tag:blogger.com,1999:blog-927317080828647442024-03-19T04:20:05.289+01:00SECTOR - 034Atemporal musings about rules and ideas on Cyberpunk 2020Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.comBlogger34125tag:blogger.com,1999:blog-92731708082864744.post-18046292316074291842020-04-14T23:38:00.003+02:002020-04-15T10:34:47.583+02:00Screamsheet nº4 Drones, part 1/3 ?Well, got the final push to begin working again on the screamsheets I had in the oven.<br />
<br />
<a href="https://drive.google.com/file/d/1dxQm9TiUAX8cn4TbfezkcM2rRMs3jgku/view?usp=sharing" target="_blank">Here goes Screamsheet nº 4</a><br />
<br />
Its the first on a few one that should extend on drones. First one is mainly rules on how to operate them, detect, interfere or whatever. Its mostly a recompilation of rules on the official books, but this way it gets in a more accessible place.<br />
<br />
And serves as a foundation for next screamsheets, so I don't have to tell what is a CCD or whatever.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm0s1MKRnjpL7Md0nDOAZX6M6EEMB5B-nSBLx-WqI0ssiZyyV5jOee8rFJV6NG3s2d75zhl7uk4rzme5pB7Yyd3ZuXDj2el9b-PV-mlgMrOujC_GPp2dZFicHwuKSSF7dVI4PxsN1ZHnw/s1600/scream4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="638" data-original-width="902" height="226" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm0s1MKRnjpL7Md0nDOAZX6M6EEMB5B-nSBLx-WqI0ssiZyyV5jOee8rFJV6NG3s2d75zhl7uk4rzme5pB7Yyd3ZuXDj2el9b-PV-mlgMrOujC_GPp2dZFicHwuKSSF7dVI4PxsN1ZHnw/s320/scream4.jpg" width="320" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com2tag:blogger.com,1999:blog-92731708082864744.post-65031059097001416262019-02-03T12:11:00.002+01:002019-02-03T16:33:17.525+01:00CharGen challenge for Cyberpunk 2020Sooooo ...<br />
<br />
R.Talsorian did this:<br />
<a href="https://rtalsoriangames.com/2019/01/31/chargen-challenge-1-cherry-bomb/">https://rtalsoriangames.com/2019/01/31/chargen-challenge-1-cherry-bomb/</a><br />
<br />
And as a response I made this:<br />
<a href="https://drive.google.com/file/d/1MhyTx6AfSiVjnYa1WpPL-xZ_7466teQt/view?usp=sharing">https://drive.google.com/file/d/1MhyTx6AfSiVjnYa1WpPL-xZ_7466teQt/view?usp=sharing</a><br />
<br />
I'm pretty sure that, as open as Cyberpunk 2020 can be, anyone posting his/her character version, will have some different creation rules (I mean, I didn't compute operation costs, nor did I sell the original eyes to a body bank, but everyone's referee mileage may vary).<br />
<br />
But it was fun ^_^ and somehow I enjoy making those "templates".<br />
<br />
Cherry Bomb "Drawing" was quite fun to do too ... as a little fun insight, she was made from a random internet photo I found:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1cwrfSKFkG8lsOE04WqjDl0z-yYBKxCcZH7VMVPlHKbBRhI8bZeDfgUI5tH4-gf6D2xvGjmzDD7dhU2dacfES9UFPgVgly8UpEzfhLfouMFHExOEzc5DZDjSY7jgx3XdlvDmFgWv6Ry4/s1600/baseimageCherry1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1146" data-original-width="920" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1cwrfSKFkG8lsOE04WqjDl0z-yYBKxCcZH7VMVPlHKbBRhI8bZeDfgUI5tH4-gf6D2xvGjmzDD7dhU2dacfES9UFPgVgly8UpEzfhLfouMFHExOEzc5DZDjSY7jgx3XdlvDmFgWv6Ry4/s200/baseimageCherry1.jpg" width="160" /></a></div>
<br />
Cleaned it ...<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLsEGk6W9Tkg_mmqVW9MNoCWF6YA2OdLTd6kZCDVAJtoGpE5ihP3NWyzfV_apISZ2lSH9yBWZ8WmvQYzC-ouO12EhLSx31s_2v_SjVAhzi6DjBWWq7wGRAh1kUX3iWR1jfhcm06r6PDHc/s1600/baseimageCherry.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="988" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLsEGk6W9Tkg_mmqVW9MNoCWF6YA2OdLTd6kZCDVAJtoGpE5ihP3NWyzfV_apISZ2lSH9yBWZ8WmvQYzC-ouO12EhLSx31s_2v_SjVAhzi6DjBWWq7wGRAh1kUX3iWR1jfhcm06r6PDHc/s200/baseimageCherry.jpg" width="123" /></a></div>
<br />
And then modified to my "liking" ...<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgYxbchBchhAX1MwscM6EaiMXOmJN1wlR91zun-AiKoAjw1tZU_xAhDDwL3EEwP2ecVxMWFKkxX57uijD6DHvuvl6WK5OEpKUtHf5HRNT2pulLrVXTRggLVmRHd8q5Xlg9qPFQGLFAaj0/s1600/baseimageCherry2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="988" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgYxbchBchhAX1MwscM6EaiMXOmJN1wlR91zun-AiKoAjw1tZU_xAhDDwL3EEwP2ecVxMWFKkxX57uijD6DHvuvl6WK5OEpKUtHf5HRNT2pulLrVXTRggLVmRHd8q5Xlg9qPFQGLFAaj0/s200/baseimageCherry2.jpg" width="123" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
Copy pasted some hair (and deformed it), a toy shotgun, some random vest and some sort of palestinian keffiyeh, and p'shopped the lights of a rally car into the face. Oh! And another girls smile.</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
Now it's time for B&W filters ...</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGjchOhCO8tdEYmiemns_KSSn44ah04CWPHt_g26GGe_ZYZ9WtHWApfARtsgcgQHg6FNbmz_zrIl2P8ebv1q3SG_NCX6aTGGh0BtzC29JkWqBOT0ZylJz-F98DB-cP3PMNMlTWKn75Ppw/s1600/baseimageCherry3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="988" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGjchOhCO8tdEYmiemns_KSSn44ah04CWPHt_g26GGe_ZYZ9WtHWApfARtsgcgQHg6FNbmz_zrIl2P8ebv1q3SG_NCX6aTGGh0BtzC29JkWqBOT0ZylJz-F98DB-cP3PMNMlTWKn75Ppw/s200/baseimageCherry3.jpg" width="123" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
