You are on page 1of 18

This is indended to be a complet rewrite and replacement for the current matrix rules and setting for shadowrun.

It will define computer, network and program operation as well as decking and other tasks in and around the matrix. Once i have made enough progress it will be split and prettied up from this work in progress file. Matrix Interfaces A computer systems user interface is classified by its abstraction level, each abstraction level provides the user with a different set of information presentation. Where higher abstraction level interfaces are much easier to use for the normal user, they provide less detailed information for the poweruser. In addition to those basic interfaces levels, some additional interfaces can be provided with specialized functions. Each interface can be router to a remote computer and displayed on its system, if the available bandwidth is sufificiant. 3D The 3D interface is the standard user interface of every modern day computer that is bigger then a PDA or cellphone. It presents the network, file and programs in a simulated 3D envrionment with a standardized iconographic representation that enables the user to use such computer systems with ease and less learning time when switching from one system to another. However, it does not allow for detailed interaction with programs or hosts. A 3D interfaces requires a bandwidth of 100 for remote display. 2D The 2d interfaces uses a flat projection where programs are presented by windows in varying sizes and contents, it is used these days mostly for provding a interfaces to small and simple computer systems where a full 3D abstraction level interface is not needed or to costly. A 2D interfaces requires a bandwidth of 10 for remote display. 1D The 1D abstraction level is the domain of the gurus and poweruser, it allows a direct manipulation of a computer systems configuration and programs. Unlike the 2D abstraction level interface, a 1D level interface can be started and used as subinterface in a 2D or 3D interface, as well as run completly independant on its own without the overhead of the higher abstraction levels. A 1D interface requires a bandwidth of 1. Verbal the verbal interface enables a use to comminicate verbaly with the computer system, its uses are however limited due to the difficulties of expressing detailed commands easily in a spoken languages. Its uses is primarly for entertainment systems, and very small computer systems that have no room for another kind of interface. Cybernetic The cybernetic interfaces allows a user equiped with a datajack to directly interact with a computer system without the need for a keyboard and display device. All three abstraction level interfaces can be used this way. Hosts Computer systems come in many different shapes and sizes, they can be however classified into several sub categories according to their primary function. Embeeded

Embeeded system are not primary a computer, but another piece of equipment and be controlled by limited range of capablitlies which is tailored buil in. However, a clever user can misuse such programs outside its build in functions.

rather computers buildin to it. A embeeded system has a to the specific device it is embeeded system to run

PDAs The PDS is the standard portable computer system, small, compact and rugged it allows the user on the road access to many functions. Wearable Building on the PDa concept, a wearable computer is worn directly on the body of the user, or is build into her clothes. Their uses range from providing personal entertainment systems to work augmentation by providing computer access while leaving the hands free. This host style went quickly uncommon since the advent of cyberware, however, magical active person and others who can't or want have cyberware implants are very found of them. Cranial Deck A cranial deck is highly miniturizes deck that can be build directly into the brain of the user, or in some cases into an arm or leg. Decks A portbale powerfull computer system, it is normale equiped with a build in keyboard and pointing device and a attached display device. Its capabilites ranging from simple PC replacements to portbale high cost workstations for the profesional computer user on the road. Very popular with deckers, from which they took their name due to highs mobility and available computaional power. Box The box is a ultra thin client, providing nothing more then in and output capabilities to the user, while all the programs the user wants to run are running remotely on more or less large servers. Very popular in the corporate environment since they can be much tighter controlled then a standalone machine. As added functionality they provide the user with the ability to associate his running session with her SIN and have it apear on what ever box is available and connected to the same server system. A user can perform a attach and a detach opertion with her session. While detachted the session keeps runing uninterupted on the server, with no in or outputs and resumed instantly when attached again. The box is the most communly found computer system beside the PDA in a citizens home, providing the user with trideo, and matrix access all in a single system with no worries. PCs A small sizes computer system for stationary use. Its function ranges from entertainment system and general purpose computing device. It comes as standard with the matrix program installed and moderate store capacity. Workstations A workstation is a powerfull small computer system, usualy found in specialized roles in scientific or system control roles for larger servers, providing a small number of users, mostly one, a sophisticated high power system. Server Servers come in many different sizes, they are used normaly to provide services, programs, storage, resources, hence the name server, to many users and other computer system. - Cluster

A cluster is a combination of several single computer system into one bigger, more powerfull system. This provides with greater fault tolerance and precessing power and resources. - Router A router is a specialized computer system to control network traffic. They come from small plam sizes units with no build in inteligence to room size titanic systems that can control and direct network traffic for a whole country. - Firewall A firewall is a specialised system which main function is to detect intrusions into a computer network and defend against it. - Storage A storage system is used to provide one storage device for storing all kinds of fast access. They range from single sub computers to many rack size big systems at once. or several hosts with an external data and program files for easy and palm size units for portable that can be used by several servers

Connectors Each computer system has one or several connectors over which additonal components or network connectivity can be provided for the system. Network A network connector allows the system to be integrated into a standard network system. Storage Network A strogae network connector allows for a system to be conencted to a storage device or network. Peripherial The standard peripherial connector allows for a wide range of peripherial options to be conected to the system. Display A display link allows one or more display devices to be connected to a computer system if such device is not build into the system itself. Datalink The datalink connector is used for the cybernetic interface subsystem to allow connections of the system to the datajack of a so equiped metahuman user . Perepherials Input devices - Keyboard - Mouse - Microphone - Scanner - Cameras - Trideo - Sensors - touch - odor - movement

- light Output devices - Displays - Trideo - Speaker - Datalink - Printer - 3D printer Removable Storage - Datadisks A datadisk allows for recording and reading of all kinds od files, from simple text notes to full sim recodrings, robust and easy to handle. - Mediadisks A media disk is a datadisk dedicated to media distribution and lacking the abilty to be written too. - Datachips Datachips have the same usages as datadisk, but in a smaller form and without a moving part inside, they are however more expensive then a simple datadisk. - Mediachips Again a read only variant of the datachip for distribution of files. - Simdisks A simdisk is a high capacity datadisk, named so because of its main use in storing sim data. - Simchips Again a read only variant of the simdisk. - Solid State Disks SSDs are high capacity read write storage medias, usualy in the form of small, cigarette pack sized boxes that can be hooked up to all modern day computers with a storage network connector. They provide the same ammount or more of storage space then a normal PCs, for easy transport and backup of large data ammounts. Networks Computer system can be arranged into networks, connecting several system together, allowing so commonication and resource sharing between the system in a network. Each network needs at least 2 computer systems to be connected and a transport medium, usually a optical cable or a wireless conection. However, for more then 2 system networks, at least one router needs to be setup also which controls the traffic flow in the network. LANs A LAN is a local area network, usualy limited to a building or even room of a building. A LAN is easy and fast to setup, allowing so for adhoc network forming and expansion. MANs The MAN, or metropolian network is a network that covers a city or equivalant area, allowing many LANs to be connected over it to the larger matrix itself. WANs A WAN, or wide area network provides the backbones of country size networks, connecting the several MANs together.

GANs GANs spawn the entire globe and some even reach out into space to the many space stations and satellites in the solar system. They form the backbone of the matrix itself, proving astronomical bandwidth for conencting the contries WANS together into a single network. Transport mediums A network needs a transport medium for its communication. - Wire The wire transport is the standard transport medium, formed from a single optical cable for home and small use, to more then arm thick multi optical links for transcontinental connections. - Wireless wireless transports allow for networking without physical conenction between the network nods. Its range is somewhat limited, but can range in specialized installations up to the edge of the solar system. - Storage Networks Storage networks are specialized networks for distribution of storage resources between different computer systems, mainly large server farms and clusters. Data Storage Data needs to be stored or remotely accessible for a computer to be used, this happens in several standard fileformats. File Formats Standard file formats are defined by the Matrix Technology Standards Oragnization, or MSO in short. These standards are the result of decade long format development and battles over which format is the best for a given tasks. They enable the seamless operation of the matrix and are the basis of the hardware and OS independance of modern day programs. In day to day use the MSO part is usualy not used since everyone knows that it is meaned when talking about standard file formats. MSO-D is a general data container format, it is usualy associated with a specific program type or even a specific program. For example 3d construction data, raw movie streams etc. MSO-T is the standard file format for plain text files. MSO-C is the standard fileformat for system and program configuration files. MSO-M is the standard fileformat used for sound and music data. MSO-E is the standard fileformat for executable data, aka programs. MSO-4 is the standard fileformat for simsense data files. MSO-3 is the standard fileformat for trideo data files. MSO-2 is the standard fileformat for flat movie files. MSO-1 is the standard fileformat for flat picture non movie graphic files. Each data file can also be present up to two subversions versions, usualy prefixed by a small c for a compressed state or a e for a encrypted state.

Compressing a datafile reduces a datafile size to one third of its original size. Connections To connect from one host to another a connection must be established, this is done with a program and happens usualy in the background, hidden from the user. Connections come in two basic variants, plain text uses human readable commands send over the physical connection betwen the hosts. Binary connections are used for high speed transportations of binary data, for example trideo streams 3D display informations etc. In addition both conneciton types can be encrypted, which make sit harder to intercept, tap or hijack and it can also be compressed to reduce bandwidth requirments. Compressing or encrypting a plain text connetion transforms it into a binary connection type. A compressed connection uses one third of the normal bandwidth needed for the same type of data transfer. (>)"I see dead sockets." (>) Crey Programms Every computer needs programs to be more then a useless junk of hightech optical circuts. Programs are rated by their sophistication and range from 1-12, each rating making a program more cabable and bigger, requiering more computer resources to run. Programs come as basic programs which can be enchanted by several options to enable additional functions, beyond its original capabilities . Each program has several statistics. Rating The rating of a program, it can be two values, the design rating and the effective rating if the design rating gets modified by an programs option. the design rating itself is limited to a maximal value of 12. Active Size The active size listes the active memory requirments of the program while running on a computer system. Storage Size The storage size lists the storage memory requirments of a program. Development Time How long it takes to create a certain program. Complexity Complexity is used for measuring CPU resource usage. complextity has 3 seperat e values, full, casual and idle, each representing the different usage patter of a program. Bandwidth How much bandwidth a progran requires for remote operation. Function What functions a program provides.

Options Build in options of a program. Price How much the program legaly costs. SI A programs street index for blackmarket buyers. Avail The availability of a certain program. Legality How legal a certain program is. Programs can be in several different states, which are, active and dormat, where the active state is further detailed into three substates, full, casual and idle. A full active program uses up the most resources in cpu, a casaul active program uses one third its cpu resources and a idle program uses zero cpu resources. In the dormat state the program resides fully on storage space and is not running at all. A program can be switched between the different states by the user or events on the computer system, like a massenger is idle when no messanges are composed, read or handled in other ways, but it would switch to casual to inform the user when a new message has arrived. Switching between active states takes a free action, while switching between active and dormat states takes a complex action. Core Programs Core programs are what bring a computer to life, controling its hardware and resources. Every computer system needs to run atleast the OS, operating system, program. OS Each computer needs a operating system which controls its hardware resources. It handles in and output for the user and does user privilegie control. A OS consist of three distinctive parts, the kernel, hardware drivers and the userland. Kernel and drivers are hardware specific and can't be transported to another computer platforms hardware without retooling. The userland holds the programs the user uses to interact directly with the system, all userland programs are hardware independed and can be run on any computer system without modifacation. however, they may require certain hardware options to be present for a usefull function. Spezialized computer systems however still tend to run a hardware tailored OS where kernel and userland is tailored to run only on this specific type of computer systems. Router, firewalls, storage systems and embeeded system are usualy running a specialized OS and programs tailored for their specific tasks. The rating of the OS is the overall limit on how high a individual programs rating can be. Rating 1 2 3 4 5 6 7 8 9 Active Storage Complexity DevTime 1 1 2 100 2 4 6 200 3 9 12 400 6 16 22 800 9 25 34 1600 15 36 51 3200 24 49 73 6400 39 64 103 12800 63 81 144 25600 Price 100 300 1k 3k 10k 30k 75k 100k 130k SI 1 1 1 2 2 2 3 3 3 Avail 2/12h 3/12h 4/48h 5/3d 6/1w 7/1w 8/2w 9/2w 10/3w Legality Legal Legal Legal Legal Legal Legal Legal Legal Legal

10 102 11 165 12 267

100 121 144

202 276 411

51200 102400 204800

270k 1m 4m

4 11/3w Legal 4 12/4w Legal 4 13/2m Legal

Virtual Machine A virtual machine pogram, or VM for short, additional instances of a OS in a emulated determins how many guest OSes a VM can run the VM's rating by itself to determine the an

enables a compter system to run hardware envrionment. The rating at the same time. For this multiply number of guest OS instances that c

be run at the same time. However, the physical resources of the host computer need to be shared with all running instances. Rating 1 2 3 4 5 6 7 8 9 10 11 12 Active Storage Complexity DevTime 1 1 2 50 1 1 2 100 2 1 3 200 3 2 5 400 5 3 8 800 8 6 14 1600 13 9 21 3200 21 12 33 6400 34 18 52 12800 55 30 85 25600 89 45 133 51200 134 70 204 102400 Price 200 250 300 600 1k 2k 4k 10k 30k 80k 250k 1m SI 2 2 2 3 3 3 4 4 4 5 5 5 Avail 4/2d 5/2d 6/2d 7/4d 8/5d 9/6d 10/8d 11/2w 12/2w 12/3w 12/3w 12/1m Legality Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal

