />
(Virus Rating x 2, 1 Initiative Pass) Extended Test.<br />
SaMpLe virUSeS<br />
The following section describes the most annoying and<br />
dreaded viruses currently floating around in the 2070s. This<br />
is by no means an exhaustive list of the countless versions and<br />
species that have been compiled by insidious hackers, just a<br />
representative sample of the most common ones that hackers<br />
and other characters may deal with while interacting with the<br />
Matrix. Gamemasters and players are encouraged to explore<br />
these and expand upon them with their own, as necessary for<br />
their games.<br />
Buzz<br />
Infected Program Types: Simsense (Skillsoft)<br />
This virus contains BTL-like subroutines that are written<br />
into the target program, thereby creating a brain-bending<br />
skillsoft. For example, a moodchip-program (see Moodchips, p.<br />
250, SR4) may be integrated so that the user receives a sensual or<br />
invigorating sensation whenever the skillsoft is accessed. Because<br />
the user is receiving BTL effects, he could become addicted in<br />
the same way as if he used the BTL directly (see Addiction Test,<br />
p. 247, SR4).<br />
flicker<br />
Infected Program Types: Common, Hacking, Autosoft<br />
The virus opens or closes the node’s wireless connections<br />
randomly, causing the node to switch between different modes<br />
(active, passive, hidden), thereby impairing it.<br />
inertia<br />
Infected Program Types: Common, Hacking, Simsene,<br />
Autosoft<br />
Inertia viruses infect programs to render them functionally<br />
inert—they appear to be running, but they fail to respond as<br />
needed. Whenever a character tries to use the program, it fails to<br />
perform as desired (though the virus still tries to infect another<br />
program in the node of the same type). In game terms, the software<br />
does not provide its rating in dice to an attempted test.<br />
Simon Wentworth (order #1132857) 9<br />
121<br />
software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .