Quelle, en: Matrix
Informationen | ||||
| ||||
Nummer: 7909 | ||||
Edition: 3 | ||||
Sprache: englisch | ||||
Seitenanzahl: 176 | ||||
Credits:
|
Reality is for those who lack imagination
Connect to the world-wide net known as the Matrix and create a universe of your own. No matter what your status in the real world--megacorp president or synthmeat street vendor--you can be the lord of all you can imagine. Access virtual clubs and test your skills in total-reality games. Ransack massive databases and pillage corporate systems for paydata--and try to stay alive long enough to enjoy the results.
Matrix expands on the basic decking rules provided in Shadowrun, Third Edition, and offers advanced rules for programming, deck construction, system security and accessing the Matrix. Matrix includes rules for information searches and new updates on artificial intelligences and otaku characters.
Inhaltsverzeichnis
- INTRODUCION
- THE MATRIX WORLD
- Communication
- Life at the Speed of Light
- Please Leave a Message at the Beep
- The Wired Life
- Business and the Matrix
- The Bottom Line
- Investing in the Sixth World
- Electronic Funds
- Have Cred, Will Travel
- Beyond the Information Age
- Relevance of an Information-Saturated Society
- Searching for Data
- Personal Data and Privacy
- Matrix Culture
- Culture Shock in 3-D
- Sprawl Management
- The Necessities of Life
- Matrix Law
- The Law of the Land
- Communication
- THE COMPUTER INTERFACE
- THE MATRIX USER
- Attributes
- Reaction and Initiative
- Skills
- Active Skills
- System Familiarity Knowledge Skills
- Program Design Knowledge Skills
- Cyberterminal Design Knowledge Skill
- Info Sortilage Knowledge Skill
- Other Knowledge Skills
- Dice Pools
- Hacking Pool
- Edges and Flaws
- Matrix Addiction Flaw
- Matrix Users in Game Play
- Optional Rule: SOTA
- SOTA Factor
- Lifestyle and SOTA
- Maintenance Costs
- Attributes
- ACCESSING THE MATRIX
- The Jackpoint
- Jackpoint Values
- Hardwired Jackpoints
- Wireless Links
- Wireless Link Values
- Signal Strength
- Wireless Link Types
- Daisy-Chained Wireless Links
- Matrix Services
- Services and Costs
- Boosting Matrix Services
- MSP Accounts
- Registering an MSP Account
- Passcodes
- Account Privileges
- Billing
- The Datatrail
- Decking and Unauthorized Access
- Access through Deception
- Spoofing Jackpoints
- Using a Throwaway MSP Account
- Passcode Security
- Visibility and Perception
- Behind the Scenes
- System Iconography
- Matrix Movement
- Tortoise Mode
- Tortoise Operations
- The Jackpoint
- GRIDS AND HOSTS
- Connections
- Wirecom
- Wavecom
- Beamcom
- Satcom
- Regional Telecommunications Grids (RTG)
- Iconography
- RTG Politics
- Satellite Constellation RTGs
- Local Telecommunications Grids (LTG)
- Iconography
- Private Local Telecommunication Grids (PLTG)
- Iconography
- How Hosts Work
- Ultraviolet Hosts
- Connecting to a UV Host
- More Real Than Real
- Back to Reality
- Paydata
- Nature of the Data
- Random Paydata Generation
- Paydata Defenses
- Fencing Paydata
- Archaic Systems
- Limitations
- Connections
- CYBERTERMINAL CONSTRUCTION
- Components
- Tools and Parts
- Construction Tests
- Skills
- Time
- Health and Tasks
- Design Tests
- Software Tests
- Cook Tests
- Installation Tests
- Requirements
- Constructing Components
- Active Memory
- ASIST Interface
- Hardening
- ICCM Biofeedback Filter
- Icon Chip
- I/O Speed
- Maser Interface
- Matrix Interface
- MPCP
- Persona Chips
- Ports (FUPs)
- RAS Override
- Reality Filters
- Response Increase
- Signal Amplifier
- Storage Memory
- Wireless Interfaces
- Miscellaneous Components
- Partial Construction
- Hardwiring
- Salvaging
- Mismatched Components
- Cranial Cyberterminals (C2)
- C2 Parts
- Cyberlimb Cyberterminals
- Custom Designed Cyberterminals
- Choosing the Options
- Calculating the Cost
- Shop Installation
- UTILITIES
- New Utilities
- Operational Utilities
- Camo
- Crash
- Defuse
- Doorstop
- Encrypt
- Evaluate
- Mirrors
- Purge
- Redecorate
- Sniffer
- Snooper
- Swerve
- Triangulation
- Validate
- Special Utilities
- BattleTac Matrixlink
- Cellular Link
- Compressor
- Guardian
- Laser Link
- Maser Link
- Microwave Link
- Radio Link
- Remote Control
- Satellite Link
- Offensive Utilities 73
- Erosion
- Hog
- Steamroller
- Defensive Utilities
- Restore
- Shield
- Operational Utilities
- Advanced Uses for SR3 Utilities
- Operational Utilities
- Special Utilities
- Offensive Utilities
- Defensive Utilities
- New Utilities
- PROGRAMMING
- The Programming Test
- Program Ratings
- Program Size
- Base Programming Time
- The Program Plan
- Programming Tools
- The Computer Test
- The Task Period
- Programming Teams
- The Finished Code
- Upgrading
- Optional Rule: Bugs
- Program Options
- Options and Size
- Options and Ratings
- Options and Cost
- Utility Options
- IC Options
- Programming Suite Options
- Command Sets
- Making a Command Set
- Activating a Command Set
- Command Set Operations
- Shutting Down Command Sets
- Frames and Agents
- Frame Core
- Designing Frames and Agents
- Loading Utilities
- Running a Frame or Agent
- Dumb Frame Rules
- Smart Frame and Agent Rules
- IC Constructs
- Construct Cores
- Operating Constructs
- Worms
- The Bait
- Infection
- Prevention
- Infected Cyberterminals
- Types of Worms
- Buying Programs
- Verifying Software Contents
- Applications
- Multipliers
- Ratings
- The Programming Test
- SYSTEM OPERATIONS
- New Operations Descriptions
- Abort Host Shutdown
- Alter Icon
- Analyze Operation
- Block System Operation
- Crash Application
- Crash Host
- Decoy
- Disarm Data Bomb
- Disinfect
- Dump Log
- Encrypt Access
- Encrypt File
- Encrypt Slave
- Freeze Vanishing SAN
- Infect
- Intercept Data
- Invalidate Account
- Locate Frame
- Locate Paydata
- Locate Tortoise Users
- Redirect Datatrail
- Relocate Trace
- Restrict Icon
- Scan Icon
- Send Data
- Trace MXP Address
- Triangulate
- Validate Account
- Advanced SR3 Operations Descriptions
- Making Operations for Other Users
- New Operations Descriptions