Background settingHow to make a characterGame mechanicsMagic and the occult in Dark ageToys and techUpgrade yourselfComputers & hackingIndex


This is a brief list of software packages any of the above systems can run. Note that some packages may be OS specific, so watch out for incompatibility. Unlike toolkit options, these packages only take up resource points when loaded. However, they do take up storage memory.

Application Storage (MU) = 2 MU x Resouce Points x Rating


CAD Rating 2 costs $5000. It uses up 2 x 3 RP x Rating 2, which is 2 x 3 x 2 => 12 MU of storage memory. Like all appications, it only uses up 6 RP when loaded (6 RP = Rating 2 x 3 RP).

Open Source or Commercial?

All of the applications listed below are available as open source or commercial versions. Commercial ones cannot be altered by anyone as their code base is locked, however, they can be bought off the shelf and installed fairly easily. Open source versions are available for free and as the code is available, you may attempt to alter it. However, they require more skill to install, so a -2 penalty applies when loading and unloading them.

Common Applications

Backup: (One RP per rating), $1000

As well as making a nightly backup of all work, this program also adds +1 per rating to restoring data. An offliine storage device with removable media is required. Each rating compresses saved data by half, third, quater and a fifth (ratings one to five). Backup R4 will store a 100 MU of data in a compressed form as 25 MU.

CADAM (type): (Three RP, R1 = 6 MU, R2 = 12 MU, R3 = 18MU) $2000, $5000 and $8000

Computer aided design and manufacture. These packages help you to design objects, parts or hardware and then produce them on an autolathe or robot assembly system. Each rating of the CAD software gives a +1 bonus to drawing or designing a product (ref's discression on which skill and the maxium rating is R3).

DTP (type): (Two RP and 4 MU) $200

There are umpteen variants of DTP. Common types are: word processors;  presentation packages; drawing; image manipulators; video publishing; simstim. Note some DTP packages require extra hardware depending on what you plan to manipulate

Games: (Three RP and 6 MU) $50 - 100

Pass (or is it piss?) away your time with the latest computer entertainment thrill. Don't forget your VR goggles!

Messaging (Two RP and 4MU + files) $100

This is a unified store for is a email, video or audio telephone calls, interactive conferencing and a scheduling system. You can email friends, make appointments with others or net conference with them.

Organiser: (One RP and 2MU) $50

Keep all your contacts and diary details all in one. Can tie in with any groupware product. Also, will dial phone numbers if host system is cellular.

Query Tools (1 RP per rating) $200 per rating

An advanced search engine grants +1 per rating to all database operations. Add this bonus to library search or research rolls.

Remote Access: (One RP and 2MU) $200

This runs on your own system and the remote system you want to use. You can use the remote system as if you were sat at the desk. Great for teleworking or using a personal data assistant. Advanced versions allow you to share your workspace with other people - like a group whiteboard.

Personality (Four RP per rating) $500 per rating

The computer system has a personality and can interact with the user as if it were a person. The system can understand and use speech on par with an average person. Having a personality does not mean the computer is self aware, although the computer can make decisions (Intelligence is equal to double the rating. The maximum rating is level four). The more the system is used, the better it's responces get (ie: more realistic) although the Personality is not capable of learning more than the most basic of skills, that requires true AI software.

Servants (One RP per servant) $200 per rating

Demons, bots, sprites, whatever - a decker may send these programs to do minor tasks for him. A servant may request help if it encounters a problem, or if the host has a personaility the servant will ask it first. Servants require the host system to be online if they are to work within the Net (of course, they don't have to be loaded your host, but that's another story!).
A sprite may carry out an action defined by the host system, indeed it may use software/options loaded on the host computer (i.e: "go to the Library of Congress and search out all the information on JFK using my database R3 option", or "go and deliver this video mail to Frost"). Any skill checks will be carried out by the decker, the servant merely makes the journey to the target system. (BTW, sprites are traceable <g>).

Translator (One resource point per OS) $800 per rating

Not all operating systems are 100% compatible. Legacy systems still populate the Net and vendors twist protocol standards to push for new exclusive features. Should the referee be using the different OS option, each option rating allows swift instruction translation between normally incompatible systems.

Voice Cognition: (Two RP and 4MU) $100

This software allows you to control your system vocally if you don't have a Personality loaded on the host. Additionally, the system can talk back to you, reading out emails and error codes.


These are hacks and security exploits that help a decker improve their hacking toolkit. This bits of software are not available commercially and must be developed or downloaded.

Blurring (One resource point per rating)

A blurring system is good at laying false trails and multiple dead ends. Add +1 per rating to "not being found".

Coding (Two resource points per rating)

The system has bug tracking, code templates and diagnosis routines. Add +1 per rating to all programming or diagnostic tasks.

Data Handling (One resource point per rating)

The OS has superb file and storage handling abilities (including sound backup routines). This adds +1 per rating to downloading or restoring data.

Encryption (Two resource points per rating)

The toolkit has excellent coding breaking algorithms, pattern cognition and sample encoding patterns. Add +1 per rating to encoding or decoding a file.

ICE Breaker (Two resource points per rating)

The toolkit has superb ICE breaking routines and adds +1 to intrusion rolls per rating of this option.

Interception (Two resource points per rating)

The toolkit add-on has additional routines to aid signal hijacking and packet bluffing attempts. Add +1 per rating to grabbing control of a remote device or listening in to a datastream (computer, video or audio).

