Matrix software
by Compiled by Aaron Wigley (wigs@yoyo.cc.monash.edu.au)
Cyberdeck Software
Program Frames
Barrier
Rating 10 Barrier IC (Keith Henry)
This is similar to the Pitbull below, in that it self adapts so as to not overload Node ratings. It usually manifests at a rating 5.
Blinders
Rating 6 Frame Construct (Keith Henry)
This program gets its initial information as to who to attack in a particular node from the starting cyberdeck/unit’s Sensors Utilities. It will continue to attack until it is destroyed, or the offending persona/IC leaves the system. It will follow persona’s/IC if they attempt to leave the node itself.
Greyhawk
Rating 9 Courier Frame Construct (Keith Henry)
If you make a copy of a file, you can give it to this frame which will attempt to take the file to an e-mail drop that is already within the frame’s option capacity. You can however designate the e-mail address at the time of start-up, thus altering the direction that the data will be going to. The frame self-destructs (as do most of these) upon completion of its task. If it loses the data for ANY reason (as in someone else tries to take it), it will destroy the information and auto-destruct on-node.
Resurger
Rating 6 Restoration Frame Construct (Keith Henry)
Different than what you may think, this frame is special in that it will try and recover memory that may have been lost due to node/system failures or attempts and file erasure. The rating of the frame is pitted against the rating of the node, plus the number of hours since the memory loss. Every success will achieve a 5% gain of “forgotten” memory.
Node Kill
Rating 6 Hog Frame Construct (Keith Henry)
This frame is special in that it is similar to the Hog programs you may be familiar with. It will double the effective LR every ACTION it gets during a turn. It however will not invade a decker’s cyberdeck UNLESS it is directly dropped into the cyberdeck’s MPCP/Persona system.
Pitbull
Rating 9 Killer IC (Keith Henry)
The pitbull is designed to kill EVERYTHING within a particular node. It contains an auto-filter so that it will appropriately modify itself down if need be so as to not overload the node rating. You cannot be within the node however, as it will not recognize friend or foe.
TRake
Rating 5 Attack Frame (Keith Henry)
Differing from the pitbull, the TRake is meant to attack another persona/IC while the decker continues to work in the node. Like the Blinders above, it gets its initial targeting information from the cyberdeck/unit’s Sensors Utilities.
Matrix Programs
Smokescreen I
Sensor Program MP = Rating^2 X 2 (Keith Henry)
With this program, it becomes a bit more possible to defeat Smoke and related styles of programs within Simsensual Reality (i.e., the Matrix). The rating of the Smokescreen I is pitted against the Rating of the Smoke program. For every two (2) successes the Smokescreen I has against the Smoke, the level of “interference” generated by the smoke is reduced by one (1) for the USER of the program only.
Smokescreen II
Sensor Program MP = Rating^2 X 3 (Keith Henry)
This program is essentially the same as the Smokescreen I above, but this version has a staging of one (1), instead of the above staging of two (2).
Smoke Filter I
Utilities Program MP = Rating^2 X 4 (Keith Henry)
This is a VERY powerful version of the Smokescreen(tm) programs as listed above. It can be viewed as a limited version attack program, as it does technically -attack- Smoke Programs and their effects. However, it is an all or nothing approach.
The rating of SFI is pitted against the Smoke Program’s effect. If the SFI gets even one (1) more success than the Smoke Program, then the Smoke Program is completely shut down/erased from the effect of the node. If the Smoke Program gets even one (1) success over the SFI, then the SFI has completely failed, and the Smoke Program continues functioning normally under its current parameters.
Compressor IV
Utilities Program MP = Rating^2 X 5 (Keith Henry)
This version of the Compressor Utilities Program functions at a greatly increased efficiency. Basically, it can compress a file 4 times greater size than the standard Compressor Utility program. Please note it takes a Compressor IV to uncompress something of this size, and the Compressor IV can uncompress files from the standard Compressor Utility program.
ICE
PURGE IC
(Author Unknown)
This White IC is similar to Scramble, but it will instead erase the entire file. This IC was introduced because in the past, deckers have been able to download and analyze the Scramble code and reverse the process.
Purge IC takes two actions to erase a file, and if it’s stopped during the first action (Slowed, destroyed, etc.) the file could conceivably be recovered, with the help of certain expensive utilities or maybe a real good NPC decker.
Load Rating: 1/2 Rating (round down)
DEMOLISHER IC
(Author Unknown)
This is another White IC based on Scramble. It is placed in a datastore and covers all the files in the node. When any of the files is read by unauthorized individuals, it scrambles the entire contents of the node. If any files are downloaded with the IC still in place, it works similarly to Scramble, except that if the IC is set off while within the deck, the IC, well, let’s just say it thinks of the deck as one big node, and all those files within that node… It starts with the largest file and works its way down. To destroy a file, roll the IC’s Rating with a target number equal to the MPCP Rating of the deck. A success indicates that the file or program was scrambled. This is done with each file, stopping only when the program fails a test. It goes without saying that utilities hit cannot be run. It’s possible to use a Rebuild utility on stuff hit by Demolisher (unless, of course, your Rebuild was scrambled…) Demolisher has a construct similar to Scramble (a light coating of something) except that it covers the entire node.
Load Rating: Rating x 1.5
Here are some nice little utilities to help you out. I got mine from a friend in Seattle. Check the bulletin boards for purveyors if you’re interested, but look out for narcs.
Micromara
M-2097 MINE DETECTOR
(Author Unknown)
Scooped from an obscure military database by an anonymous decker, this one will be a sure friend to the discriminating (and cautious). This is a heavily modified Browse used to detect files or programs that the user really doesn’t want to look at. Examples of these would be ones which cause systems alerts, activate IC, attempt traces, infect your deck with a virus, and so on. The target number is up to the GM, and depends on the sophistication of the trap (take a modern virus, for instance. It can range from the really obvious, to self-encrypting and mutating.)
Most versions of this program appear as a crew of military engineers who scrutinize every file with what you’ll recognize as mine detection methods. Low rating programs involve some guy crawling around poking a knife into the node in a pattern around him, while more advanced versions consist of a couple guys with a shovel and metal detection rig. (We’ve also seen a hacked Rating 1 version where some Merc, fingers in ears and eyes shut, stomps ahead with one foot. A detection is real cute…)
Options: One-Shot, Link
Rating: 1 through 10 (we got the whole series...)
Size: Rating^2
Price: same as Sleaze
Designer: UCAS Military
REBUILD
(Author Unknown)
Something hacked together by the Ice Bunny after having One Of Those Days. This program can be used to rebuild a scrambled file. The program is large, slow, and unpredictable. Fortunately, the good decker shouldn’t need it much, and the bad decker, well, he isn’t reading this. That’s why most of you’ll want the One-Shot version (aside from the size of the thing, that is) We understand that the Bunny is working on something to take care of Purged files, based on this thing.
When the program is running, roll the Rating of the utility, with a target number equal to twice the rating of the Scramble IC that hit the file. At least one success is necessary to even pull out usable data. Increased successes increase the amount of usable stuff that can be extracted (normally starts at about 50-75%). As well, the program requires a number of rounds equal to the Rating of the Scramble. The success test is made on the last round.
This program manifests as a bunch of cyber-gnomes who surround the file in question, tear it into tiny bits, and start sorting it into bits before rebuilding it. The whole process is reminiscent of a couple hyperactive kids putting together a puzzle.
Options: One-Shot
Rating: 1 through 10
Size: Rating^2 x 4 Mp
Price: Same as Evasion
Designer: Ice Bunny