And finally the manual work of adding lines and more details.</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi8ftY5PmWbGq3tn3ZiXsy3yynMoVuOPwcnof4JAtvQ0ZAGQzfoj5Oaao1XRSS8HMKA94r6sGY5_7BDZxpdUWxYTXgRQWrTWKgPHyDP36o5eroiaqKgr_CJ6c_-Z-O9SQNIZP0AWWaRFc/s1600/baseimageCherry4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1084" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi8ftY5PmWbGq3tn3ZiXsy3yynMoVuOPwcnof4JAtvQ0ZAGQzfoj5Oaao1XRSS8HMKA94r6sGY5_7BDZxpdUWxYTXgRQWrTWKgPHyDP36o5eroiaqKgr_CJ6c_-Z-O9SQNIZP0AWWaRFc/s400/baseimageCherry4.jpg" width="270" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
And that's all.</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-19455333994233459542019-02-03T11:53:00.000+01:002019-02-03T11:53:44.129+01:00Exoskeleton, Exosuit, Linear frame ... so many names for one thing. New Screamsheet 003So here goes a polished version of a previous entry of mine, this time in the Screamsheet format.<br />
<br />
Number 3 is here! Only 5ed! :P<br />
<br />
<a href="https://drive.google.com/file/d/1KKIXujIaXXhTdqfEfaaAYeqYfg7eWbD8/view?usp=sharing">https://drive.google.com/file/d/1KKIXujIaXXhTdqfEfaaAYeqYfg7eWbD8/view?usp=sharing</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimi9XjHe1qbyh6F1x5rt2rbTcD41tkMFJrirmZNc8sYZqlL1fJVPQiN9AjdV7ccSvvlHH-tSZ1lRB7QiGxVmatZnPI-ed_-8u6byfx0b0qrUQvdjsGbl35HgolnXBHRkqqSXou1VZeY0M/s1600/screamsheet003.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="855" data-original-width="602" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimi9XjHe1qbyh6F1x5rt2rbTcD41tkMFJrirmZNc8sYZqlL1fJVPQiN9AjdV7ccSvvlHH-tSZ1lRB7QiGxVmatZnPI-ed_-8u6byfx0b0qrUQvdjsGbl35HgolnXBHRkqqSXou1VZeY0M/s320/screamsheet003.PNG" width="225" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-38053643231619624722019-01-25T00:17:00.000+01:002019-02-03T11:49:22.546+01:00Mobile hackingI already made a post about this, but thought to make it into a screamsheet too.<br />
<br />
<a href="https://drive.google.com/file/d/1tYZP6WCejCjrzJ-2RnmUtsYzxVpPX8Xa/view?usp=sharing">https://drive.google.com/file/d/1tYZP6WCejCjrzJ-2RnmUtsYzxVpPX8Xa/view?usp=sharing</a><br />
<br />
Have fun :P<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf9vpSGPZK_8sf_bWtV-DSf3vc65nDu6L0515OSQ_MrzuHOel-opG7ONGPjsA-o36a1nm-x_FRTXQt7dZp3mmK3f7iOMRUJf7QcgK1tLDoL6PsZsyCqgeSb5IdCZjYO29TvLQtZvn_Ajw/s1600/screamsheet002.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="850" data-original-width="597" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf9vpSGPZK_8sf_bWtV-DSf3vc65nDu6L0515OSQ_MrzuHOel-opG7ONGPjsA-o36a1nm-x_FRTXQt7dZp3mmK3f7iOMRUJf7QcgK1tLDoL6PsZsyCqgeSb5IdCZjYO29TvLQtZvn_Ajw/s320/screamsheet002.PNG" width="224" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-13883883544907494462019-01-21T23:32:00.003+01:002019-02-03T11:49:13.441+01:00New vehicle enter the sceneWith the new BTU from Arasaka you can drive and walk around showing your prowess. But don't get attacked form the back, as the trooper is quite exposed :P<br />
<br />
The idea of this BTU is to be able to mount it as fast as a bike, but be able to carry PA armament around, and even participate in "limited" persecution.<br />
<br />
Anyway, here's the link:<br />
<a href="https://drive.google.com/file/d/1ygPfoeFyDEwHbRgbsYjo6m1GML8UbhtJ/view?usp=sharing">https://drive.google.com/file/d/1ygPfoeFyDEwHbRgbsYjo6m1GML8UbhtJ/view?usp=sharing</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuNHueDyIAzddikrZLpqzu1uUM4uO8QdjMx3CxFxD73O6l8b-IaIjpnJ0RArX3J2Icxv2OOIVLjBkgSi4_0lMVoR8IvNTj827_lvTWXs9dwsd3WtE8x9QQy-64wmE1JVBVBLFAAdQl-D8/s1600/screamsheet001.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="853" data-original-width="602" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuNHueDyIAzddikrZLpqzu1uUM4uO8QdjMx3CxFxD73O6l8b-IaIjpnJ0RArX3J2Icxv2OOIVLjBkgSi4_0lMVoR8IvNTj827_lvTWXs9dwsd3WtE8x9QQy-64wmE1JVBVBLFAAdQl-D8/s320/screamsheet001.PNG" width="225" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-52769895840257185732018-09-20T20:26:00.002+02:002019-02-03T11:49:57.905+01:00A new Datafortress exampleI made this map to illustrate one of the Datafortress I have in my game notes.<br />
<br />
A way to illustrate in a "real" example on how a map will look:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://dimuscul.clon01.net/uploads/uploads/DataFortress200918.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="663" data-original-width="800" height="265" src="https://dimuscul.clon01.net/uploads/uploads/DataFortress200918.jpg" width="320" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com3tag:blogger.com,1999:blog-92731708082864744.post-28845891108204136832018-07-12T00:00:00.002+02:002018-07-12T00:01:52.557+02:00After the 2077 reveal ...Well, it seems the reveal of Cyberpunk 2077 have been stirring quite a lot of movement on forums and reddits where peace and tranquility was the norm.<br />
<br />
I appreciate that.<br />
<br />
Which also makes me want to write more again on this blog. Not that I never stopped thinking/playing with the Cyberpunk 2020 ruleset, but time is severely constrained and having a little of it to post here was a bit of a pain.<br />
