Quelle, en: Matrix/Inhaltsverzeichnis

Aus Shadowhelix
Zur Navigation springen Zur Suche springen


  • INTRODUCTION
  • THE MATRIX WORLD
    • Communication
      • Life at the Speed of Light
      • Please Leave a Message at the Beep
      • The Wired Life
    • Business and the Matrix
      • The Bottom Line
      • Investing in the Sixth World
    • Electronic Funds
      • Have Cred, Will Travel
    • Beyond the Information Age
      • Relevance of an Information-Saturated Society
      • Searching for Data
      • Personal Data and Privacy
    • Matrix Culture
      • Culture Shock in 3-D
    • Sprawl Management
      • The Necessities of Life
    • Matrix Law
      • The Law of the Land
  • THE COMPUTER INTERFACE
    • Jacking In
    • The ASIST Interface
      • Cold ASIST
      • Hot ASIST
      • RAS Override
      • Reality Filter
      • Response Increase
    • Meet Your Persona
      • The MPCP
      • Signature
      • Persona Programs
      • The Icon
    • Protective Systems
      • Hardening
      • ICCM Biofeedback Filter
    • Transmission Speeds
      • Multiplexing
  • THE MATRIX USER
    • Attributes
      • Reaction and Initiative
      • Skills
      • Active Skills
      • System Familiarity Knowledge Skills
      • Program Design Knowledge Skills
      • Cyberterminal Design Knowledge Skill
      • Info Sortilage Knowledge Skill
      • Other Knowledge Skills
    • Dice Pools
      • Hacking Pool
    • Edges and Flaws
      • Matrix Addiction Flaw
    • Matrix Users in Game Play
      • Using the Matrix
      • Using Deckers
      • Using Non-Decker Matrix Users
      • Riggers and the Matrix
      • Awakened Matrix Users
      • Non-Metahuman Matrix Users
    • Optional Rule: SOTA
      • SOTA Factor
      • Lifestyle and SOTA
      • Maintenance Costs
  • ACCESSING THE MATRIX
    • The Jackpoint
      • Jackpoint Values
      • Hardwired Jackpoints
    • Wireless Links
      • Wireless Link Values
      • Signal Strength
      • Wireless Link Types
      • Daisy-Chained Wireless Links
    • Matrix Services
      • Services and Costs
      • Boosting Matrix Services
    • MSP Accounts
      • Registering an MSP Account
      • Passcodes
      • Account Privileges
      • Billing
      • The Datatrail
    • Decking and Unauthorized Access
      • Access through Deception
      • Spoofing Jackpoints
      • Using a Throwaway MSP Account
      • Passcode Security
    • Visibility and Perception
      • Behind the Scenes
      • System Iconography
      • Matrix Movement
    • Tortoise Mode
      • Tortoise Operations
  • GRIDS AND HOSTS
    • Connections
      • Wirecom
      • Wavecom
      • Beamcom
      • Satcom
    • Regional Telecommunications Grids (RTG)
      • Iconography
      • RTG Politics
      • Satellite Constellation RTGs
    • Local Telecommunications Grids (LTG)
      • Iconography
    • Private Local Telecommunication Grids (PLTG)
      • Iconography
      • How Hosts Work
    • Ultraviolet Hosts
      • Connecting to a UV Host
      • More Real Than Real
      • Back to Reality
    • Paydata
      • Nature of the Data
      • Random Paydata Generation
      • Paydata Defenses
      • Fencing Paydata
    • Archaic Systems
      • Limitations
  • CYBERTERMINAL CONSTRUCTION
    • Components
    • Tools and Parts
    • Construction Tests
      • Skills
      • Time
      • Health and Tasks
      • Design Tests
      • Software Tests
      • Cook Tests
      • Installation Tests
    • Requirements
    • Constructing Components
      • Active Memory
      • ASIST Interface
      • Hardening
      • ICCM Biofeedback Filter
      • Icon Chip
      • I/O Speed
      • Maser Interface
      • Matrix Interface
      • MPCP
      • Persona Chips
      • Ports (FUPs)
      • RAS Override
      • Reality Filters
      • Response Increase
      • Signal Amplifier
      • Storage Memory
      • Wireless Interfaces
      • Miscellaneous Components
      • Partial Construction
      • Hardwiring
      • Salvaging
      • Mismatched Components
    • Cranial Cyberterminals (C2)
      • C2 Parts
    • Cyberlimb Cyberterminals
    • Custom Designed Cyberterminals
      • Choosing the Options
      • Calculating the Cost
      • Shop Installation
  • UTILITIES
    • New Utilities
      • Operational Utilities
        • Camo
        • Crash
        • Defuse
        • Doorstop
        • Encrypt
        • Evaluate
        • Mirrors
        • Purge
        • Redecorate
        • Sniffer
        • Snooper
        • Swerve
        • Triangulation
        • Validate
      • Special Utilities
        • BattleTac Matrixlink
        • Cellular Link
        • Compressor
        • Guardian
        • Laser Link
        • Maser Link
        • Microwave Link
        • Radio Link
        • Remote Control
        • Satellite Link
      • Offensive Utilities 73
        • Erosion
        • Hog
        • Steamroller
      • Defensive Utilities
        • Restore
        • Shield
    • Advanced Uses for SR3 Utilities
      • Operational Utilities
      • Special Utilities
      • Offensive Utilities
      • Defensive Utilities
