Instant Netrunning A Fuzion Plug-In by Christian ... - Gabriel Chandesris

and $500 for the surgery. .... sors to VR Simulations and computer-controlled robotic systems such as .... View the contents of any file you download, but be wary.
281KB taille 10 téléchargements 294 vues
Instant Netrunning  A Fuzion Plug-In  by Christian Conkle ([email protected],

http://www.europa.com/~conkle)

Introduction

All computers connected to the Net are assigned LDL. This LDL serves as a kind of telephone number for

This is a system of rules expanding the hacking rules

that computer, to which other computers know where

for Fuzion and Interlock.

to send information.

These rules draw heavily on

In a futuristic setting, a Virtual

Cyberpunk 2020's Netrunning rules and are intended

Construct or Icon may substitute for the LDL. The Net

to be native in a Cyberpunk environment where neural

User connects their computer to a Virtual Reality Inter-

cyber-interfaces are standard, though they are written

face, within which companies pay for space and create

generically enough to be useable in a modern setting as

elaborate virtual constructs to represent their LDL, the

well.

VR equivalent of Internet Portal Sites such as Infoseek or Yahoo! today. The Net User may now tour the

These rules were designed to use existing Cyberpunk

bustling 3D Virtual City regardless of gravity or speed.

2020 equipment and software with little modication.

Corporate virtual constructs are like giant 3D advertise-

There are several dierences from the original rules, how-

ments, attempting to entice the average Net User into

ever, that are intended to speed play and optimize sim-

their Virtual Realities to sell products or services. Some

plicity. First, these rules lack a grid. Movement within

Virtual Realities actually provide useful services such

the virtual environment of cyberspace is conceptual. To

as information or online software applications. The VR

convert applications that give ranges, simply apply a

equivalent to modern Websites. These Virtual Realities

percentage chance of eectiveness based on range. Sec-

are housed on Dataservers maintained by the respec-

ond, these rules incorporate the Power attribute from

tive corporations or institutions.

other Fuzion games, essentially the equivalent to a com-

housed on these Dataservers that isn't readily available

puter's Intelligence from CP2020.

to the public that draws the Hacker.

Third, software and

It is the information Normally, a cor-

memory no longer needs to be assigned to specic CPUs.

porate dataserver is openly accessible to the Net public,

If the GM wishes, each MU of application and datale

providing information either to the public or its employ-

can be assigned to specic CPUs such that if that CPU

ees through a variety of interfaces: text-only, text and

fails, the application or datale is no longer available.

graphics (the Web), audio/video, or fullsensory virtual

This process was removed to eliminate extra bookkeep-

reality (the Net).

ing. These rules assume a 3d6 die-rolling mechanic option of Fuzion. If you're playing Interlock, or the Fuzion

However, the value of information available on public

option of 1d10, simply replace the 3d6 with a 1d10 die

dataserver sites is poor and bland. In addition, access to

roll. You won't achieve the same kind of bell curve, but

remote software applications is limited to public-domain

the results will be suciently randomized.

applications.

Datafortresses

are

the

restricted

hidden

levels

of

a

dataserver providing remote access to restricted data or

The Net

software applciations to authorized users.

Security is

The Net is a global computer network allowing fast

maintained through the datafortress' DataWall program.

and convenient access to millions of computers from

The level of security restriction depends on the value of

any other computer on earth or beyond. Any computer

the information or application. Secure information may

connected to this network has the capability to access

be housed on the same dataserver as public information,

information from any other computer connected to this

only hidden in restricted directories, eectively invisible

network regardless of distance or time of day. Whether it

from those who lack proper authorization. Authorization

is called the Internet, the Web, the Cybernet, the Face,

comes with proper identication. 

or the Net, all use dierent special eects and technolo-

come in many forms: Authorized Net LDLs, passwords,

gies to describe the same thing. This plug-in assumes a

proper interface software, or even biometric data.

near-future setting which makes use of a Virtual Reality

It is a hacker's goal in life to gain unrestricted access

interface and gives exciting names to actions and tasks

to restricted information, uncover secrets, make unau-

which can be easily modied to t a more mundane

thorized changes to data, or to use a restricted software

modern setting.

application.

Instant Netrunning  Netrunning Softwares

Identication

can

1/25

When attempting to gain unauthorized access to a corporate datafortress, the hacker establishes a legal connection to the company's dataserver.

Once connected,

The SysAdmin

the hacker has normal access to the free services. Normally, an authorized user will then use an interface pro-

The

gram to gain access to the datafortress. The datafortress'

Dataserver/Datafortress. It is their primary job to pre-

Code Gate program veries authorization and allows ac-

vent Hackers from illegally gaining unauthorized access

cess.

to restricted data.

The hacker attempts to fool the code gate into

authorizing entry. Should that fail, the hacker may at-

SysAdmin

is

in

charge

of

security

for

a

It is their secondary job to catch

hackers who have already have.

tempt to gain entry by disabling the DataWall program protecting the information.

SysAdmins use their own computers connected to a Dataserver/Datafortress to execute software applica-

Once past security, the Datafortress constantly re-checks

tions. The Dataserver/Datafortress itself uses software

authorization through the use of Detection software. De-

such as Codegates, Datawalls, and Detection software

tection software double-checks the authorization of all

deter and identify hackers, yet allow authorized users in.

the users connected to the datafortress.

If it nds a

discrepancy or error, it noties the Datafortress System

A Datafortress is also characterized by its Power and its

Administrator (SysAdmin) who will either attempt to

Speed. A Datafortress is also rated by a Security Level

disconnect the hacker, determine the hacker's location

from 1 to 10. This number is added as a skill would to

with a Trace application, disable the hacker's software

the computer's Power when executing software applica-

with an Anti-ICE application, disable the hacker's com-

tions.

puter with Anti-System software, or physically injure the

Value if being used to chain connections. A SysAdmin

hacker with Anti-Personnel software.

The hacker uses

can't do anything to catch a Hacker if he doesn't know

Stealth software to fool detection software into either

they're there, so the SysAdmin relies heavily on De-

authorizing or ignoring the hacker's connection. If dis-

tection software to notify them of unauthorized access.

covered, the hacker may ght back against the SysAdmin

Once detected, the SysAdmin can run Anti- Personnel

with Anti-ICE, Anti-System, or Anti-Personnel software

software against the intruder, or opt to trace the hacker

of their own.

and run Anti-System software against the Hacker's com-

The computer's Security Level is also it's Trace

puter. Should the hacker gain access to the Datafortress' directories, they may view, copy, or alter data.

Data

The Computers

comes in the form of online applications for remote use, inter-oce communication, public display data (text, audio-video, or VR), databases, or records.

Computers, whether they are Palmtops, Desktops, Minis, or mainframe supercomputers, exist to execute software applications. The computer is characterized by its Power and its Speed and its Security Level.

The Hacker

The Power is used like the computer's Body and it's Reexes, it determines it's resiliency to attack and its

The Hacker's arsenal includes a computer, specialized

base chance to perform an action. Power is based on the

hacking software, and, foremost, a way to connect to

number of Central Processing Units driving a computer.

a remote target computer, usually via the Net though

One CPU has a Power of 3, each additional CPU adds

direct connections, however unwise, can be made.

an additional 3. Each CPU costs $10,000. A Computer may have up to 7 CPUs for a Power of 21. Additional

A Hacker's access to the Net is very important. To con-

CPUs increase processing capacity and provide backups

nect to the Net, the Hacker must have an LDL. LDL's

in case one CPU should fail due to Anti-System soft-

cost 50 euro a month from the Internet Corporation,

ware.

though they, too, can be hacked. Connections between computers are relatively easy to trace. Each computer

A Computer's CPU also determines how much software

connection has a corresponding Trace Value from 1 to

it can run and data it can store.

10.

are stored in Memory Units. A Computer can store as

Hackers generally make a chain of several connec-

Software and Data

A

many MU's as it's CPU x 40. Memory can be improved

SysAdmin wishing to trace the ultimate origin of the

for $250 per MU. CPUs also determines the starting

Hacker must trace every connection to nd the source.

level of system Datawall. A Datafortress' base Datawall

tions before they proceed to their target computer.

strength is equal to the number of CPUs driving it. 2/25

Instant Netrunning  Netrunning Softwares

Computers with Powers higher than 10 are Articial

Cyberdecks vs. Computers

Intelligences with complete personalities and full interactivity.

Power can be decreased for a cost reduction

In games where cybernetic interfaces are common and

of $3000 per level. A Computer may also possess skills

older manual interfaces are uncommon, simply apply a 

like a character.

Memory can be put aside to use as

2 to all actions taken by manual-interface computers. In

skills at a rate of 1 MU per Skill Level. In this way, a

games where cybernetic interfaces are uncommon, such

computer can devote 5 MU to have a Security Skill of 5.

as the modern world, apply a +2 to all actions taken by

All computer skills use Power as the primary statistic.

cybernetic interface computers.

The Speed is used to determine initiative. If using the

Successful attacks made against Cyberdecks using Anti-

Speed Chart, it can be used to determine the number

System software will cause the brain to disconnect and

and order of actions in a turn. Speed can be increased

become unconscious for 1d6 rounds in lieu of the CPU.

for $2000 per bonus up to +5. The Security Level is the SysAdmin's Security skill, added to its Power when resisting attacks. The Security Level is also used to determine a server's Trace Value

The Menu

when using it to chain connections in preparation for a To simplify using a computer in a game context, a simple

run.

set of commands has been devised. These commands are A Computer can respond to hacker's automatically.

called The Menu. A Hacker simply chooses his action

Once Detection software has identied an unauthorized

based on the list available in the Menu.

intruder, the Computer can automatically execute Anti-

The Menu

Personnel software against the Hacker, or trace the signal and run Anti-System software against the Hacker's computer.