<br />
But well, what can I say ... I'm human and get hyped too ;D<br />
<br />
First things first, I will try to update my mini-site with my latest house rules:<br />
<a href="http://dimuscul.clon01.net/">http://dimuscul.clon01.net/</a><br />
<br />
I mean, I already have them, the problem is that they are in Spanish and need to translate them.<br />
<br />
Also, I my try to post about Netrunning, which is a recurrent thing on me (if you haven't noticed already) as I like it and a been toying a bit on posting on different "stations" and stuff. maybe I will post that on reddit first and see if it get any commentaries before posting it here.<br />
<br />
<i>PD: Two fucking years since last post, my goodness.</i><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://i.pinimg.com/originals/f6/6a/02/f66a023d5f439a4992b97b6e63d00b66.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="337" data-original-width="600" height="223" src="https://i.pinimg.com/originals/f6/6a/02/f66a023d5f439a4992b97b6e63d00b66.gif" width="400" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-88046037066829067672016-12-11T14:01:00.001+01:002016-12-11T14:01:19.946+01:00Watchdogs 2 and Netrunners<p dir="ltr">Its been a while since last post ... I still have various pending things I want to tackle off.</p>
<p dir="ltr">New equipment ripped from our daily lives (3D printers, drones, wireless connections, etc).</p>
<p dir="ltr">Quick start rules.</p>
<p dir="ltr">Quick character generation.</p>
<p dir="ltr">Crafting rules for cyberdecks and other gadgets.</p>
<p dir="ltr">But today ... what moved me to write was the new Watcgdogs 2. I'm still early in the game, but I already feel like a netrunner hacking around.</p>
<p dir="ltr">The game seems to have quite a few tricks more into it's sleeve. I love the one direction car remote control ...</p>
<p dir="ltr">In one mission I had to steal a car, but the place was crawling with cops. I cleared the zone launching the cop cars into the road, and took the oportunity to steal the car while cops were running around confused.</p>
<p dir="ltr">Priceless.</p>
<p dir="ltr">So later I will try to translate as much as I can from the game into Cyberpunk.</p>
Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-59052622129999980282016-07-08T18:06:00.001+02:002016-07-08T18:06:26.965+02:00Customizing the charactersI've been brainstorming on a way to do Advantages/Disadvantages or feats or somewhat of that style.<br />
<br />
My reasoning is simple ... I want characters to be more unique. For all the things that d20 does wrong, I like the "Feats" concept, in which you can make two identical warriors completely different with their feat list.<br />
<br />
Other games does the same with perks or advantages you can chose on the character creation, giving him a special flavor. Which I don't always like because ... that kind of advantages usually can only be acquired during character creation, eliminating some kind of in-game progress.<br />
<br />
Luckily - between implants and equipment - Cyberpunk gives plenty of options for customizing your character and make it stand from others. But when you play regularly with "strangers" in public games (or forum play) ... well, characters begin to resemble more and more (mechanically), as they go for the obvious/cliche choices.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://s-media-cache-ak0.pinimg.com/236x/56/b3/1d/56b31d67ff6e142ccfbed598f51e92c3.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://s-media-cache-ak0.pinimg.com/236x/56/b3/1d/56b31d67ff6e142ccfbed598f51e92c3.jpg" /></a></div>
However Advantages/Disadvantages have their own problems ... too often they are a simple collection of numbers that only serve to min/max character sheets without really adding any flavor to it.<br />
<br />
The tough character is going to make himself tougher, the faster one will accumulate as many initiative modifiers as he can, etc, etc.<br />
<br />
Also, a lot of players tend to chose disadvantages carefully, exploiting and planing on making the minor impact possible for the game.<br />
<br />
So ... disadvantages? I think I would discard them. Your netrunner lost the leg in a gruesome accident? You're free to do it. Just don't expect something in return.<br />
<br />
That leaves me with some sort of advantage/trait system to work with. Maybe something limited like "<i>two traits perks per character</i>".<br />
<br />
But I wouldn't like those traits becoming simple numerical bonuses to skills ... they should be a little more complex and colorful. Numerical advantages tend to be forgotten during play unless a player min/max them unbalancing games.<br />
<br />
<i>So ... if you want a greater initiative, put more points into reflexes and buy some boostware, if you want to be a though guy, boost your BOD.</i><br />
<br />
Which make those perks/advantages/traits harder to make :P<br />
<br />
So far I failed to make a good list. They always end on the short side ... or uninspired. And, to be fair, if those perks aren't really "game changing" it's a bit of a dumb decision to add complexity to the game for the sake of doing it.<br />