Killer (Two resource points per rating)

The toolkit contains attack phages and hostile commands which can crash software or other systems. This adds +1 per rating when attempts to crash a program or system are made.

Tracking (One resource point per rating)

Good tracking software. Add +1 per rating when trying to follow a target or trace a data packet.


What's the difference between software and a service? Software you load as you need it and it tends to be a single user affair, you load the program, do the work and then quit it. Services are what makes a server, they are software processes that are always running and allow other systems (frequently users) to connect to the system and make use of it. Services are often referred to as demons or agents and once loaded, they remain running all the time.

OpenX Workstation cannot use any service software, you need PowerStation for that, while Xen can use any service. Services run all the time and as such any resource points they require will always be in use. Stopping the service will free up one resource point, only uninstalling the whole thing will free up all the resources (a difficult and lengthy process!).

All services cost $500 resource point multiplied by their rating, unless an open source option is persued.

Barrier:  (Two RP per rating)

This module can ban all specified logins from the system. The software can be set to ignore calls from certain nodes, or only allow incoming data from specified hosts. It can be configured to not allow some users, or only allow some users. Each rating adds +1 to the security level of the system for intrusion tests.

Capture: (Three RP per rating)

This is a kind of grey ICE. Should an intruder be detected, this module can grab and hold the target, preventing them from logging out normally (although powering off will work, but it can leave a dirty trail). The decker must make an opposed decking test to avoid capture. Each option rating adds +1 to the host's chances.

Clustered: (One RP per member)

The system is made up one two or more minor systems. Clustered systems can pool their workload and all are required to crash to bring down the network. These subsystems can share each others data storage and network options/software at no penatly. One rating is required per server, although each server must have the option installed.

Database Server: (One RP per rating)

The server can host numerous databases and each rating allows one database.

Dummy Host: (Two RP per rating)

This module allows the host to create a false front; a system that does not really exist, but contains dummy information. It was originally created for testing software. Alternatively, an intruder can be invisably directed into this safe area, with suspect activities being logged. A decker must make a decking roll over the host's security rating plus one per rating to spot the false host.

Encode: (Three RP per rating)

The modules allows files to be encoded with an encryption rating equal to the hosts security level. Every rating of this module adds +1 difficulty. Additionally, a system may monitor files and only encrypt them should an intruder be detected.

Gremlin: (Two RP per rating)

This "malware" requires a license from Sentinel to allow its use. Gremlin can attack a connected client and cause it to crash out of the Net. The target must pass an opposed decking operation to resist this. Each rating of this module gives +1 to the attacker.

Groupware: (Two RP per rating)

This module gives the system a central database of email, schedule and conferencing abilities. Each rating allows up to one hundred users.

Hidden: (Two RP per rating)

Hidden systems employ this module to cloak their presence on the Net. To spot a hidden host, requires a successful decking roll, against a difficulty of five per rating. The maximum rating is equal to half system power rating.

Probe: (Two RP per rating)

This allows a system to probe a client for information. Depending on what the host finds, or does not find, access may be denied or allowed. Probe can also scan for viruses or unsuitable software, if it does find anything, what happens next is up to the refereee. A decker may attempt to prevent or bluff this probe. The difficult is an opposed decking operation, although the host gains +1 per rating to the test.

Regenerate: (One RP per rating)

This system restores damaged programs from backups or a secure network store (often a read only removeable media). One program or module can be restored per rating.

Secure Channel: (One RP per rating)

This increases security on remotes and dial in clients. Each rating adds +1 difficulty to any intercept attempts.

Sever: (One RP per rating)

The system can automatically kickout an intruder on a successful computer use roll. A decker may attempt to resist, but each rating adds +2 to the difficulty.

Silent Alarm: (Two RP per rating)

System alarms become covert and can alert sysadmin personnel, without the intruder noticing. Silent alarms are harder to locate or suppress, so each rating adds +1 to any related tasks.

Silent Login: (Three RP per rating)

The system has a double login procedure. In addition to the basic login, the system only gives access to more sensitive information when a condition has been met. This can be a phrase, command or program. This condition will not be obvious to the intruder and adds +2 difficulty to intrusion rolls per rating.

Trace: (Two RP per rating)

The system can trace calls from outside access or internally. Tracing rules are covered in detail later in this document. Each rating adds +1 to the host's rolls.

UIAB: Two RP per rating (one rating = 50 user database)

UIAB (said yoo-ee-ab), or user in a box, is a database which contains details about specified users. Should that user log in and behave strangely, UIAB will ask the user fairly personal questions (details about family, hobbies or work). If the user gets these wrong, UIAB can trip alarms or alert the superusers. Each rating holds details for fifty users. UIAB is also sold as "admin2go".

Virtual Reality: (Two+ resource points per rating)

This package allows the system to support a virtual reality. It can host twenty users per rating. The number of resource points required, depends on the VR's quality.

The size of a virtual reality is only important for storage purposes. VRs use up the following MU, depeding on their size:

VR are more realistic when access to suitable databases is available (use 100MU per time period, genre or setting). The software is more then capable of improvising objects, or actors, that is deams suitable.

Watchdog: (One RP per watch)

Watchdog will monitor logins, programs or the system in general for any out of the ordingary activity. It can trip alarms or cause another function to activate. A common function is to question the perpetrator with UIAB or trip an alarm.