Log On/O :

Legally gain access to an unre-

stricted Dataserver through proper authorization

A Computer can also be dened as a Cyberdeck.

berdecks or Cybermodems are small devices that are similar to computers in that they execute programs, but are dierent in that they are connected to the user's living brain and use it's neurological wiring to act as its Central Processing Unit.

techniques (password, LDL authentication, or bio-

Cy-

The Cyberdeck, modern

terms, is little more than a hard drive and network con-

metrics).



Copy File:

Copy a le from a remote location to

in a le history.

Edit File:

Edit the contents of a datale above.

Warning, a record is kept of each modication in a le history, including the modication of the le

Neural Interface and Cybermodem processor installed in Cyberdecks provide 10 MU,

View the contents of a datale, be it

a local one. Warning, a record is kept of each copy

Cyberdecks do not have CPUs, but the user must have a

and $500 for the surgery.

Read File:

Text, Graphics, Audio/Video, or Virtual Reality.





their brain, the cost of which is $1100 for the hardware

Run either a local or remote soft-

ware application.



nection. All input and output is processed by the user's brain.

Run Program:

history.



Erase File:

Erase a datale above.

Warning, a

a Speed of 0, and have a Data Wall strength of 2. The

record is kept of each erasure in a le history, in-

basic parts of a cyberdeck costs $1000 for the external

cluding the erasure of the le history.

hardware, though this is often marked down to as low

+1 CPU

Establish a connection to a Dataserver.

stealth roll was unsuccessful, the SysAdmin can

Computer Hardware Price List $10,000

LDL:

Warning, if disconnecting from datafortress, if the

as $500 for a used model.

1 CPU 1 Cyberdeck



still do a trace on your LDL.

(Power 3, 40 MU, Data Wall Strength of 1)

$1000

(Power 0, 10 MU, Data Wall Strength of 2)

$10,000

(Power +3 each, +40 MU each, Data Wall Strength of +1 each, maximum 7 CPUs)

+1 MU

$250

(no maximum)

+1 Speed

$2,000

(maximum of +5)

-1 Power

-$3,000

(no maximum, but at more than -2 you may as well buy fewer CPUs)

Instant Netrunning  Netrunning Softwares

3/25

The Software Software applications are measured by their Strength, which act as a sort of Weapon Accuracy which is added to all tasks performed with that application. Software Strength is rated from 1 to 10. Software is also measured by how many Memory Units it uses on its host computer. This is cumulative. A computer with 30 Memory Units can run one 15MU program and three 5MU programs simultaneously. Switching out a program takes one action. Software applications can have very specic eects, depending on the application being used. The most common and broadly-dened applications are as follows:

Type Decryption

Eect

Strength MU

Cost

Defeats Codegates and File Locks.

4

2

400

Defeats Datawalls.

4

1

400

Defeats Detection Software.

3

1

300

Defeats Anti-Personnel Software.

3

1

150

Causes system to crash.

3

2

570

Does 1d6 damage to target software's STR.

2

5

1320

Anti-Personnel

Does 1d10 Hits directly to target's body if connected via a

4

4

6750

(Hellbolt)

cyber-jack. POW





+1

+1

+1000

2

1

2000

+1

+1

+2000

4

5

720

(Wizard's Book)

Intrustion (Hammer)

Stealth (Invisibility)

Protection (Shield)

Anti-System (Flatline)

Anti-ICE (Killer II)

Firewall

Prevents all access to restricted information.

(Datawall)

Authentication

Allows access to restricted information to authorized users

(Codegate)

Detection

Detects unauthorized users, traces signal, and alerts SysAd-

(Guard Dog)

min.

Other software found in Cyberpunk 2020 is fully compatible with this system.

4/25

Instant Netrunning  Netrunning Softwares

Utilities Utilities are programs that help the Hacker in between runs. Though most don't provide any practical application during the run, they're nonetheless essential applications for the upkeep and preparation of a hacker's computer.

Type Restore Utility

Eect

Strength MU

Cost

Recompiles and restores destroyed programs.

3

1

130

Records activities of current Hack for replay later.

8

2

180

Detects and destroys Virus programs.

5

1

150

Locks datales as a Strength 3 Code Gate.

7

2

170

Reduces program size by 1/2. Takes 2 turns to unpack.

4

1

140

Creates copies of most programs on chip.

4

1

140

Supplies complete system map of VR interface.

6

3

200

All of the above in one package. Saves MU and money.

5

10

1000

(ReRezz)

Recorder Utility (Instant Replay)

Virus Protection Utility (Gatemaster)

File Protection Utility (Electrolock)

Compression Utility (Packer)

Backup Utility (Backup)

VR Map Utility (Cartographer)

Utility Package

The Goods

CPU's house applications for online use as well. Applisecurity

cations range from simple spreadsheets and word proces-

(Datawalls, Codegates, and Detection software), he now

sors to VR Simulations and computer-controlled robotic

has access to the Datafortress' CPU. The Hacker may

systems such as security video surveillance, elevators,

now view stored les (text, video, audio, VR) or run

building climate-control, assembly robots, etc.

Once

a

successful

Hacker

has

bypassed

online software applications. Be warned, individual les may have further security measures attached to them. For example, a le marked Black Ops:

Top Secret

might have another Detection application attached to it which the Hacker must bypass. Or it may be le-locked. Tampering with any ICE applications automatically requires the Hacker bypass a File Protection Utility and any Detection Software.

Note on making copies:

In the Cyberpunk future,

all les have a le-history, recording all modications to the le.

Though modications can be made to the

le-history, the File-history now has a record of the modication. This feature is used to determine the propriety of data. For instance, a hacker nds a le in the Arasaka database called Black Ops: Top Secret. The

Common datales found on corporate datafortresses include:

File History for that le will indicate how many times it's been viewed, by what User, and when. Our Hacker decides to make a copy. The original now records that a copy was made at this date by this user. The new Copy

1. Inter-Oce Memos (E-Mail)

records that it was copied from an original on this date

2. Promotional Material(such as VR advertising sims and Web Pages)

by this user. Every time the hacker views the material, the record shows that the le was viewed on this date by

3. Business Records (including databases)

this user. If the hacker wishes to sell this information, a

4. Financial Transactions

prospective buyer can view the le-history and see how

5. Grey Ops

many times the le has been seen, modied, and copied

6. Black Ops

and by whom.

Diluted data will lower the le's value.

Instant Netrunning  Netrunning Softwares

5/25

Virgin data will raise it's value. The enterprising Hacker

Sample Computers

can easily change the File-History, but a record is made that the lehistory has been changed, thus lowering the

1.

Minor business or personal system (grey info)

value even more. The Hacker can then try to delete the

Statistics:

record of the change, but the deletion of the change is

Speed 0, $4000

recorded in the le-history.

Example:

It never ends.

The safest

POW 1 (1 CPU, -2 POW) , MU 40, DataTerms, Minor Personal Informa-

tion, Palmtops, Portable Computers.

bet is to just own one copy and not view it. 2.

Standard Hacker Software

Major business (grey info) or personal system (black info) Statistics:

Decryption (Strength 4, MU 2, $400)

POW 3 (1 CPU), MU 40, Speed 3,

$16,000

Intrusion (Strength 4, MU 1, $400)

Example: Business Accounts, Secret Personal In-

Stealth (Strength 3, MU 1, $300)

formation

Protection (Strength 3, MU 1, $150)

3.

Anti-ICE (Strength 2, MU 5, $1320) Total (MU 10, $2570)

Major business (black info) or Megacorp system (grey info) Statistics:

POW 6 (2 CPU), MU 80, Speed 6,

$32,000 Example:

Standard Datafortress Software 1.

2.

4.

Mundane Systems

Government (grey info), Megacorp (black info) or Criminal system (grey info)

Detection (Strength 4, MU 5, $720)

Statistics:

Total (MU5, $720)

$48,000

Grey Systems

POW 9 (3 CPU), MU 120, Speed 9,

Example:

Police

Files,

Sabotage

Information,

Holdings Information

Detection (Strength 4, MU 5, $720) tems Only

Government (black info), Orbital (grey info), or Criminal system (black info)

Total (MU 7, $1290)

Statistics: POW 10 (4 CPU, -2 POW), MU 160,

Anti-System (Strength 3, MU 2, $570) Grey Sys-

3.

Alternative Accounts, Customer Sales

Information

5.

Black Systems

Speed 10, $54,000

Detection (Strength 4, MU 5, $720)

Example: Black Op Files, Internet Account Hold-

Anti-System (Strength 3, MU 2, $570) Grey Sys-

ers, Face Bank Accounts 6.

tems Only

Orbital system (black info)

Anti-Personnel (Strength 4, MU 4, $6750) Black

Statistics: POW 12 (4 CPU), MU 160, Speed 12,

Systems Only

$64,000

Total (MU 11, $8040)

Example:

Agora

Mecca,

Cyber

Circle

Lunar,

Ishima Orbital Databases, Articial Intelligences.

Steps in Cracking a Datafortress: 1.

Library Research (Intelligence

+

Library Research

+

3d6 vs. Diculty Number )

to determine little facts

about the corporation. The margin of success is granted as a bonus to the Decryption roll in step 2.