<br />
They have to be good enough to justify adding them ...<br />
<br />
So, for now, I will continue to circle the idea like a vulture watching it's prey.Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-73662213676708586022015-04-04T01:47:00.001+02:002016-07-08T17:42:17.542+02:00Creating an NPC repositoryOne of the things I would like to do is a PDF with a recollection of NPC for quick characters in a game or during it's preparation.<br />
<br />
The idea comes from the Eclipse Phase NPC supplement which has saved me from more of one headache.<br />
<br />
For Cyberpunk I could rely on the quick NPC generation from the core rulebook but it make random characters without any logic. And it doesn't even use any of the info on the splatbooks.<br />
<br />
My template would be this:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1Y3DeZfi-ur-qesMi203MBxLtXMNVS6L9Fisklzc63hAeFgHhjHwhaiGAUreBFnmwWQ0Pqx_R36VbjSX8EdwQ1JiRf22SNRwL2-bL-9tzGlNVpxl8uJGW-C36TKvuz8afCtDu6zYPyU4/s1600/NPC_sheet.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="290" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1Y3DeZfi-ur-qesMi203MBxLtXMNVS6L9Fisklzc63hAeFgHhjHwhaiGAUreBFnmwWQ0Pqx_R36VbjSX8EdwQ1JiRf22SNRwL2-bL-9tzGlNVpxl8uJGW-C36TKvuz8afCtDu6zYPyU4/s1600/NPC_sheet.jpg" width="400" /></a></div>
<br />
And an example of a quick NPC would be like this:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2MtWd6Wg91GU8TUqpYV0_MMwysO4HGFO_qGZ3VgnR771yz_RFMlmFaqDWeMuVm-W6XqXb3jpOk1yM9JdpDnEB_6lWXTdpFcUtFwwT5orECJLmW-zauYM_1jbrZFNe_lWL8VCBJFVRLeU/s1600/NPC_demo01.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="291" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2MtWd6Wg91GU8TUqpYV0_MMwysO4HGFO_qGZ3VgnR771yz_RFMlmFaqDWeMuVm-W6XqXb3jpOk1yM9JdpDnEB_6lWXTdpFcUtFwwT5orECJLmW-zauYM_1jbrZFNe_lWL8VCBJFVRLeU/s1600/NPC_demo01.jpg" width="400" /></a></div>
<br />
Ideally I should make various levels of characters ... low level mobs, average opponents/allies, expert ones, etc. ... it's a lot of work, but well. It ain't gonna make itself, right?<br />
<br />
Let's see if I have time to do it.<br />
<br />
Edit: <i>One year later ... no, I did not have the time :D that's life for you :P</i>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-71946392647597749802015-04-03T18:35:00.002+02:002015-04-03T22:55:14.659+02:00Anatomy of a Datafortress<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwKjvz_k_LoHtrUQVOJazro-0VadqodkQRawFjfy0p3Q9r0-p2otB_7W6Q9NdE2poAg4-jrKn_o6ycr1QPy1NPpB3dTWcr5v-7TeEDwhAvuA2zCbLdy4o7eaqnl7u1Rz6gnz4a2PKpXsg/s1600/fons_netrunning01.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwKjvz_k_LoHtrUQVOJazro-0VadqodkQRawFjfy0p3Q9r0-p2otB_7W6Q9NdE2poAg4-jrKn_o6ycr1QPy1NPpB3dTWcr5v-7TeEDwhAvuA2zCbLdy4o7eaqnl7u1Rz6gnz4a2PKpXsg/s1600/fons_netrunning01.jpg" height="170" width="320" /></a><i>You're connected to a datafortress, searching for the financial archives of a small corporation hoping to find something to extort them for. But there's nothing here, only terminal, door and camera links. "Whats wrong?" you ask yourself as you patrol the virtual space within the fortress.</i><br />
<i><br /></i>
<i>A new data wall rises in front of you, it's security clearance higher than before. As you crack it, the virtual sound of an alarm resounds in your ears. "My program didn't trigger it, I'm sure" you wonder as you hurry to pass the wall an reach the other side.</i><br />
<i><br /></i>
<i>"One LDL?" is the only think you're have time to think while you jump into it, you don't have time to wonder while the bloodhounds run toward you.</i><br />
<br />
<b><u>The basics</u></b><br />
<br />
The typical thing a netrunner do is stealing data from a datafortress, but which kind of data and how do they find it?<br />
<br />
Information is stored on databases, folders and files in the system. Those are typically represented as memory blocks which represent local data. But some data is saved on the "cloud", basically an external system usually maintained by another corp.<br />
<br />
To access external data you have to enter a protected LDL icon (with a standard Code Gate opener), which will send you to another datafortress with new security measures. Take into account that cloud services boast about their security measures, so expect extreme brute force if they detect your illicit access to their system.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbrdTkQt-1tcSIXLTMPp923vugH86SQRZZr_P9M76kYG5Tzii2CvVNc_CltRLl0gP61DaXs8hiseTe4vNC5ChOzdlcyYb7WnA-YXXy52Hl9pfq8Nqw9ZAjvgyAlBpe7AuKj1wLqMBzgiQ/s1600/cloud+database.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbrdTkQt-1tcSIXLTMPp923vugH86SQRZZr_P9M76kYG5Tzii2CvVNc_CltRLl0gP61DaXs8hiseTe4vNC5ChOzdlcyYb7WnA-YXXy52Hl9pfq8Nqw9ZAjvgyAlBpe7AuKj1wLqMBzgiQ/s1600/cloud+database.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<i>What's in a typical Cloud Memory Unit (CMU)?</i> Boring stuff mainly. Work databases, operations documentation, personal info, provider/client databases, personnel calendars, etc.<br />
<br />