Container A container is used to contain, hench the name, several independent slices of the operating system. Each container runs isolated instances of the same OS of the host. Their fine resource control and isolation makes them idealy suited for quickly slicing up the main systems resources for specific tasks like testing, development or for security reasons. Each rating allows the main OS to be slices into rating times rating times 100 seperate running OS instances on the same system, each independent from each other. Rating 1 2 3 4 5 6 7 8 9 10 11 12 Active Storage Complexity DevTime 1 1 2 50 1 1 2 75 1 1 2 100 2 2 4 150 3 3 6 300 4 4 8 600 7 7 14 1200 11 11 22 2400 18 18 36 5000 29 29 58 10000 47 47 94 20000 76 76 152 40000 Price 100 150 200 400 800 1600 3k 7k 15k 30k 100k 400k SI 1 1 1 2 2 2 2 2 2 3 3 3 Avail 4/2d 5/2d 6/2d 7/4d 8/5d 9/6d 10/8d 11/2w 12/2w 12/3w 12/3w 12/1m Legality Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal

Database A datebase can hold and manage a multidue of data for fast and easy access, such as user data, project data, movie or music colections. Each modern day computer system uses at least one database at his core to organize the files and user on the system. Rating Active Storage Complexity DevTime Price SI Avail Legality

1 2 3 4 5 6 7 8 9 10 11 12

1 1 1 2 3 4 7 11 18 29 47 76

1 1 1 2 3 4 7 11 18 29 47 76

2 2 2 4 6 8 14 22 36 58 94 152

50 75 100 150 300 600 1200 2400 4800 9600 19200 38400

200 250 300 600 1k 2k 4k 10k 30k 80k 250k 1m

1 1 1 1 1 2 2 2 3 3 4 5

4/2d 5/2d 6/2d 7/4d 8/5d 9/6d 10/8d 11/2w 12/2w 12/3w 12/3w 12/1m

Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal Legal

User Programs User programs are what a user interacts and works with. They enable the pure OS to be something usefull. Matrix The Matrix program is the heart of a modern day computer users programs, it is used to interact with the matrix virtual reality environment, from which it got its name. It provides also the standard tools, like a build in massenger and email solution, a media player for the users various medial needs from music, to sim feeds and a personal database for notes, appointments, etc. The normal user does not need anything beside the matrix for her daily computer needs. It uses the systems core database as its backend for storing and accessing a systems system and user files. Viewers Viewers are specialised data representing programs, they come in a myriad of variants for all kinds of file formats. Editors Editors come in a wide range of variants, specialized for editing from simple text to highly complicated sim editors. Agents Agents are programs that can relocate themselfs from one computer system to another, some have a build in replication function. Their uses are various. example programs Spider A spider is a agent designed for information collection, a user can run a spider to wander the matrix searching for specific informations. Compilers Compilers are used to write, assemble and compile pograms from various sources into runable programs. They range from simple and cryptic pure text versions to complete integrated development environments. System Programs System programs enhance the core functions of an given OS and are used mainly by operators to protect from decker or by deckers to gain access to other computer systems. Database Similar to the systemwide core database, several other databases are used throughout the computer world to collect, categorize and store data of all kinds.