Bonus: The Hacker loads up a good selection of software. Necessary applications include one Decryption, one Intrusion, one Stealth, one Anti-ICE, and one Protection. 2.

LDL (Roll over LDL Security Level on 1d10 ).

The Hacker has connected to a remote server and may use it

to connect (LDL) to another remote server, making a chain of connections to their target. SysAdmins must trace each connection to determine the Hacker's LDL. Once a chain of connections has been established, the Hacker may use the same chain indenitely unless access is revoked by the remote server's Net Access Provider. If unsuccessful, the remote server has refused to connect the Hacker. The Hacker must then make a nal connection to the target server. 3.

Decryption vs. Codegate (Intelligence + Hacking + Decryption Program Str + 3d6 vs. Power + Security +

Codegate Str

+

3d6 ).

If successful, the Hacker has fooled the Code Gate into allowing unauthorized access

to the server. The Hacker is still susceptible to Detection software, proceed to step 4. 6/25

Instant Netrunning  Netrunning Softwares

If unsuccessful, the Hacker still has no access to the server. Repeated failed attempts(3d6) will cause any Detection Software to alert the SysAdmin to the attempt who may use Detection software to initiate a trace to locate and/or monitor the possible Hacker. Continue to Step 4. 4.

Intrusion vs. Datawall (Intelligence Datawall Str

+

3d6 ).

Hacking

+

+

Intrusion Program Str

+

3d6 vs. Power

+

Security

+

If successful, the Datawall has been circumvented and the hacker now has access to

the server. The Hacker is still susceptible to Detection software, however. Proceed to step 5. If unsuccessful The Hacker still has no access to the server but may have been noticed. If unnoticed, try again. If noticed, either a SysAdmin or an Anti-Personnel Program has been notied of the Hacker's presence and will attempt to apprehend or discourage him, proceed to Combat! 5.

Stealth vs. Detection (Power Str

+

3d6 ).

+

Security

+

Detection Str

+

3d6 vs. Intelligence

+

Hacking

+

Stealth

If successful, the Detection Software has detected no unauthorized activity but may attempt to

re-validate the user after an interval of time (3d6 rounds), proceed to step 6. If unsuccessful, the Detection Program has detected unauthorized activity and may notied either a SysAdmin or an Anti-Personnel Program to apprehend or discourage the Hacker, proceed to Combat! 6.

You now have access to the CPU. The computer thinks you are logged on as an ocial authorized user. You may access datales and software applications available on that server. Some datales and applications may contain further security measures. If so, repeat step 3.

7.

Cover your tracks.

Failing to log o or being cut from the line means that the SysAdmin can still trace

your location. Be sure to always log o properly. View the contents of any le you download, but be wary of the lehistory: don't dilute your data!

Combat! 1.

2.

Initiative.

Human Intelligence

+

Computer's Speed

+

Loser declares rst, Winner acts rst.

3d6

versus

Computer's Power

+

Speed

+

3d6

Therefore, if the loser is launching an Anti-Personnel Program

towards the intruder, the winner may either activate a suitable defense or take a chance and attack the loser rst. 3.

Combat Options: a Intruder attacks ICE. (Intelligence Power

+

Security

+

Program Str

+

+

3d6 ).

Hacking

+

Anti-ICE Program Str

+

3d6 vs. Computer's

If successful, the target software application has crashed and

erased from the server. If unsuccessful, the attack has failed to crash the application. Detection Software automatically traces the Hacker's connection and alerts the SysAdmin to the attempt who may attempt to discourage the Hacker. b

Intruder attacks SysAdmin or SysAdmin attacks Intruder. + +

Intelligence Intelligence

(

Anti-Personnel Program Str + 3d6 vs. Protection Program Str + 3d6 ) If successful, the Anti-Personnel program has done damage directly to

+ +

Hacking/Security Hacking/Security

the user's brain (STR 

Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack. If unsuccessful, the attack has failed to do any damage. c

Defending CPU attacks Intruder (Computer's Power +

3d6 vs. Intelligence

+

Hacking

+

+

Protection Program Str

Security + Anti-Personnel Program Str 3d6 ) If successful, the Anti-Personnel

+

program has done damage directly to the user's brain (STR  Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack. If unsuccessful, the attack has failed to do any damage. d

Intruder attacks System.

Intelligence + Hacking + Program Str + 3d6 vs. Computer's Power + Security + DataWall Str + 3d6 ) If successful, the Anti-system software has caused a CPU to crash, (

ceasing all activity until the CPU can be re-initialized using a Restore Utility. The Intruder is immediately disconnected, but not logged o. Once the CPU is re-initialized, the SysAdmin may attempt the trace the connection. If the target is using more than 1 CPU, all CPUs must be neutralized for the target to crash.

Instant Netrunning  Netrunning Softwares

7/25

If unsuccessful, the attack against the CPU failed. Detection Software automatically alerts the SysAdmin to the attempt who may initiate a trace to locate and/or monitor the possible Hacker. e

Detection Software Traces Intruder (Power +

Hacking

+

Trace Value

+

3d6 )

+

Security

+

Program Str

+

3d6 vs. Intelligence

If successful, the Detection Software has located the origin of the

Hacker's connection and informed the SysAdmin. A Detection Program must trace each connection in the event of chained connections (see above) to determine the origin. Once determined, the SysAdmin may notify the Hacker's Net Access Provider in an attempt to have their access revoked. In addition, any further attempts to connect from any server on a traced chain will automatically alert the SysAdmin's Detection Software of the unauthorized access. If a connection was severed without spending an action Logging O, the SysAdmin can still perform a Trace on that severed connection. If unsuccessful, the trace has failed. The Detection Program may attempt to trace a connection each round. 4.

Damage.

Damage is allocated to aected systems or programs (or Hits in the case of Black ICE).

Glossary

how the Datafortress is set up.

Euro:

Anti-ICE Software:

software meant to crash and

delete other software applications.

Anti-Personnel Software:

damage to the actual Netuser.

software meant to do Only works in mileu

software meant to crash or an advanced computer ca-

pable of full interaction and decision-making.

Black Info/System:

Grey Info/System:

Top Secret information. Infor-

mation that someone is willing to kill to keep secret.

InforA

Datafortress with non-lethal countermeasures such as

Hacker:

A generic term for anyone attempting to

applications.

Hacking:

Skill used by Hackers.

In game terms,

Hacking and Security are the same skill used for dierent purposes.

A Datafortress with deadly countermeasures such as

ICE:

Anti-Personnel software.

passing any software applications designed to prevent

Codegate:

a Cyberpunk 2020 term for an au-

Intrusion Countermeasure Electronics, encom-

unauthorized access to a Datafortress.

thentication mechanism or Firewall. Codegates could

Icon:

check namepassword combinations, computer location

refers to a 3D representation of a computer object.

(LDL), ngerprints, retinas, voice-prints, DNA, etc.

A le might be represented by an icon that, once

CPU:

A visual representation. In Cyberpunk 2020,

Central Processing Unit, the brain of a com-

clicked/grabbed/pushed/opened, will display the con-

puter. Many computers have multiple redundant CPUs

tents of that le. Often, events are represented by an

that increase processing power. Also, if one fails, the

icon.

computer can keep operating at a reduced level.

presence on the server with an icon of a knight in ar-

Cyberdeck:

or Cybermodem, a computer device that

uses the operator's living brain as a CPU.

Datale:

any le that contains information. Datales

can be text, graphics, video, audio, or full sensory VR simulations.

Datafortress:

A Dataserver that restricts informa-

tion to authorized users.

Dataserver:

A futuristic term for a server, a com-

puter which provides data upon request.

Datawall:

A Cyberpunk 2020 term for a Firewall,

a Datawall without a Codegate simply doesn't provide access to it's protected information and must be defeated with Intrustion Software.

Decryption Software:

Software designed to bypass

Codegates by fooling it into providing access.

Detection Software:

Software that periodically re-

checks users on a server to authenticate access. If unauthorized access is discovered, the Detection Software

mor.

For instance, a SysAdmin might represent his If the Hacker sees a knight in armor, then he

knows the SysAdmin is logged onto the server.

Internet Corporation:

A Cyberpunk 2020 creation

meant to be a conglomerate of Net Access Providers. In the modern world, these would be comprised of several companies such as MCI, ATT, UUNet, etc. Intrusion Software: Software meant to temporarily disable Datawalls, allowing access to the server.

The disad-

vantage is that their use may alert Detection Software applications.

LDL:

A Cyberpunk 2020 equivalent of the modern

IP address.

In Cyberpunk 2020, the LDL also serves

as an allpurpose phone number, e-mail address, and voice-mail box.

Memory Unit: Megabytes.

A Cyberpunk 2020 equivalent to

It has no real-world conversion and was

used in lieu of actual future memory sizes which can become dated quickly.

noties the SysAdmin or automatically deploys AntiPersonnel or Anti-System applications depending on

8/25

Secret information.

mation no one is willing to kill to keep secret.

gain unauthorized access to restricted information of

immobilize another computer's CPU.

Articial Intelligence:

For

Anti-System software.

that use Cybernetic interfaces.

Anti-System Software:

The Cyberpunk 2020 unit of currency.

modern settings, simply replace with dollars.

Instant Netrunning  Netrunning Softwares

Mundane Info/System:

Condential information,

In Cyberpunk 2020, VR Sims can be interactive games,

but hardly a secret. Information that is restricted but

advertisements, network conference areas, or fantasy

isn't guarded by countermeasures. Datafortresses that

playgrounds. Any situation that requires being some-

employ Detection Software only.

place you can't actually physically be can be solved

The Net: ternet.

