20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

them and plot them on a three-dimensional map or visual<br />

display, and assign them a threat rating as to how dangerous<br />

they are to each particular team member, even highlighting the<br />

ones that are the most immediate threat in a given moment.<br />

They can track the probable locations of opponents who have<br />

moved out of sensor range, anticipate opponents’ actions, and<br />

even calculate probabilities for different actions and outcomes.<br />

If desired, they can display ballistic trajectories, lines of sight,<br />

fields of fire, and blast radii.<br />

Tactical softs are of course designed to spot and analyze<br />

weapons, armor, and other combat factors. Their programming<br />

includes built-in databases of weapon, armor, and implant designs<br />

and schematics, making it possible for a team member to<br />

call up the specs on an opponent’s hardware. If something is not<br />

listed in its database, they can look it up online, provided there<br />

is an active Matrix connection. They can analyze acoustics to<br />

determine direction and caliber of the weapon, and count spent<br />

ammunition. To judge exactly what a tacsoft spots or knows, the<br />

gamemaster can make Perception Tests using Response + tacsoft<br />

rating. If the tacsoft needs to search for something online, it rolls<br />

tacsoft rating + Browse.<br />

Tactical softs can also take advantage of auxiliary input,<br />

such as floor plans or mapsofts, GPS positioning via commlink,<br />

sensor software (see p. 60, Arsenal), or external sensor feeds that<br />

are patched into the network. Team members with biomonitors<br />

can also feed that data to the network, allowing their teammates<br />

to remotely check their health and vital signs. Spiders are particularly<br />

valuable to tactical networks, as they can plug in data<br />

from their rigged security systems, giving team members access<br />

to interior sensors and possibly even building controls (if the<br />

rigger allows it—most will not, preferring to exercise control<br />

over their domain).<br />

Software BUndLeS<br />

While programs are the bread and butter of software manufacturers<br />

these days, there is always the demand to keep the market<br />

alive with new package offers, functional upgrades, and improvement<br />

of programs by options or making them less impacting on<br />

smaller computer systems. Learning from cybertechnology’s take<br />

of integration and optimization, program packages, software<br />

suites, and skillsoft clusters have become a latest market trend in<br />

the software field to persuade the customer to replace their old<br />

programs with new ones.<br />

Unwired<br />

prograM packageS<br />

Program packages are usually special offers made by software<br />

companies to customers buying new commlinks/nodes. They typically<br />

include legal programs, agents, and sometimes specialized software as<br />

a package deal with a 10–20% discount on the total price.<br />

Eastern Tiger Palladium<br />

Programs: Armor 4, Biofeedback Filter 3, Medic 3, Track 4<br />

Eastern Tiger offers some defensive utilities in their Palladium<br />

package deal, designed for freelance spiders and Matrix security<br />

specialists that go one-on-one with intruding hackers or worms.<br />

Eurosoft Clavicula<br />

Programs: Decrypt 5, Encrypt 5<br />

The Clavicula is a high-end software package featuring excellent<br />

encryption and decryption routines from one of Renraku’s<br />

premier software manufacturer.<br />

ftL Matrixware net wizard<br />

Programs: Analyze 3, Browse 3, Command 1, Edit 2, Purge 3<br />

The Net Wizard is a basic package that includes the most<br />

common program needed by a run-of-the-mill Matrix user. Perfect<br />

as a starter package to go with new commlinks.<br />

ftL Matrixware power Suite<br />

Programs: Analyze 3, Browse 4, Command 2, Edit 4, Purge 4,<br />

Scan 2<br />

Another NeoNET-subsidiary starter package, this one marketed<br />

towards more advanced Matrix users, business professionals,<br />

and the wealthy.<br />

pocket Hacker<br />

Programs: Agent (Pilot 3, Browse 3, Exploit 3, Stealth 3)<br />

Released by the notorious Hacker House, this illegal program<br />

package is intended for someone who needs a hacker, but doesn’t<br />

know how to hire one or doesn’t want to use a real person.<br />

Singularity Seeker<br />

Programs: Browse (Crashguard) 5, Browse Agent (Pilot 3 with<br />

Browse 3)<br />

This package from a Horizon subsidiary earned solid reviews<br />

for its reliability and intuitive search interface, including a search<br />

bot of moderate quality.<br />

Tactical Software Availability Cost<br />

Tacsoft (Rating 1–4) Rating x 5 Rating x 3,000¥<br />

Program Packages Availability Cost<br />

Eastern-Tiger Palladium 6R 6,640¥<br />

Eurosoft Clavicula 10R 4,700¥<br />

FTL Matrixware Net Wizard — 480¥<br />

FTL Matrixware Power Suite — 1,240¥<br />

Pocket Hacker 10F 4,920¥<br />

Singularity Seeker 4 8,200¥<br />

Simon Wentworth (order #1132857) 9<br />

127<br />

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!