Boxer The boxer provides the needed functionality to a computer to be able to run Box systems of its resources. For performance and security reasons the boxer is usualy heavily hardened, tailored and streamlined, which makes them very expensive in development. Each boxer rating allows its rating cubed times 1000 box systems to be connected to the system it runs on to share its resources. Firewall A firewall program hardends a system against attacks and intrusion attemps from the outside. It can be run as front line defense on a specializes system, called a firewall, or as additional host security directly on a normal host. Runing it on a dedicated system however is more effective then running it on a normal host, since on such host the resources need not to be shared by the other functions of the systems. - Passive A passive firewall blocks without direct notifications, its rating is added as modifier to a scanning and intrusion test against systems protected by it . - Active A active firewall includes sophisticated notifications methodes and can adept itself on the fly to the attack patterns. They use 1.5 times their rating as intrusion test modifier. Shaper A shaper program allows for precise traffic flow control on a system, usualy deployed on dedicated routers for better network managment. It allows for priorizing and garanteeing bandwidth for the connected hosts. It also allows for reducing available bandwidth for a specific network or host. IDS The intrusion detection system overwatches actively a systems files and programs for alterations in their configration and can detect network attacks and local hacks to break into a system. Its rating is added to a systems operator matrix intrusion detection skill. If no operator is present it uses twice its rating as intrusion awareness skill and can notify a operator of a detected inconsitancy. ICE ICE programs are active defense programs that can counter attack a system that is used to attack its hosts or network. Tracker A tracker allows for tracking and mapping traffic flow between host systems. They add their rating to a operators matrix tracking skill. Logger A logger is a program designed to collect and log user inputs into a computer system, more sophisticated loggers can also log and protocol a users usage patters and resource allocations. Checker A checker program is used to make an intergrty check of the data and program files on a system, allowing so to locate and identify altered files. Similiar to an IDS, however unlike an IDS its not running constantly, but only at operator action. It adds its rating to the operators matrix intrusion detection skill.

Manager A manager is designed for system operators to provide a compressed view of system activities, user count, program execution, bandwidth usages etc. A operator can use the manager program to control, and manipulate a systems resources. It adds it rating to the operators matrix operation skill. Automaton A automaton program is a modular program that acts on its own according to its programm, its functionality can be enhanced with several sub programs, for example adding a tracker, a ids and a ice subprogram would allow the program to detect, track and attack other hosts on the matrix without user interference. Each automaton can be enhanced by its rating plus 1 with subprograms. All subprogram ratings together can be as big as four times the automatons rating. Virus A virus is a specialized automaton that has self replicating and propagation functions buildin which enables it to spread over many systems. Trojan A trojan is a program used to spy and perform functions on other computer systems in secret. Harvester A more sohpisticated spider program, it can enter different hosts, map and collect data about the system and wander to the next hosts, removing traces of its existance. Terminals Terminals are low level computer access programs, they operate at the lowest interface abstraction level and are to the modern day computer user highly cryptic to use. However they allow a experianced user to access all functions of a computer since they interact doirectly with the underlaying OS. Program options Program options are used to add functionality for specific tasks to other programs. Backdoor A backdoor is a secret access function of a program that can be used to access a system where a program with this option is installed and running, avoiding s o the normal identity tests made by the system. The rating of the backdoor is the target for an operator to locate it when running on her system, or when exaiming the program for it. Hide The hide option enables a program to be either not detectable or to be detected as something else. The rating is used as target number for finding that such program even exists on a given system. Stealth The stealth option is needed to allow programs to operate in stealth mode. It enables for example a scanner to spread out his scanning over a longer time frame, reducing so the risk of detection. Each stealth rating gives a +1 modifier for someone to detect an stealth progr ams operation, which a maximal rating of 6. Self replication

A self replication program can copy itself and multiply itself. The designer and user decide if and under what conditions it is doing this and how it shoul d behave. Exmaple, just self replicate on the storage system to fill it up, or self replicate and run the new instances, consuming so active computer resources to slow down and block a system. Self propagation A program build with the self propagation option can relocate itself from one host to another. This is usualy coupled with the self replication function and used for virii. Multiple User Interfaces A MUI option equiped program can be operated in all 3 abstraction levels without loss of functionality. This option makes a program 30% bigger in resource allocation and raises its development time by 25% Notification A notification option allows the program to notify its user of operational condition changes. The designer and user user can set certain triggers and notification methods. Tailored A tailored program is desgined and build to run on a specific hardware and OS only, it is not transfereable without more or less retooling. This offers several advantages over normal non tailored programs. A tailored program lowers its resource needs by 50% and operates at 2 rating points higher then a non tailored program of the same rating. However, its development time is trippled over the non tailored version. Hardened Hardening is an option that makes a program more resillient vs exploitation. Its a time and resource consuming process to harden a program, especialy at higher ratings. Each rating in hardening adds to the target number of the exploit test against a program. Hardening takes its rating times the normal programs rating times 10 in extra percent to the development time of a program. Hardening is limited to rating 4. Streamlined A streamlined program consumes less resources then a standard program. Each stage in streamlining reduces a programs size and cpu resource consumptio n by 10%, which a maximal rating of 6. Streamling takes a considerable amount of time, each rating adds rating times rating times 5 to the development time. Saveguard A saveguard is a OS level option that prevents programs from getting killed. Which programs are effected by this is operator configurable. If such protected program gets killed it will be restarted immediatly and the operator will be notified. Each rating point allows for 10 programs to be saveguarded. Access Rights and Rights Control Each computer system build and sold commercialy has a build in access rights and control system which is used to address and identify the computer and its user on the matrix. To gain uncontrolled access to the matrix is system must first be disabled and replaced by a manipulated system to transmit a faked