The Cyberpunk 2020 equivalent of the In-

with a VR Sim.

The Cyberpunk 2020 Net is represented by a

3D fullsensory

Virtual Reality:

Other names for the Net include

the Face, the Cybernet, the Interface, the Web, etc.

Net Access Provider:

References

A company that rents tem-

porary LDL's to Netusers. The Internet Corporation is

For more information on other Hacking and Netrunning sys-

a large Net Access Provider. NAP's generally cooper-

tems, see:

ate with SysAdmins in discouraging Hacker activity. If an NAP is notied that one of their Netusers is possibly a Hacker, they will discontinue that Netuser's service. The futuristic equivalent of modern day Internet Service Providers.

Netuser:

Anyone using the Net legally. The equiva-

lent of the modern Net surfer.

Power:

A Fuzion game mechanic meant to be a rel-

ative measure of a computer's ability.

Security Level:

A Fuzion game mechanic meant to

represent the skill used by either a SysAdmin or Com-

Cyberpunk 2020

by Mike Pondsmith, R.Talsorian

Games.

Bubblegum Crisis RPG by Benjamin Wright, R.Talsorian Games.

NETRUNNING RULES by [email protected] Skyre Master Force by Gary Townsend, HERO Games.

How Hackers Break In... and How They Are Caught by Carolyn P. Meinel, Scientic American, October 1998.

puter CPU to deter or capture Hackers. In game terms, Security and Hacking are the same skill used for dierent purposes.

Server:

A computer connected to the Net. The server

acts as a middle-man between the person requesting information and the memory storing the information. Your computer sends a request to the server, the server nds it, the server sends the information to your computer.

Speed:

A Fuzion game mechanic meant to be a rela-

Cyberpunk:2020 and Fuzion are a Registered Trademarks of R.Talsorian Corporation. Original Cyberpunk:2020 material Copyright 1994, 1995 by R.Talsorian Corporation. All Rights Reserved. Used without permission. Any use of R.Talsorian Corporation's copyrighted material or trademarks in this archive should not be viewed as a challenge to those copyrights or trademarks.

tive measure of a computer's speed. Stealth Software: Software that attempts to fool Detection Software into authenticating or ignoring an unauthorized Hacker.

Strength:

A Fuzion game mechanic meant to be a

relative measure of a program application's ability.

SysAdmin:

System Administrator.

The person in

charge of maintaining a Datafortress' security.

System:

A collection of computer components that

work together.

A group of computers attached to a

single network would be a system. The Net as a whole might be considered a very large system. Trace Value: The relative diculty in tracing a connection's origin.

Virtual Reality Interface:

Much like a modern

Graphic User Interface (GUI), the VR Interface displays the computer's Desktop as a 3D interactive universe around the user. In Cyberpunk 2020, the Net can be accessed in such an interface, displaying Net LDL's as Icons around the user. The user moves freely about in this space, choosing the icon they wish by coming into contact with it with their hands. Their bodies are displayed to them as whatever the user wishes and programs much like a modern cursor, their hands acting as a mouse in space.

VR Construct:

A 3D Icon in a VR Interface. A VR

construct can be anything, limited only by the imagine of the creator. It's size is determined by how much memory it requires.

VR Sim:

A VR Simulation. A tiny virtual universe.

Instant Netrunning  Netrunning Softwares

9/25

10/25

Instant Netrunning  Netrunning Softwares

4

2

3

Hammer

Jackhammer

Jap

Tor-

1

which

res

a

2

Worm

3

6

1-8

5

...

Codecracker

Cyfermaster

Dupre

Raes

...

Decryption

1

...

3

4

3

2

5

2

...

560

900

700

380

660

160

600

...

Opens Code Gates & File Locks

Opens Code Gates & File Locks

Stronger version of Raes

Opens Code Gates

Opens Data Wall in 2 turns, no alert

1D6 to Data Wall STR

3D6 to Data Wall STR, alerts programs within 15 spaces

spaces

nuclear

powered

battering

ram,

as

rows into Wall.

blue eyes. Emits low-pitched bleeps as it bur-

Brown, st-sized, fractal insect with bright

Glowing white Sledgehammer.

drawn by Jack Kirby.

Huge

ner.

so.

the locked Gate, and takes notes as he does

Elegant middle-aged Victorian. He speaks to

tion.

Fractal image of a man oating in lotus posi-

the Code Gate.

...

....

vanishes.

of the 1990's.

He speaks to the door then

CP20 Dapper young man wearing evening clothes

Chr3

BB

the Netrunner's hands and spreads through

CP20 Thin beam of white light, which shoots from

eyes.

CP20 Gold-metal, robotic worm, with green neon

Chr1

Chr3

BB

Data Wall then swings open for the Netrun-

Metallic door that slowly meshes with the

blowing up.

Termite

2

5D6 to Data Wall STR, "audible" to anything within 50

NET

6

900

Opens door in Data Wall, takes 3 turns, no alert

Sledgehammer

3

750

10

6

Ramming Piston

Tiny, random drops of glowing "water" strike

Wall.

2

Chr3

jackhammer,

Portal

4D6 to Data Wall STR, alerts progs in 30 spaces, & Netwatch

BB

red

stream of white hot energy bolts at the Data

CP20 Glowing

Steam-powered pile driver on the verge of

800

through the Wall.

Swarm of puke-green grubs that eat their way

Small, quiet digging machine.

CP20 Glowing red hammer.

BB

BB

the Wall, causing ripples.

4

Min of 2 turns, each additional turn adds +1 STR (max 7)

1D6 to Data Wall STR

2D6 to Data Wall STR, alerts programs within 10 spaces

Weaker version of Worm

Stronger version of Worm

8

260

360

400

210

230

From Icon

Pile Driver

4

2

1

3

3

MU Cost(eb)Function

ture

Water

3

Grubb

Str

Dwarf

Intrusion

Type / Name

Netrunning Softwares

Instant Netrunning  Netrunning Softwares

11/25

3

4/6

Wizard's Book

3

4

3

5

1-6

5

3/5

2

Fetch 4.01.1

Guard-Dog

Hidden Virtue

Hunter

Looking Glass

Mouse

Netspace Inverter

Pit Bull

...

5

...

4

...

6

4

5

3

5

1

5

5

6

6

Detects entry, traces, alerts master

Detects "real" things in VR

Invisible; detects entry, alerts master

Detects entry, traces, alerts master

Detects entry, traces, disconnects target until destroyed

Detects entry, traces, disconnects target until destroyed

...

780

540

350

...

Detects entry, traces, disconnects target until destroyed

and les

Travels through a fort at 2 subgrids/turn IDing programs

Creeps into forts and makes a record of what's inside

250+20/str Detects disguised Icons

900

280

720

700

1600

1300

Detects entry, traces, alerts master whenever target appears

periphery of vision.

hound, other wise it is a slight icker at the

Detected it appears as a standard Blood-

Chrome greyhound with glowing blue collar.

Robotic pit bull with a red head.

Glowing green pit bull.

Metal-plated black bird.

icon has none.

blue, or a pair of glowing eyes appear if the

The eyes of the Netrunner's icon glow ery

screaming.

Flying eyeball; turns invisible when activated.

Small, innocuous mouse.

get icon.

Netrunner, passing over and through the tar-

Series of mirrors appears in front of the

Hound head lunging down the target's line.

through.

...

....

red eyes and wears a circlet of red neon.

CP20 Short, heavily built, steel dog. It has glowing

BB

BB

Chr3

BB

CP20 Glowing green ring which the Netrunner looks

Chr1

BB

BB

BB

BB

Chr3

Fang 2.0

1000

grids

SeeYa 3.0, detects and IDs Icons (+invisibles) within 2 sub-

Fang

6

720

5

4

baby, hanging around the Netrunner's neck,

Data Raven

Large steel statue of a dog/a computerised

nine jaws.

4

Chr3

A

glowing visor is situated above snarling, ca-

Short, burly humanoid in metal armour.

neon.

Clairvoyance

"Tags", adds 4 to traces when copied

BB

Chr1

blue eyes and wears a thick circlet of blue

CP20 Large, gun-metal grey hound. It has glowing

hand.

incredible speed from the Netrunner's open

None until activated, then it appears as a

430

Detect entry, alerts owner

Shifty-eyed character with an insincere smile.

CP20 Stream of blazing white symbols, owing at

BB

From Icon

...

chihuahua.

4

610

Detects entry, alerts master, disconnects intruder

Detects entry, traces, alerts master

Opens Code Gates & File Locks

Sneaky decryptor

...

4

5

660

700

400

300

...

Cry Baby

4

Canis

6

5

2

4

...

MU Cost(eb)Function

...

jor/Minor

6

Bulldog

Ma-

3

Bloodhound

Detection/Alarm

Str

Tinweasel

...

Type / Name

...

12/25

Instant Netrunning  Netrunning Softwares

3

3

4

3

4

4

See Ya

Shadow

Smarteye

Speedtrap

Watchdog

chose

new

bottle, pies, etc.

cus clown, complete with slapstick, seltzer

Annoying, loud, obnoxious, white-faced cir-

Floating ball of energy.

sorbed on contact.

sules sprays the target's icon and are ab-

Shower of random neon-coloured pods & cap-

Glowing golden snake.

Netrunner's ngertips.

Beam of orange neon which shoots from the

...

2

...

600 ...

Causes system to randomly activate programs

disembodied st which burns with

...

....