<i>What's in a local memory Unit (MU)?</i> The same stuff as a CMU (if the datafortress doesn't use cloud services) and meaningless stuff like power point presentations, internal messages, local info or images ... and the good stuff, the one that's so black that you wouldn't entrust external corporations to manage it.<br />
<br />
<b><u>Bigger is better</u></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv43umROhLHwgE2-bQjbkVlgjIh70qRKf-2KKLieceip6QQtil-QyrqgI1Ym_nVDqbvSCs-XjmVm8lVwcysXCnGgpF3KAo_tzJObRkyP_Gw9QK4sk_h1w7Sc9QROTFflilwft_UsVgn_U/s1600/servershardsphoto.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv43umROhLHwgE2-bQjbkVlgjIh70qRKf-2KKLieceip6QQtil-QyrqgI1Ym_nVDqbvSCs-XjmVm8lVwcysXCnGgpF3KAo_tzJObRkyP_Gw9QK4sk_h1w7Sc9QROTFflilwft_UsVgn_U/s1600/servershardsphoto.jpg" height="320" width="267" /></a></div>
The previous schematic is for a single shard server. The one you would find on small enterprises, lone buildings or similar.<br />
<br />
Single shard? You must be asking yourself. Well ... when things grow up, a single server isn't enough to control everything. Nor is it even desirable. If your factory machines aren't working as expected, you don't want to reboot security cameras, doors or international operations.<br />
<br />
So you connect multiple servers (called shards) and divide the workload between them. Now, if your factory is having problems with the machinery, you don't need to unplug the security systems.<br />
<br />
And now every shard has it's own defenses.<br />
<br />
<i>Yes, that's more work for you. Aren't you happy?</i><br />
<br />
What does this mean? It basically means that now you have to defeat various data walls to reach the destination you want. You first break into the login/net server which only contains minimal operational MUs and then search for a shard index and try to breach it's security.<br />
<br />
You want access to cameras and doors? That's a shard.<br />
You want access to machinery? That's another shard.<br />
You want access to terminals and accounting MUs? Guess it. Yes, another shard.<br />
<br />
Every one of them has it's own data walls, code gates and probably, a sysop.<br />
<br />
Additionally, some shard are only accessible once you have connected to a specific shard. For example, if you want access to the black ops file, you will need to hack into the initial login shard, then the management shard and then to the internal security shard.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJLgBBsWO6l83xOCxNv3Dx2if1jngOpL2kCVa9030fwCIejXcC4-iE6NGjRfOAeHV0DmxnRYrzBpBGikQnIe29Mpr2_imEm9Cpv8mmHOecaEcGiNtMEO_89YM8qjm0Kg6H8nQiFE0oUzc/s1600/shards_demo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJLgBBsWO6l83xOCxNv3Dx2if1jngOpL2kCVa9030fwCIejXcC4-iE6NGjRfOAeHV0DmxnRYrzBpBGikQnIe29Mpr2_imEm9Cpv8mmHOecaEcGiNtMEO_89YM8qjm0Kg6H8nQiFE0oUzc/s1600/shards_demo.jpg" /></a></div>
<br />
<b><u>Who runs it?</u></b><br />
<br />
A lot of datafortress have enough CPU to be managed by AI.<br />
<br />
But you won't find a lot of them managing sites anyway. Why? Because AI are predictable, reprogrammable and exploitable. They do not learn or react as a humans (you don't really want an AGI wandering freely) and they do not spawn spontaneously ... which mean you must pay someone to create them.<br />
<br />
And when someone find a way to exploit one, the news spread fast between the netrunners hubs.<br />
<br />
It's easier, cheaper and more reliable to use human sysops to monitor the system. True, those can be bargained, extorted or even bribed ... but don't expect it. And if the sysop is fried, you don't have to pay his salary.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBdY8Nc4nlrOhVGTTU68NVKvRaQIlMv6sEj3RuVuSRkcxcgD3_Redp8fh9RoymC_wh8Bu1fSq6Y1v6TFKOwvf2KWdE6UICtO9_uG-NyL4aSVPxWSO4KrkORv3Cqg74_BDcIuTHHtWbGYY/s1600/gits_datasystem.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBdY8Nc4nlrOhVGTTU68NVKvRaQIlMv6sEj3RuVuSRkcxcgD3_Redp8fh9RoymC_wh8Bu1fSq6Y1v6TFKOwvf2KWdE6UICtO9_uG-NyL4aSVPxWSO4KrkORv3Cqg74_BDcIuTHHtWbGYY/s1600/gits_datasystem.jpg" height="224" width="320" /></a>If a sysop is working locally, they will use the mainframe as their terminal to administrate the datafortress. Which means multiple actions and amazingly fast programs. Also, it means you know exactly where they are on the building and someone can "unplug" them in the real world.<br />
<br />
If not, they will use their own cyberdecks and work as a netrunner would.<br />
<br />
<i>And that's all.</i><br />
<i><br /></i>
<i>Try not to die the next time you assault a multiple shard datafortress with multiple cloud services and a mix of black ice ;)</i><br />
<i><br /></i>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-9494181929701525652015-04-02T14:11:00.000+02:002015-04-02T14:59:57.984+02:00Netrunning small revisionWhile my initial intention was to use the rules as they come in the basic manual for my latest forum games. I've finally decided to make some small adjustments and clarifications for my players to better suit my preferences.<br />
<br />
<a href="https://s-media-cache-ak0.pinimg.com/736x/bd/53/8c/bd538cfaf902e0037045c21e7c391329.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="https://s-media-cache-ak0.pinimg.com/736x/bd/53/8c/bd538cfaf902e0037045c21e7c391329.jpg" width="281" /></a><b><u>Step 1: Preparing for the run</u></b><br />