identity. Access rights are granted on three different scales, global, this is the access right level every one has in the puplic matrix systems, it allows access to all puplic resources unrestricted. Network access rights are granted based upon user identification via the SIN to a specific network of systems. For example a corporate subsection, or a town specific network. this is also widely used for matrix access providers to control access to its extra services for its paying customers. Local access rights are local to a given computer hosts. Operstor rights are usualy of the local class and different for each computer host. Clusters however are generaly run under a single operstor right. Access rights can be granted over differen authentication methods. Global rights are usualy self authenticated via a hosts build in access identifier. Network access rights are usualy protected by the SIN of the user plus the right access identifier of the system in use. Local access rights are the most protected ones, they can use any possible combination of authentication mechanisms, from passwords, biometrics to combinations of them. To bypass the access control its rating must be beat in a matrix intrusion test. Resource control, aka Accounting Skills: Matrix - Operation - Tracking - Intrusion - Deception - Programming Management (Specific) Program use Store data Retrive data detection hiding Design ICE IDS Matrix Automaton Decompiling

Operations Starting/Restarting Staring and restaring eneables or reset a computer form a powered down state into a opertional state. Most computers don't need a skill test for starting it while most complex systems, server cluster for example may require a operation test to assume normal operation as intended. Use (store, edit, retrive data) The use operation is what most users will need in their live, to play videos, edit massages or do their work in the corporation. Teleports (bookmarks) The teleport operation allows a user to store and retrive matrix locations ina quick and easy fashion. Teleporting transports the matrix programs focus to another location instantly as long as it can connect to the server running

the new location. no test is needed for teleporting. Search Collect and Compile Program Program is the action where one does write a program, usualy aided by more or less sophisticated development environements to shield from the complexity of the task at hand. Connection To use a remotes computer resources, legit, or illigit an connection must be established. This is normaly performed automaticky by the programs used, however, a seasoned operator can use a terminal to manualy perform a conenction for plain text conenction methods. Scanning Scanning is used to probe a system for running programs which could be exploited to gain access to it, or just for information purposes. Mapping Mapping is used to generate a map of a network for orientation purposes. Exploit Exploiting is used when trying to gain access to a hosts by exploiting weaknesses in its configuration or running programs to bypass the security measures. Is goal is normaly to gain operator rights on a specific system, however it can be used to gain access as any user that has access to a specific system. Tap Tapping is used to tap into a connection or programs execution to snoop on the traffic or programs operation for information gathering. It can also be used in reverse engineering on how a program works or communicates with another program. Hijack Hijacking is used to intercept connections from one host to another, altering its destination away from the original detination hosts, preferably to a hosts that is controled by the hijacker. Compromise The compromise operation is used to craft a program option onto an existing program, and to replace an existing program with an altered version. Block the block operation allows a operator or decker on a router or firewall system to block and unblock traffic to and from a specific host or program to another hosts or program. Killing Killing is the opertion to remove a running program instantly from a systems active memory, aborting its operation. To kill a program no usages test most be performed, however a OS can have saveguards running that prevent the killing of a process, in such case a useage test must be performed against the saveguards rating. Crash Crashing is the operation when a user wants to bring down a computer system as fast as possible by either consuming all its resources or direct manipulation of the kernel which would render a system unuasable

till a restart. En/Decrypt En and decrypting is used for encrytpting and decrypting files or network connections. Audit Auditing is used to asses a systems or networks security and overall performance. Stats A computer systems capacity is defined with several stats. CPU The number of processing units of a given programs a computer can run simultanously Running programs consume their complexity e CPU rating is the more and higher complex run simultanously. computer system and how many different without performance degration. rating as CPU resources. The higher th programs a certain computer system can