CP20 You never know...

zling fuse.

CP20 Large, cartoon anarchist bomb, with a siz-

it in blue ames.

blue, fractal re, grabs onto target, engulng

Giant,

rounding it.

...

Huge white electrical arc that strikes the tar-

Netrunner's ngertips.

3

Crashes closest CPU for 1D6+1 turns

Chr3

Chr4

BB

CP20 Beam of yellow neon which shoots from the

I.3

CP20 Cartoon stick of dynamite with fuse.

BB

BB

Chr3

BB

eyes and a spiked metal collar.

CP20 Large, black, metal dog. It has glowing red

appear.

...

570

Destroys target CPU

Distorts I-G algorithms

Kills system RAM

Kills cyberdeck interface

Kills deck's interface and "jams" 'runner plugs

Crashes 'deck for 1D6 turns

Initiative

appropriate icon appears within.

Murphy

2

1000

20K

1000

Decks

humanoid

3

5

8

3

570

changes.

long,

Krash

4

Fragmentation

2

960

program

a

6

3

Flatline

3

600

that

Disrupts data transmission, progs are -1 STR, 'runners -1

prog/turn

chance

gains

HellBurner

4

Feedback

2

1130

20%

icon

Spinning crystal ball; the ball stops and the

shadow.

Netrunner's

CP20 Flat, glowing plate of glass, in which images

Chr1

Chr3

Black sphere with twisting light waves sur-

4

DecKRASH

5

800

Erases 2D6 MU of random memory

Kills cyberdeck interface

teeth.

Rather nasty, metal plated dog with really big

CP20 Shimmering silver screen.

BB

From Icon

...

get and follows his line back to his deck.

3

Clown

2

900

800

Detects entry, alerts owner

Detects attack programs within 10 spaces

Detects progs within 10 spaces, IDs attack progs

Degrades evasion programs

Detects Invisible Icons

Detects entry, traces, disconnects target until destroyed

...

7

3

Cascade II

4

2

610

600

620

540

280

1000

...

Grid Wave

7

Cascade

5

4

4

3

1

6

...

MU Cost(eb)Function

...

Storm

4

Asp

Anti-System

Str

Rex

...

Type / Name

...

Instant Netrunning  Netrunning Softwares

13/25

5

2

5

4

4

1

6

2

5

4

4

Poison Flatline

Poltergeist

Pox

Scatter Shot

Swarm

Typhoid Mary

Weed

Vacuum

Virizz

Viral 15

...

...

7

Spore

...

7

4

...

2320

600

...

produce

AI suicide-replication, sends multiple copies into Net to re-

'Runner looks like he's jacked out and is invisible for 5 turns

Adds 4 to Trace Diculty

...

NET

I.3

BB

millions

holo-

....

Each spore looks like a small mote of light.

Looks as it the Netrunner has jacked out.

Signpost with signs pointing in all directions.

graphic images of the Netrunner.

creating

of

6

300

sphere

Bugs Bunny variants around. CP20 Chrome

Also

Blue sphere surrounded by two stylized light-

Silhouette

1

Confuses attacking ICE with millions of false signals

BB

BB

4

180

Draws o "Dog" programs, +2 Initiative when released

Adds another LDL to make traces harder when activated

the Netrunner.

CP20 Flickering, iridescent sheet, which drapes over

directions.

Cartoon signpost with signs pointing in all

Depends on the data fort.

Signpost

2

360

330

Makes cybersignal invisible

Chr3

BB

Makes the user's Icon invisible.

Anything programmed into it.

3/4

2

5

300

Adds 4 to Trace Diculty

Makes your Icon look like one common to the locale

BB

NET

DNA helix embedded in the centre.

CP20 Swirling metallic blue fog with a white neon

neon.

Replicator

4

Open-Ended

1

300

1500

ner's Icon out of the data fort.

Series of hexagonal frames that suck the 'run-

tem's CPU(s).

Tangled weeds growing on the icon of the sys-

Female Killer robot.

stinging it.

Cartoon-y bee that ies towards a CPU,

Shotgun shooting fractal shot.

wash of sickly coloured globules.

Floating ball of energy that explodes into a

wiping data and les.

Random ashes of energy from everywhere,

Netrunner's ngertips.

CP20 Glittering DNA shape made of lights and

BB

Chr4

Chr3

Chr4

BB

BB

BB

Fractal rabbit going like the blazes.

3

Invisibility

1

3

Powerful variant of Invisibility

Large cartoon pie, for throwing.

CP20 Beam of green neon which launches from the

Chr3

From Icon

...

ning bolts.

4

George

2000

200/STR Makes your Icon look like something/one else

Randomly erases one le each turn

Ties up 1 system action until turned o or destroyed

tered fort

Attacks location algorithms, forces 'runner to where he en-

-1 target speed per successful attack

Inltrates 'runner and deletes les

Causes target system to replicate Swarm programs

Kills system RAM

Causes a glitch in ambush ICE, 30% chance of derezzing

Randomly erases one le each turn

Kills system RAM

Makes CPU calculate Pi

...

5/1

5

Domino

2

3-4

590

600

1200

630

2400

3000

660

800

660

540

800

...

Rabbit

5

Cloak

2

2

3

3

8

7

3

2

3

2

4

...

MU Cost(eb)Function

...

Mileage

1-5

Black Mask

Evasion/Stealth

Str

Pi in the Face

...

Type / Name

...

14/25

Instant Netrunning  Netrunning Softwares

4

3

4

Superballs

Vewy Vewy Quiet

2

5

3

OutJack

Reector

Shield

4

1

7

4

4

4

3

...

Aardvark

Banpei

Black Dahlia

Bunnies

Chameleon

Codeslinger

D'Arc Knight

...

Anti-Program

3

Joan of Arc

4/2

Flak

4

6

DeckShield One

Force Shield

4

Armor

Protection

Str

Stealth

...

Type / Name

...

...

5

3

6

3

7

5

3

1

2

4

2

2

2

2

2

2

4

3

...

1360

2500

1650

440

2000

1280

1000

150

160

150

190

160

180

320

170

400

500

480

...

...

1D6 to program STR

Killer written to t less MU. 1D6 damage

Killer IV with active Disguise

Overloads Vampyres

Interactive, super-realistic Killer. 2D6 damage

1D6 to program STR

Detects and destroys Worms

Stops attacks to 'runner

Reects Stun, Hellbolt, Knockout attacks

Jacks 'runner out of Net if he's taken Critical damage

gram

Remains "active" and takes damage meant for current pro-

Stops attacks against 'runner

grams

Creates static Wall to blind attackers; STR 2 vs Dog pro-

Adds +3 to deck's Data Walls

Reduces attacks from Stun, Hellbolt, Zombie, etc by 3 points

Concentrates on avoiding detection

Distracts targets, causing -3 Initiative

Mutes cybersignal, making detection harder

...

MU Cost(eb)Function

...

'runner

translucent.

The

glass cube. makes

no

sound

and

turns

bouncing around target's square, as if in a

Thousands of primary-coloured rubber balls

data

fort/position

in

None.

Woman's face that grimaces in pain.

...

BB

BB

NET

Chr1

BB

BB

seductive

woman

in

a

black

....

Svelte knight in armor.

Cowboy with six-shooter codeguns.

the Icon of the program it is attacking.

Killer with a polished mirror face that reects

ears" antennae.

metal coloured bubbles, with classic "rabbit

Rapidly-multiplying bunch of burnished gun-

evening dress.

Incredibly

Robotic samurai.

trapped.

around the Worm, then dematerialise with it

CP20 Matrix of thin yellow neon lines, which close

front of the Netrunner.

CP20 Shifting circular energy eld appearing in

mirrored bowl.

CP20 Flare of blue green light, coalescing into a

Chr3

is multicoloured

lights, swirling in all directions.

glowing,

CP20 Flickering silver energy barrier. BB

netspace

sheathed in fractal armor-plating.

Deck's

CP20 Cloud of blinding,

Chr4

CP20 Glowing golden armor in a high tech design.

BB

Chr4

ner's Icon.

CP20 Sheet of black energy draped over the Netrun-

...

From Icon

...

Instant Netrunning  Netrunning Softwares

15/25

1

2

5

5

7

Loony Goon

Manticore

Mirror

Ninja

Orion

...

6

Killer VI

...

4

Killer IV

4

Exorcist

2

8/5

Eradicator

Killer II

4

Dropp

2

4

Dragon

Ice Pick Willie

10

Dogcatcher

3

6

Hydra

Str

Data Naga

...

Type / Name

...

...

7

5

4

3

4

5

5

5

5

3

3

7

4

3

7

5

...

6240

1520

1200

880

900

1480

1400

1320

1320

920

600

1600

800

960

1176

1480

...

...

Tracks Spores, 'runners, & programs. Destroys Spores

Invisible Killer

Rebounds Hellbolts

Attacks and derezzes Demons

1D6 damage. Strength 0 to defend against other Killers

1D6 to any program STR

1D6 to any program STR

1D6 to any program STR

1D6 to program STR

Attacks and derezzes Demons

Removes eects of Possession

Acts as Killer V, destroys AI Spores

1D6 damage, and jacks the 'runner out of the system

Attacks and derezzes Demons

Chases and destroys tracing "Dogs"

1D6 to program STR

...

MU Cost(eb)Function

...

ing a net on a pole.

Basic male or female humanoid shape carry-

and six arms.

Exotic woman with a serpentine lower torso

religious symbol.

Fractal priest in full regalia, carrying a large

Glowing amoeba with huge jaws.

in a pond.