  • PROGRAMMING
    • The Programming Test
      • Program Ratings
      • Program Size
      • Base Programming Time
      • The Program Plan
      • Programming Tools
      • The Computer Test
      • The Task Period
      • Programming Teams
      • The Finished Code
      • Upgrading
      • Optional Rule: Bugs
    • Program Options
      • Options and Size
      • Options and Ratings
      • Options and Cost
      • Utility Options
      • IC Options
      • Programming Suite Options
    • Command Sets
      • Making a Command Set
      • Activating a Command Set
      • Command Set Operations
      • Shutting Down Command Sets
    • Frames and Agents
      • Frame Core
      • Designing Frames and Agents
      • Loading Utilities
      • Running a Frame or Agent
      • Dumb Frame Rules
      • Smart Frame and Agent Rules
    • IC Constructs
      • Construct Cores
      • Operating Constructs
    • Worms
      • The Bait
      • Infection
      • Prevention
      • Infected Cyberterminals
      • Types of Worms
    • Buying Programs
      • Verifying Software Contents
    • Applications
      • Multipliers
      • Ratings
  • SYSTEM OPERATIONS
    • New Operations Descriptions
      • Abort Host Shutdown
      • Alter Icon
      • Analyze Operation
      • Block System Operation
      • Crash Application
      • Crash Host
      • Decoy
      • Disarm Data Bomb
      • Disinfect
      • Dump Log
      • Encrypt Access
      • Encrypt File
      • Encrypt Slave
      • Freeze Vanishing SAN
      • Infect
      • Intercept Data
      • Invalidate Account
      • Locate Frame
      • Locate Paydata
      • Locate Tortoise Users
      • Redirect Datatrail
      • Relocate Trace
      • Restrict Icon
      • Scan Icon
      • Send Data
      • Trace MXP Address
      • Triangulate
      • Validate Account
    • Advanced SR3 Operations Descriptions
    • Making Operations for Other Users
  • INTRUSION COUNTERMEASURES
    • New Intrusion Countermeasures
      • Data Bomb White IC
      • Pavlov White IC
      • Scout White IC
      • Trace IC
      • Cerebropathic Black IC
      • Psychotropic Black IC
    • Advanced Uses for SR3 IC
    • Programming IC
    • Crashing IC
  • MATRIX SECURITY
    • Advanced Security
      • Security Tallies and Multiple Icons
      • Host Shutdown
      • Optional Rule: Varying Subsystem Ratings
    • Generating Security Sheaves
      • Creating Constructs
      • Additional Security Features
      • Security Deckers
      • Caveats
      • Sheaves on the Fly
    • Grid Security
      • Alerts
      • Security Deckers
      • Grid Shutdown
      • Security Tally Carry-over
  • INFORMATION SEARCHES
    • Using Etiquette (Matrix)
      • Matrix Social Situations
      • Matrix Contacts
    • Using Computer Skill
      • Search Areas
      • Types of Info Searches
      • The Search Test
      • Sample Databases
  • THE OTAKU
    • The Reality
    • Becoming Otaku
      • Tribal Initiation
      • The Deep Resonance 134
      • The Paths
      • Submersion
      • AI-Created Otaku
    • Creating an Otaku Character
      • Using the Priority System
      • Using the Point System
      • Allocating Attributes
      • Allocating Skills
      • Allocating Resources and Lifestyle
      • Allocating Complex Forms
      • Designing the Living Persona
      • Dice Pools
      • Choose a Path
    • Otaku Rules
      • Detection Factor
      • System Attunement
      • Using the Living Persona
      • Living Persona and Cybercombat Damage
      • Improving the Living Persona
      • Otaku and the SOTA
      • Otaku and Jackpoints
    • Using Channels
      • Channel Immunity
    • Complex Forms
      • Options
      • Creating Complex Forms
      • Using Complex Forms
    • Sprites
      • Creating Sprites
      • Using Sprites
    • Otaku Tribes
      • Resonance Wells
      • Tribal Resources
      • Joining a Tribe
      • Founding a Tribe
      • Tribe Generation
    • Submersion
      • Grades
      • Cost of Submersion
    • Echoes
      • Improved I/O Speed
      • Improved Hardening
      • Improved MPCP
      • Improved Persona
      • Improved Reaction
      • Daemon Summoning
      • Ghosting
      • Info Sortilage
      • Neurofilter
      • Overclock
      • Resonance Link
      • Switch
      • Traceroute
    • The Fading
  • AUTONOMOUS PROGRAMMS
    • Semi-Autonomous Knowbots
    • True Artificial Intelligence
  • MATRIX PLAYERS
    • The Providers
    • Playing with Toys
    • Code Kings
    • Information is Power
    • Other Powers that be
    • Observers and other Nosy Bastards
    • Credit where Credit is Due
    • The Virtual Underground
    • I Hack, Therefore I Am
  • MATRIX TABLES
    • Sample RTGs from Around the World
    • System Operations
    • Utilities
    • Programm Size Table
    • Programming Tables
    • Intrusion Countermeasures
    • Worm
    • Cyberdeck
    • Component
    • Jackpoint and Wireless Link
    • Search Test
    • Matrix Data Sheet
    • Otaku Record Sheet
    • Frames & Agents Record Sheet
    • Sprites & Deamons Record Sheet
    • IC Construct Record Sheet