Responstime The responstime determines how fast a given system acts to user and program inputs. It is used as reaction modifier for the user that works with the system. Memory Memory lists how much running space for programs is available. A computer can run up to its memory resources and progams, each extra ammount of memory resources needed by runing programs reduce the response time by 2. Once a system has more memory consumed so it offsets the users reaction attribut e below zero, it becomes unsuable for the user. for her it appears to be loocked u p and stoped working. Storage Storage determines how much data can be stored on a given computer system. Once storage resources are exhausted, no additional data can be stored on the system. Every hour the system remains in this state it risks of crashing. To test against a storage system exhaustion crash roll the rating of the system vs 2 plus 1 per hour it remains in the state of storage shortage. Each failed test results in a random program crash on the system, if the OS itself fails the system needs to be restarted. however, since most programs require active an d storage memory while running, the situation can clear itself for a short period of time if such a program crashes. Network Network lists the network connectivity of a computer system and the bandwidth they can provide. Connectors Connectors list the connection ports a computer system has available to hook up non networked perephirals directly which is a rarety in modern day computer systems. Graphic Graphics lists the capabilites of the computers graphic display subsystems.

1D A 1D graphics system is only capable of text and very simple graphic displays. 2D A 2D display provides the system with a clear and cripst display, but without any real 3d capabilities. 3D A 3D graphics system allows the computer to display the full range of modern day graphics and media files, from simple flat movies to trideo movies and VR envrionments. Sim A sim graphics board is needed for generating the VR envrionment for cyberneti c interface equiped computer systems. Holographic A holographic graphics system allows for free standing holographic 3d displays , a very costly and sophisticated system. Constiered state of the art in trideo and interface systems for non cybernetic systems. Interfaces The interfaces list what kind of user interfaces the system has and can provide and their bandwidth requirments. Generic Informations Price How much the system legaly costs. SI A systems street index for blackmarket buyers. Avail The availability of a certain system. Legality How legal a certain system is. Weight and Size Just what the label says. Getting Matrix access Matrix access is not universal, but very widespread, however to be able to acces s the matrix with a computer system, access to it must be gained. There are severa l methods available for this. The most communly used method is the matrix access provider, like any corporatio n they come in different sizes, from consumer oriented ones to providers that deal only with other corporations. Most providers also provide trideo access on the same connection. Pirate access To pirate access to the matrix, an existing matrix access can be rerouted or

shared. This however is never lasting long since the access providers are workin g hard against people using their resources for free. Matrix Services Standard matrix access costs 25 per month for unlimited access to the matrix with a 100MP/s connection, 100 trideo channels and comm service. Box access costs 30 per month and includes the needed 100MP/s connection and box hardware, also included are 50 trideo channels and comm service. Premium matrix access costs 75 per month and offers 1000MP/s in bandwidth and three times the number of trideo channels in addition to 10 comm services. Premium consumer comm service adds a monthly cost of 10 nuyen, and offers the premium comm services usual 10 simultanous comm conncetions. The three access types aimed at home users are complimented by accesses aimed at small and large business and corporations. Unlike consumer acesss, business access does not include trideo and comm services. Medium acess ranges from 1000 to 10000MP/s and cost 0.1 nuyen per MP/s per month . Large scale access ranges from 10000MP/s to several million and higher in MP/s, they costs 1 nuyen per MP/s in bandwith per month. Comm services costs 1 per month per comm unit connected for unlimited use for a business or corporation. Each comm services includes a standard videofon services and up to 10 numbers, of which up to 2 can be used simultanously. Premium comm services costs trippel and allows for up to 10 simultanous connections. Both matrix and dedicated comm services are available in a wireless setup for use on the road or with portbale computers. For just additional 50% in cost the same level of matrix access can be gained on the road. For pirate access to such connections one has to du it themselfs or pay a decker or a decker organization specilized in providing pirate access, thi s however costs 2 times as much as a normal acess would costs, in some cases even more and includes for free the risk of getting cut off from the matrix by matrix access provider at any given moment. An even which makes it highly unlikely that the same provider will be connecting one again, on top of the usua l large damage compensations and fees for unathorized matrix use and usages of corporate property. How to make tests. To run tests a user adds her relevant skill plus the effective rating of the use d program together and subtracts the targets systems program rating. While a syste m uses the OS rating plus the programs rating minus the deckers program rating as dice for the test. Using a 1D abstraction level interface reduce the target number for the test by 2.

Using a cybernetic interface reduces the target number also by 2.

You might also like