A ripple across the immediate area like a drop

Classic '30s gangster hitman.

and dematerializes it.

His eyes glow red and he carries

His eyes glow red and he carries

...

I1.3

Chr4

Chr4

drawn

in

red

neon

The bolt goes in then comes out

....

radiance.

platform or an angel with wings and divine

Powerful man or woman with bow and ying

glowing sword.

When seen it appears as a ninja carrying a

again.

'runner.

Large, square mirror oating in front of the

A large scorpion tail arcs

shape, over one shoulder.

schematic lines.

lionlike

Cartoon character of the 'runner's choice. CP20 Huge,

BB

His eyes glow red and he carries a glowing Katana.

samurai.

CP20 Large manlike robot, dressed as a metallic

a glowing Katana.

samurai.

CP20 Large manlike robot, dressed as a metallic

a glowing Katana.

samurai.

CP20 Large manlike robot, dressed as a metallic

BB

CP20 Glittering blue fog that encircles its target

Chr3

NET

BB

eyes.

trical discharges. Laser beams shoot from it's

CP20 Great golden dragon robot, wreathed in elec-

Chr3

BB

...

From Icon

...

16/25

Instant Netrunning  Netrunning Softwares

3

4

3

6

6

5

3

3

7

...

Ball and Chain

Bolter Cluster

Brainwipe

Cerebus

Cinderella

Code Corpse

Cortical Scrub

Data Darts

Fatal Attractor

...

Anti-Personnel

...

7

4

4

4

4

8

4

4

3

6

...

10750

5500

6500

7500

9000

9500

6500

8000

5000

1500

1400

1480

1280

Destroys target if used in the round when program was

active

1D6 damage, +2 STR for each program it destroys while

...

Attractively disguised Hellhound

Hellbolt variant that does 3D6 damage

Reduces INT by 1D6/turn, killing 'runner

Reduces INT by 1D6/turn, making 'runner mindless

High-powered Firestarter

Pit Bull that shoots Hellbolts

Reduces INT by 1D6/turn, killing 'runner

Powerful Hellbolt that does 4D6 damage

Slows 'runners movement to 1 square for 1D6+3 turns

Killer disguised as Watchdog

1D6 to program STR

4

3

5

5

3000

1D6 to program STR

1D6 to program STR

Wolf

4

Start-Up Immola-

5

1400

1440

1

2+

Snowball

5

5

"Blinds" any programs

2

Wildcard

4

Shaka

1000

Killer that strikes at range, 1D6 damage. +80eb/level over

1D6 to program STR

5

Sentinels Prime

4

1900

"Possesses" programs

rezzed up

5

Raven

3

1000

4

2-6

Raptor

3

...

MU Cost(eb)Function

...

Triggerman

4

...

tor

Str

Possessor

...

Type / Name

...

the target.

Wicked looking turret springs forth to blast

some part of the target icon.

Classic prisoner's ball and chain clamped to

it will ash entirely red as it attacks.

Identical to the Watchdog icon, except that

"Wild Card".

Representation of the old Capone ganger

Film noire-style detective.

mouth and burns the target program to ash.

Bolt of ame that shoots from the 'runner's

it destroys.

Snowball that grows in size for each program

Zulu warrior with spear and shield.

Golden humanoid with a big gun.

the target.

Raven that attempts to peck out the eyes of

prey.

Realistic falcon which swoops down upon it's

hood.

cover another Icon, which can be seen in the

Hooded robe, with nothing inside. Robe will

...

Chr1

BB

BB

BB

BB

NET

One res

....

suit. DIFF Sys Know to recognise her.

Attractive young woman in a skintight body-

Swarm of red globes that strike at the target.

Green globe that send out electrical arcs.

target.

Skeleton in a cloak with a scythe attacks the

ignites.

18th century ball gown, Anything she touches

Lovely woman with green glowing eyes, in

pursues target.

Hellbolts from its eyes, the other howls as it

Dark, metallic dog with 2 heads.

the oor and engulfs and kills the 'runner.

CP20 Acid-green electrical arc, which leaps from

BB

Chr3

Chr1

BB

BB

BB

BB

BB

BB

Chr3

BB

Chr3

...

From Icon

...

Instant Netrunning  Netrunning Softwares

17/25

5

3

6

4(5)

5

4

6

4

Masti

Neural Blade

Pepe Le Pue

Psychodrome

Red-Out

Shock.r

Sleeper

Spazz

...

4

Liche

...

4

5

Homewrecker

Knockout

6

Hellhound

3

4

Hellbolt

King Trail

5

Glue

3

4

Jack Attack

Str

Firestarter

...

Type / Name

...

...

3

4

5

4

11

5

4

6

4

3

2

3

4

6

4

4

4

...

6250

7250

6300

6750

14000

7750

6750

12000

7250

6250

3500

6000

8000

10,000

6250

6500

6250

...

...

Halves 'runners REF for 1D6 turns

resist)

Non-lethal Brainwipe, makes target do a task (di 20-30 to

Freezes 'runner for 1D6 turns

Paralyses 'runner for 1D6 turns

Unconscious for 1D6 hours, scares victim

Reduces 'runners INT and REF for 1D6+1 turns

1D6 physical damage to target

1D6

Tracks & tags target, does 1D6 damage and reduces INT

Erases 'runners memory and over-writes personality

Causes coma for 1D6 hours

Leaves glowing trail behind 'runner for 3D6 turns

'Runner can't log o for 1D6 turns

High-powered Firestarter

Tracks target, waits, causes heart attack

1D10 physical damage to 'runner

Locks 'runner in place for 1D10 turns

Power surge electrocutes 'runner

...

MU Cost(eb)Function

...

of in

re, a

the

booming

speaks

hissing,

which

of

crimson

re

launched

from

the

eyes.

Fiery electrical arc that shoots at the target's

'runner's name.

Repeats the

Glowing yellow banana slug.

cling the Netrunner's wrists.

dressed

in

black

robes.

on

the

Netrunner;

changing

the

engulfs the 'runner.

Electrical arc, which leaps from the oor and

Golden bolt from the Netrunner's palm.

colour of his Icon.

descend

Shifting contextural haze of red pixels that

ing torture.

tual room of faceted, mirrored walls display-

Disguised as system. 'Runner is placed in vir-

ner's Icon.

Cartoon skunk the wraps around the Netrun-

Glowing, rune-etched broadsword.

lar.

Glowing blue masti with a huge spiked col-

under the oor.

...

....

target.

CP20 Nimbus of electrical energy surrounding the

I.3

BB

Chr4

Chr1

NET

BB

BB

skeleton

Grabs the 'runner in its grasp and drags him

CP20 Metallic

strikes out at the Netrunner's Icon.

CP20 Yellow neon schematic boxer appears and

NET

CP20 Pair of glowing schematic handcus encir-

BB

and re ripples over its body.

CP20 Huge, black, metal wolf. It's eyes glow white,

Netrunner's raised hand.

CP20 Bolt

the oor to entangle the Netrunner.

CP20 Shifting pattern of red shapes ickering across

voice, then leaps at him.

name

pillar

Netrunner's

CP20 Blazing

...

From Icon

...

18/25

Instant Netrunning  Netrunning Softwares

4

3

3

5

5

4

6

5

Stun

Sword

The Audio Virus

Threat

TKO 2.0

Werewolf

Zombie

2

1D6

5

5

1

8

4

2

...

A Picture's Worth

Al Boon

Black Sky

Blink

Dummy

Evil Twin

IGOR

Lightning Bug

...

Multi-Purpose

Str

Stationery

...

Type / Name

...

...

6

7

7

2

7

8

7

6

4

6

3

6

5

4

3

6

...

1540

4800

2700

450

1500

4480

3600

1200

7500

13,000

6250

7000

8000

6750

6000

10000

...

...

6 "bugs" that kill ICE before it can attack

On-line unky

Combination Shield/Krash

Fake, disguisable program

50% rel

1D6 damage to Walls and programs, goes through Gates.

ning"

Hides 'runner in a cloud which attacks programs with "light-

Goes through Gates, does 1D6 damage to Walls & programs

Hides data within VRs

Reduces INT 1D6/turn, making 'runner mindless

Invisible Hellhound

Causes coma for 1D6 hours

Makes 'runner so nervous he jacks out

Reduces INT and REF until 'runner destroys program

1D6 physical damage to target

Freezes 'runner for 1D6 turns

Prevents 'runner from moving for 5 turns

...

MU Cost(eb)Function

...

on

the Netrunner.

them, appears in a sort of snowstorm over

Pieces of paper, with 'You're Nicked!'

stereo

system,

which

will

when rezzed.

None normally, but a stylish wolf in a suit

nasty left hook.

Chrome boxer who smacks the target with a

Set at time of purchase.

Any minor oensive or defensive program.

tremble and vibrate from the noise it makes.

Photo-realistic

...

NET

Chr4

Chr3

Chr3

BB

Chr3

BB

Chr4

It lunges out and rips the

Data ows in though coin

....

Netrunner.

red and white.

The motes lazily circle the

6 motes of light that slowly alternate between

with lab coat and hunchback.

Classic "mad-scientist's" assistant; complete

large arcs.

The Netrunner's Icon seems to y around in

the Icon of any program it encounters.

Small spinning chrome pyramid that reects

Or blows up.

into a random fractal solid (when it works).

Swirling cloud of fractal code that coalesces

program and the runner.

Black cloud which forms between the enemy

into a fractal solid.