<br />
The first thing you need is a cyberterminal and some programs. If you miss one or both, you will not reach very far.<br />
<br />
When you turn on the terminal and prepare to surf the net, the first thing you'll find is a virtual room off your own terminal. Here you can run your programs locally and specify the name/appearance you'll have once you're inside the net.<br />
<br />
<b><u>Step 2: Traveling on the global network</u></b><br />
<br />
If you are already connected directly to the target network, you can skip this step.<br />
<br />
To travel around the world you have to go through a number of main nodes/proxies. Those are usually in major cities and are often in freely available public lists. However, each node keeps track of your path through the network to inform any tracking program where you come from.<br />
<br />
If you want to avoid leaving a trace around the net (that correspond with your real world position, remember I-G algorithms) you have to bypass their security protocols. It's not a very difficult thing to do, but as you reroute signals and stack fake IDs, it slows down your connection.<br />
<br />
Each node has a value of "trace" and one of "security" (as always). The former adds to the difficulty of tracking you, the sum of the second divided by two is a penalty of your initiative rolls.<br />
<br />
<i>Ex .: If you pass by Night City, Los Angeles, Mexico City, Panama City and City of Bogotá, you'll have a trace value of 13 and a -4 penalty to initiative (7 divided by 2).</i><br />
<br />
<div style="text-align: center;">
<a href="https://drive.google.com/file/d/0B3zNtN9gLCdCWnpBM1N5RjlXdk0/edit">-List of Nodes/Proxies-</a></div>
<br />
<br />
<b><u>Step 3: Infiltration</u></b><br />
<br />
Once you've reached your goal, you must get into the data fortress and execute your malware ... of which there are plenty.<br />
<br />
While you're out of it inoffensively, the system will ignore you. But the moment you start an attack, the system will defend against you (or will send the sysop a notice of your presence). It will be time to throw initiatives and move by turns ... you'll better have Stealth programs to hide or you will understand why runners fear black ice.<br />
<br />
<div style="text-align: center;">
<a href="https://drive.google.com/file/d/0B3zNtN9gLCdCSExJb09ZOVdoTnc/view?usp=sharing">-List of Programs-</a></div>
<br />
Typical checks on the net are:<br />
<br />
<table align="center" style="width: 90%px;">
<tbody>
<tr><td><b>Initiative</b>: REF + speed + 1d10 terminal.</td><td></td></tr>
<tr><td><b>Stealth and evasion</b>: 1d10 + prog. STR </td><td><b>Difficulty</b>: 6 + Detection prog. STR.</td></tr>
<tr><td><b>Anti-system attacks</b>: 1d10 + prog. STR </td><td><b>Difficulty</b>: 6 + Data Wall or Code Gate STR.</td></tr>
<tr><td><b>Anti-personnel attacks</b>: 1d10 + prog. STR + INT + Interface. </td><td><b>Difficulty</b>: 6 + prog. STR + INT + Interface.</td></tr>
<tr><td><b>Anti-software attacks</b>: 1d10 + prog. STR + INT + Interface. </td><td><b>Difficulty</b>: 6 + prog. STR + INT + Interface.</td></tr>
<tr><td><b>Drivers and utilities</b>: 1d10 + prog. STR </td><td><b>Difficulty</b>: 6 + Data Wall STR.</td></tr>
</tbody></table>
<br />
<a href="https://s-media-cache-ak0.pinimg.com/736x/46/61/03/466103762ef345f89efad2bf72168bdf.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="https://s-media-cache-ak0.pinimg.com/736x/46/61/03/466103762ef345f89efad2bf72168bdf.jpg" width="225" /></a>The STR refers to the strength of the attacking or defending program. If for example you want to hide, you'll need to use programs to mask your signal or hide your ID and beat the system detection programs (like the Dog series).<br />
<br />
If the opponent (either an AI or sysop) is aware of your presence, it can attack you freely. If not it will have to locate you first even if your are running mayhem in their system ... or in a desperate act, they can cut external communications or reboot the system.<br />
<br />
To be able to FIND, READ, EDIT, COPY and DELETE data from a data fortress, you first have to overcome their defenses (Data Walls or Code Gates) with appropriate anti-system programs (such as Drill). If you leave the fort and the administrator becomes aware of the security breach, they will be restored.<br />
<br />
<b><u><br />Step 4: Exit</u></b><br />
<br />
Once you've finished with your work, you just have to leave to other areas of the net or disconnect (with a roll of 8 or more with a d10).<br />
<br />
<br />
<u><b>Notes</b>:</u><br />
<br />
If you have broken through a data fortress Data Walls or Code Gates, you do not need a test to control remote computer (but you still need the program!).<br />
<br />
Without programs you cannot manipulate the net, but you can still browse it, manually interact with Code Gates and access unprotected memory blocks. If you know someone you my try to acquire programs from them or reach Netrunner hubs in the search of a kind soul.<br />
<br />