Stream of fractal code that rapidly coalesces

pours into MU.

slot, machine spins a jackpot, scrambled data

Slot machine.

Netrunner's head o.

ing grey mist.

CP20 Shrouded, skeletal form, enveloped in stink-

NET

BB

Chr3

Chr4

CP20 Glowing energy katana.

ner's open palm.

CP20 Bolt of blue ame streaking from the Netrun-

Chr3

...

From Icon

...

Instant Netrunning  Netrunning Softwares

19/25

3

8

6

6

Satchel Charge

Scribe

Wolfpack

5

3

4

4

3

5/2

4

4

4

4

2

Genie

Hotwire

Knevil

News At 8

Open Sesame

Phone Home

Rockerbit

Soundmachine

Terminator

Viddy Master

WAD Controller

2

Baedeker's

...

...

4

Backup

Map

6

Alias

Net

3

Dee-2

Utility

4

Crystal Ball

Controller

Str

Omnivore

...

Type / Name

...

...

1

1

2

1

1

2

1

2

1

1

1

3

1

1

1

1

8

8

7

8

...

130

140

160

150

140

260

140

200

150

130

140

220

130

150

130

140

15200

NA

18500

18500

...

...

Know

Routes calls public 2 or 3 dataterm numbers.

Used to copy programs

Replaces le name with false one

Diculty 10-35 to patch into signal

Allows control of videoboards

Control terminals

Controls mikes, speakers, vocoders, etc

set time

+3 System

Limited AI microphone/voxbox controller, broadcast at pre-

STR 2

Can place/receive calls while in the Net, can intercept at

Weaker program to operate doors, elevators

Allows access to Data Terms & Screamsheets via the Net

Limited AI vehicle controller, no safeguards

Operates remote vehicles

Operates doors, elevators

Operates robots, cleaning machines, autofactories, etc

Operates video cameras, remote sensors, etc

'runners

Does 1D6 damage to ICE/Demon STR, 1D10 damage to

47+

Stops and disassembles programs for copying. Program roll

& Gates

5D6 damage to 'runner & progs in 1 subgrid, 3D6 to Walls

2D6

Derezzes programs, fries CPUs, temporarily reduces INT by

...

MU Cost(eb)Function

...

apart.

begins moving it.

priate.

speaker remote and 'yells' into it as appro-

None.

...

BB

....

A green line extending across a Net map.

CP20 None.

CP20 None.

Chr3

CP20 None.

tion.

ing, or drawing on the remote icon in ques-

A disembodied cyberarm begins typing, writ-

CP20 None. Chr3

madly

Cartoonish Rocker that hangs around the

CP20 None.

CP20 None.

Chr3

with

glinting eyes. He grabs the remote's icon and

Wildly-dressed

CP20 None.

Chr3

CP20 None.

CP20 None.

CP20 None.

motorcyclist,

which pounce upon their target, ripping it

Pack of electrically-charged wolike forms

Cowled chrome monk with feather pen.

A bomb in a backpack.

mangles it.

which careens into its target and thoroughly

Whirring, buzzing, screeching ball of blades

CP20 None.

Chr3

Chr4

SW

Chr3

...

From Icon

...

20/25

Instant Netrunning  Netrunning Softwares

4

3

6

8

3

Breadcrumbs

Butcher Boy

Cartographer

Databaser

Dolphin

4

4

2

10

10

5

4

8

2

File Packer

Flare Gun

Flip Switch 2.0

Flip Switch 3.0

GateMaster

Guest Book

Instant Replay

Mictotech AI In-

4

4

4

3

4

NetMap

Newsgroup Filter

Padlock

Re-Rezz

R&D

...

...

5

Mystery Box

Protocol

5

Multi-Tasker

Files

10

Multinetter

terface

4

Filelocker

An

7

Expert

Schedule

ElectroLock

grams

3

Pro-

Str

Bakdoor

...

Type / Name

...

...

3

1

2

4

1

4

6

20

4

2

2

1

0

0

2

1

1

3

2

5

2

3

7

4

2

...

250+

130

160

200

140

300

1140

2000

330

180

200

150

250

225

300

140

140

250+

170

310

180

200

550

290

600+

...

...

Skims R&D les at 1MU per turn. Shelf life of two weeks

Recompiles damaged programs and les

Access code needed to log onto deck

info

Goes out and skims news and interest groups for specied

Major region locator map, +2 to System Knowledge

Searches for and copies programs from les

Extra actions on mainframes

Allows multiple 'runners to run through one computer

Pseudo-AI that scans les looking for keywords

Records 'runners trip

Detects 'runners within 2 squares, treat as STR 3 Code Gate

Anti-virus, detects & destroys Virizz & Viral 15

Flip Switch glogo controller, 3 settings

Flip Switch controller, -5 Net Initiative when active

Message travels 3 spaces per turn for 2D6 turns

1/2 MU size, 2 turns to unpack

Locks les with code word, equal to STR 5 Code Gate

Skims les at 1MU per turn. Shelf life of a month

Locks les at STR 3

Clean Pacica of junk data

Stores up to 10,000 pages per le

the fort

STR vs CPU INT/2 for map of data fort, must be run inside

Creates a paper trail, whilst funnelling funds elsewhere

LDL

Finds new LDL link routes (legally), 1 round per uplink or

Routes link through at least one private system

...

MU Cost(eb)Function

...

None.

program.

Takes the appearance of a system accounting

Line of glowing sparks forming a trail.

A green line extending across a Net map.

Sleek, chrome dolphin.

requested.

manoid icon that leads you to the les you

None needed, but might appear as a hu-

None.

None.

Big-barrelled are gun.

An old-style hotel guest book and quill.

on each surface.

Cartoon box with strange gears and widgets

None.

None.

Floating hollow mask.

A simple Icon of the user's choice.

...

BB

....

requested.

manoid icon that leads you to the les you

None needed, but might appear as a hu-

CP20 None.

CP20 None.

BB

CP20 None.

BB

NET

Chr3

BB

CP20 None.

Chr4

CP20 None.

BB

Chr3

Chr3

CP20 None.

CP20 None.

BB

CP20 None.

NET

CP20 None.

Chr3

BB

NET

BB

...

From Icon

...

Instant Netrunning  Netrunning Softwares

21/25

5

4

1

Translator 2000

Zetatech Installer

5

7

4

3

6

Reaper

Soulkiller 3.0

Succubus II

Thug

Vampyre II

7

3

Cream Pie

Deep Thought

...

5

Cockroach

...

3

Boardwalk

Daemons

3

5

Balron II

Imp II

3

Afreet II

Demons

Str

Shredder Uplink

...

Type / Name

...

...

7

7

7

7

7

6

4

4000+

45-

7

3

5

4

1

2

3

...

1080

1715

1600

1080

2300

10440

1200

NA

12500

1000

1240

1160

300

240

250

...

1D6 to 'run-

messages

and

conversation

in

admin/budget

...

Records messages and conversation in research database

Carries 3 programs (Poison Flatline, Killer IV, & Murphy)

Eats les, turns them into more cockroaches

database

Records

Can absorb up to 6 programs

ners

Permanent subroutines, 1D6 damage to programs and 'run-

Carries 4 programs

actions

1D6 INT loss/ to Data Walls & programs, -4 to detect, 3

ners/progs

Seeks out & destroys users in a set area.

Carries 2 programs

Carries 4 programs

Carries 3 programs

Compresses programs to half size but reduces Speed by 1

Takes pictures to make virtual objects

Reconstructs les in the Trash buer

...

MU Cost(eb)Function

...

base.

round metallic base, who feeds programs into

'Tronnic humanoid upper body mounted in a

None.

inside a trash can and pulls out complete les.

Janitor program who ries through the pieces

sphere

of

light,

with

two

talline voice, and sucks the 'runner into it.

Swirling vortex that speaks in a high crys-

sickle and cloak made of outer space.

Classic Grim Reaper, complete with aming

pings.

...

BB

BB

BB

BB

Chr1

Chr3

....

all).

way into the database (when it's visible at

Dark depression/hole that slowly works it's

A cream pie.

across the face of the database.

Small cockroach-like image that multiplies

database.

Stylized porcupine-like shape that invades the

solves other icons.

fangs. Transforms into misty cloud that dis-

Figure in grey robes, with golden eyes, &

Generic cartoon thug.

blue eyes.

shiny chrome metal. Has large batlike wings,

CP20 Voluptuous, nude, hairless female, made from

SW

SW

orange

amused looking red eyes. Beeps, whistles, &

CP20 Small,

armor. Carries a red glowing energy blade.

CP20 Huge, male gure. Dressed in futuristic black

deep voice.

clothes, wears a fez and speaks in a formal,

CP20 Tall, powerful black man, dressed in evening

BB

Chr4

BB

...

From Icon

...

22/25

Instant Netrunning  Netrunning Softwares

3

3

2

4

3

2

6

4

Fait Accompli

False Echo

Gremlins

I Spy

Incubator

Pattel's Virus

Skivviss

4

4x3

Soulkiller 1.0

Trap!

6

5

4

8

4

3

...

CloakMore

Dazzler

Monitor

Panzer

Pocket VR

Too Many Doors

...

Systemware

5

Chimera

Ambushes

Str

Eavesdropper

...

Type / Name

...