Also, keep in mind that most of Datafortress have public zones where it is not necessary to make a raid to access it. In them you can typically find all kinds of contact information, products or organize meetings.Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-92218921599888151652014-11-24T17:36:00.000+01:002015-04-02T12:16:42.705+02:00<a href="http://media-cache-ak0.pinimg.com/736x/c6/ae/32/c6ae32e8a033300669522260b221c4a5.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://media-cache-ak0.pinimg.com/736x/c6/ae/32/c6ae32e8a033300669522260b221c4a5.jpg" height="400" width="278" /></a>Following the current trend in futuristic military gadgets, I've been wondering on the adaptation of a lighter, cheaper alternative to ACPA ... or more precisely, the Linear Frames (or Exo suits).<br />
<br />
<br />
Sigma Linear Frame : STR 12, Dam. Mod. +4, Lift 600, Carry 180, Weight 125, Cost 5000eb<br />
Reflex/Control systems: Advanced (Max Ref 10), No Mart. Arts<br />
Armored cover for the system: CP 20, Cost 500eb<br />
Trooper size: 114kg (Standard issue)<br />
SIB: +2<br />
SDP: 12<br />
----<br />
Final cost: 4950eb<br />
<br />
What we have here is a cheap linear frame that boost soldier competence, speed and movement. Even more a Linear frame is slightly more comfortable than enclosing oneself inside a chassis for long hours.<br />
<br />
Remember tho, that when someone shoots a Sigma user, 20% of bullets will impact the suit. When the suit reaches half its SDP there is a 40% chance of breakdown. Plus +10% for every new hit after that.<br />
<br />
Also, the control system requires interface plugs with the Vehicle link.<br />
<br />
-------<br />
<br />
If you are wondering why a soldier would want to use something that relatively fragile and weak compared to a low tier ACPA, the answer is simple. He doesn't choose to.<br />
<br />
Militech Commando costs 108.306eb<br />
Arasaka Standard B costs 89.050eb<br />
<br />
You can equip 20 soldiers with exo suits for the cost of a simple Militech Commando. Even more ... with a quarter it's weight, they can outflank their opponents more easily and take better positions. Also, they're easier to transport and maintain.<br />
<br />
And less intimidating to the average corp. citizen.<br />
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com2tag:blogger.com,1999:blog-92731708082864744.post-44362035984373707252014-06-15T09:27:00.002+02:002014-06-15T09:28:42.211+02:00Well ... I have begun a website to try to recap my house rules so it's easier for me to reference them later (as a lot of my games are done on play-by-post forums).<br />
<br />
Let's hope I manage to do something with the tiny spare time I have.<br />
<br />
<a href="http://dimuscul.clon01.net/">dimuscul.clon01.net</a><br />
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-44615532421675831932014-06-02T18:45:00.001+02:002014-06-02T18:46:14.301+02:00This one is about netrunning and long distance links.<br />
<br />
While it wasn't apparent years ago when the rules were created, the thing is that travelling around the net in the search of info and social media isn't more costly than keeping on your local area. After all we aren't exactly using modems of old calling to specific numbers around the world.<br />
<br />
So we can simply ditch the LDL rules about costing money ... but we still need tracing values.<br />
<br />
My take on the issue (which I've been mumbling about for a while) is the following.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://fc07.deviantart.net/fs70/i/2014/034/9/8/netrunner___the_hours_tick_by_by_macarious-d74y6pg.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://fc07.deviantart.net/fs70/i/2014/034/9/8/netrunner___the_hours_tick_by_by_macarious-d74y6pg.jpg" height="302" width="320" /></a></div>
Each Node (or LDL) is considered a Proxy who transmits data to the rest of the world. Proxies can limit incoming data so countries can ban certain sites/zones (like social media during revolts, or other political sensible content).<br />
<br />
The problem is that proxies tend to log every visit ... and usually, netrunners don't want to be traced.<br />
<br />
Each times a netrunner pass through a proxy without being logged on, he adds half the security value as a penalizer to his Initiative. So if he goes through:<br />
<br />
<ul>
<li>Night City (T2 S2)</li>
<li>Los Angeles (T2 S2)</li>
<li>Mexico City (T2 S1)</li>
<li>Panama City (T3 S1)</li>
<li>Bogota City (T4 S1)</li>
</ul>
<div>
He would accumulate a trace value of 13 and a security value of 7 (-3 to Initiative).</div>
<div>
<br /></div>
<div>
Of course, you can buy a prepaid SIM card (10 to 30 credits) for your cyberdeck and throw it after the run making sure no one knows who you are. Just remember, if someone trace you - thanks to I-G algorithms - they know where you are in the Real Space.</div>
<div>
<br /></div>
<div>
So ... try to hack from a secure/anonymous place, will you?.</div>
<div>
</div>
Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-88948509912338403362014-06-02T16:10:00.001+02:002014-06-02T17:01:00.062+02:00We have started playing the <i>Land of the Free</i> module for <i>Cyberpunk </i>with my game group. It all begun as a forum game but quickly developed to real world sessions as we finished our <i>Edge of the Empire</i> introductory module.<br />