200,000

500,000

100,000

1320

2200

760

400+

7000

380

570

1365

Records messages and conversation in

tected

3 Asp programs hidden in a le or node that attack if unde-

matrix

Drains target's intellect, etc (1D6 INT/turn) into a data

Invisible anti-demon. If undetected it gets a free turn to act

Inates project costs, so that they get cancelled

Weakens 1 type of ICE

Reproduces other programs

Commercial version of Eavesdropper

Produces more gremlins and randomly shoots o programs

Triggers false system alerts

Subtly messes up project les

system

Carries Databaser.

...

...

3

13

7

7

14

...

1000

13000

20000

950

14800

...

chosen

Gives 'runner a choice of doors, disconnected if wrong one

detect

Disguised VR "cell" with trace, di 15-25 Interface roll to

Monitor that does 1D6 damage to 'runners and programs

Roving internal Net security

detect

Disguised VR "cell" with trace, di 15-25 Interface roll to

5/cpu 4000/cpu Cloaks an entire data fort. Neutralizes 1 INT/CPU

NA

NA

4

7

7

6

6

7

6

7

6

...

MU Cost(eb)Function

...

...

BB

BB

BB

NET

Chr3

NET

BB

BB

BB

BB

BB

BB

BB

BB

BB

BB

BB

The vortex sucks the 'runner

Often cus-

These

....

cally, or wrongly.

"doors" can be unlabelled, labelled identi-

Junction of 3 or more access routes.

tecture or simple defence program.

Usually disguised as a piece of system archi-

tomised by in Corp data forts.

Big computer generated tank.

None.

tecture or simple defence program.

Usually disguised as a piece of system archi-

None.

Three Asps owing out of the le/node.

into it.

talline voice.

Swirling vortex that speaks in a high crys-

and choking gas at the target demon.

Fully animated chimera which breaths re

data.

act as a nder subroutine while corrupting

Bulbous chrome robot with four arms that

Swirl of hundreds of crystalline fragments.

other program always growing inside it.

Translucent pyramid with the nucleus of an-

Hollow mask with piercing light-beam eyes.

monkey wrenches.

Little green men running around carrying

'runner.

Shimmering "hologram" mirror image of the

a sinister smirk under the hood.

Cloaked and hooded man, with a glimmer of

None specic, it's supposed to blend in.

...

From Icon

...

Instant Netrunning  Netrunning Softwares

23/25

+1

+2

+3

+4

+4

+5

Data Wall 2.0

Wall of Static

Crystal Wall

Fire Wall

Reinforced Wall

Rock is Strong

4

+1

Endless Corridor

Encryp

variations

exist

(Brainware

...

tion

...

...

...

...

If you fail to get past it launches Psychodrome (STR 6)

Tighter coding makes them stronger, dierence easily noted

Requires two passwords. +3 di to crack second password

...

BB

BB

BB

BB

....

whatever your worst nightmare is.

Then it's

Upgraded Code Gates have a tight matrix wo-

going on and on and on.

The Gate looks like a corridor that just keeps

Keyhole that scans your Icon.

monplace (see Brainware Blowout).

CP20 Normal Code Gate, but variations are com-

ven into them.

Upgraded Data Walls have a tight matrix wo-

programming.

Normal Gate until it activates.

80000

Many

Uses a brainwave ID scanner. 3 Interface rolls needs to pass

Gates.

BB

Wall to bombard the 'runner with spheres of

Huge, brain-like image emerges from the Data

feedback.

at which the Wall will re a burst of neural

An aimpoint appears on the 'runner's Icon,

to attack the 'runner.

Data Walls that can sprout buzzsaw blades

the 'runner.

ven into them.

8

250,000

8000

20000

Code

Blowout)

1000/levelBasic

Tighter coding makes them stronger, dierence easily noted

BB

BB

BB

Mesh of laser light that reaches out to engulf

Looks like a standard Data Wall.

Looks like a standard Data Wall.

Huge stone wall.

Very sturdy looking concrete wall.

Wall of ame.

Crystalline wall.

fort.

Shifting wall of static surrounding the data

Picket fence.

Haunting Inquisi-

-

4

-

-

300,000

4D6 damage to 'runner (STR 6), goes inert after 3 rounds

2D6 damage to 'runner (STR 5), goes inert after 3 rounds

2D6 damage to 'runner (STR 3), goes inert after 3 rounds

BB

NET

NET

BB

BB

BB

BB

BB

BB

CP20 Standard Data Wall.

...

From Icon

...

through

8/6

5

Cortical Scanner

Break-

1-10

Code Gates

Code Gates

rier

-

44000

40000

36000

+1

-

-

-

Superior Net Bar-

Hellbolt,

+6/6

5

Wall of Ice

Spazz,

+5/5

4

Shotgun Wire

Stun,

+3/3

2-3

Razor Wire

34000

'runners,

1D6 damage to 'runner (STR 2), goes inert after 3 rounds

-

Attacks

Attacks Intrusion programs as Killer, +160eb/STR

+2/2

30000+

4800+

Flashy Data Wall. STR = CPUs+5

Flashy Data Wall. STR = CPUs+4

Flashy Data Wall. STR = CPUs+4

Flashy Data Wall. STR = CPUs+3

Flashy Data Wall. STR = CPUs+2

Flashy Data Wall. STR = CPUs+1

Laser Wire

-

-

5000

4000

4000

3000

2000

1000

1000/levelBasic Data Wall. STR = CPUs+0 to +9 (max 10)

...

+1000eb/STR

1-5

1-5

-

-

-

-

-

-

-

...

MU Cost(eb)Function

...

Wall

Anti-Personnel

Wall

Anti-Program

UpgradedDataWalls

1-10

Str

...

Data Wall

Data Walls

Type / Name

...

24/25

Instant Netrunning  Netrunning Softwares

7

6/4

1-10

3/5

Nerve Labyrinth

Shrouded Gate

Tutor

7

Succubus III

...

...

...

...

'runner

...

145000

Compiler (assassin to kill it), 1D6 physical damage to the

7

3

Converts 'runner to electronic entity, roll 1D10+4 for max

Compiler, carries 2 programs. 2D6 anti-personnel damage

Allows you to walk on the sides of the Olympia sidewalks

+1 to Net movement, -50% deck MU

Lunch Money™

NA

NA

NA

NA

INT

30

4

3

2+

Prog 15+. IDs Icon as either prog, 'runner, or AI

Construct

EmergencySelf-

4

3

SideWalker

Specials

2

NA

Alerts LDLs to presence of illegal calls

Rice Burner

2

NA

6

Rache's SeeYa

7

5

Pirate Uplink

270

Hold 4 programs like a Demon, but each program has full Attracts "Dog" programs from all over

4

1500

Up to 3 'runners can combine INT, REF, and Interface

4

2

5600

+4 to INT, +2 speed

Doubles remaining memory (MU-4), Speed=1

Adds 20% extra MU, Speed -1

(STR 5)

Easy to crack, but tags 'runner so that ICE can break link

Makes a Code Gate invisible. +1000eb/1 STR

(STR 4)

If you fail to get past it does 4D6 damage to the 'runner

Code Gate variant

Bone

6

7

4500

500

300

50000

3000+

50000

7000

...

strength

ICE-

9

6

4

3

NA

4

NA

-

...

MU Cost(eb)Function

...

breaker

Memorial

Rache Specials

Gestalt

Brain Buster

4

1

18-Wheeler

Enhancement

1

Trailer Hitch

Transportation

Str

Mazer

...

Type / Name

...

...

BB

BB

SW

NET

NET

NET

NET

NET

BB

I.3

I.3

NET

NET

BB

NET

BB

BB

shows

nothing sawtooth

....

the 'runner.

then gets an evil look in it's eyes and attacks

Super-realistic little girl that plays innocent,

later emerges.

the 'runner's Icon into it; if successful the Icon

Swirling vortex of blue lightning that sucks

anime girl.

busty, curvaceous, rendition of a red-headed

Very close variant on Spider Murphy's Icon, a

None.

Japanese-style racing motorcycle.

(human),

screen, wave

silver sine

wave (AI/Pseudo Int).

(program),

Shimmering

None.

Rubber dog Bone.

A non-Euclidean corkscrew.

telligence.

Whatever it wants, after all it is a super in-

diates an aura of great intellect.

User's head looks as it's steroids, and he ra-

icon on the sides of the trailer.

An 18-wheeler trailer with the Netrunner's

An open-topped, single-exit trailer.

which other ICE can yank.

Regular Code Gate that gives your Icon a tail

Invisible or disguised as a Data Wall.

'runner and squeeze his brain.

Green labyrinth that seems to draw in the

Looks like a maze.

...

From Icon

...

Instant Netrunning  Netrunning Softwares

25/25

Str

...

All system data is encrypted (STR 10 Gate), 1-2 hrs to de-

Circa 2013 interface. All 'runner Initiative rolls at -2

NA

100,000

Escher style data fort, -3 to 'runner Initiative until use to it

[email protected]

New collation by Gaby Wald + Amael Assour 07/09/2012.

Collated by Andrew James 25/11/98.

c R.Talsorian Games Inc. All rights reserved. Information

TesseractConstruction NA

300,000

10000

50000

INT 6 pseudo-AI, STR 5 attacks vs 'runners and programs

NA

NA

NA

code

10/5

NA

NA

...

Blood Cat

Encryp-

Rou-

...

MU Cost(eb)Function

...

tion

Bizzare

tines

Antiquated

SystemConstruction

Type / Name

...

BB

BB

BB

BB

and

sideways

constantly

walls at impossible angles.

down

up, changing,

Fort Fort's interior dees orientation,

and mouth.

Dead-black panther with glowing red eyes

None.

Older-style and more primitive Net imagery.

...

From Icon

...