<div>
<br /></div>
<div>
The first part, Adriana extraction, was smooth ... maybe to smooth (thanks to the Netrunner). After the game I thought of a dozen ways to spice up that session but, alas, it was too late. I been out of "real space" DMing for quite a long time and I find myself a bit rusty doing it.</div>
<div>
<br /></div>
<div>
But anyways, I've returned to directing Cyberpunk 2020 and that's what matters.</div>
<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://videogamewriters.com/wp-content/uploads/2012/06/Watch-Dogs-Logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://videogamewriters.com/wp-content/uploads/2012/06/Watch-Dogs-Logo.png" height="88" width="320" /></a></div>
<div>
<br /></div>
<div>
At the same time, Watch Dogs have been released and I have been having some fun with it ... one of the main tools the protagonist (Aiden Pearce) uses is a mobile phone which he uses to hack remote operated machines.</div>
<div>
<br /></div>
<div>
I been thinking if it was possible to do the same in Cyberpunk ... yes, it can be done. </div>
<div>
<br /></div>
<div>
Let's take a look into it, but take into account that those rules are not mine, most of them comes from <i>Rache Bartmoss Guide to the Net</i>.</div>
<div>
<br /></div>
<div>
First, you need to program a new interface since you won't use normal I-G algorithms (<i>Very difficult</i> task on <i>Programming </i>skill or <i>Difficult </i>task on <i>Expert:Complex Computer Language</i>). Or modify standard modem routines to handle cyberdeck programs (Difficult or Average task, same skills).</div>
<div>
<br /></div>
<div>
Alternatively, someone else can do it for you for a 150-200 credits fee.</div>
<div>
<br /></div>
<div>
As we don't plan to netrun with a little pocket PC, we don't need to make further change to it's programs or interface. Which means we are ready to go and wreak some havoc.</div>
<div>
<br /></div>
<div>
Heres a completely illegal piece of hardware already rigged for remote controlling:</div>
<div>
<ul>
<li>Zetatech "E-Book" Microcomp (1CPU, 1INT, 12 MU with a 15.4cmx7.6cmx1.3cm size) 100cr</li>
<li>Cellular upgrade (similar to the Cybermodem Interface) +500cr</li>
<li>Custom netrunning interface +200cr</li>
</ul>
</div>
<div>
<ul>
<li>Crystal ball (4STR, 1MU) 140cr</li>
<li>Dee-2 (3STR, 1MU) 130cr</li>
<li>Genie (5STR, 1MU) 150cr</li>
<li>Hotwire (3STR, 1MU) 130cr</li>
<li>News at 8 (4STR, 1MU) 140cr</li>
<li>Soundmachine (4STR, 1MU) 140cr</li>
<li>Terminator (4STR, 2MU) 260cr</li>
<li>Phone Home (2/5STR, 1UM)150cr</li>
</ul>
</div>
<div>
Which amounts to 2040cr ... but remember, its illegal, so the price should be more like 4000cr</div>
<div>
<br /></div>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.vgtimes.ru/uploads/gallery/comthumb/135402/watch-dogs-clara-lille-3.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://www.vgtimes.ru/uploads/gallery/comthumb/135402/watch-dogs-clara-lille-3.jpg" height="320" width="259" /></a></div>
And voila! Ready to hack some remotes.</div>
<div>
<br /></div>
<div>
It's debatable if PDA and Microcomps should already have cellular SIMs and ports. When Cyberpunk was created the FAX was the tool of the future ... but they have become little more than a gimmick while most people simply send e-mail/documentation from his portable smartphone or paper thin tabletops with more processing power than old mainframes and access to cloud databases that extend far and beyond.</div>
<div>
<br /></div>
<div>
Even the pay per time travelled on the net and it's LDC seem obsolete in the face of the networks and competing corps trying to offer the best and cheapest way to connect around the world.</div>
<div>
<br /></div>
<div>
So our generic Zetatech clone smartphone (1CPU, 1INT, 10MU) should cost around 200 or 300 credits, while the top of the line models (1CPU, 2INT, 20MU) should be around 500 or 600 cr.</div>
<div>
<br /></div>
<div>
Also, we need to put a bit of attention to Remotes and its accessibility ... should any hacker wannabe walk nearby to an Arasaka building and take a sneak peek over its camera system? </div>
<div>
<br /></div>
<div>
When letting players (and NPC) use his remote hacking tools make yourself a question ... is that remote inside a datafortress?</div>
<div>
<ul>
<li>Is a robotaxi behind a datawall? Most probably, not.</li>
<li>Is a Dataterm behind a datawall? Surely not.</li>
<li>Is an Arasaka camera behind a datawall? Yes, you can bet about it.</li>
<li>Are public traffic cams behind datawalls? Nope.</li>
</ul>
</div>
<div>
To control a remote behind a datafortress you will need to gain access to it. You can wreak it's datawalls previously (but they will repair them in a small amount of time) or you can brute hack the Codegate to attain the password (but most datafortress change it's passwords periodically).</div>
<div>
<br /></div>
<div>
The better way to do it, is to assault a datafortress, get inside, access to the users database, and add a new user for you and leave before somebody notices you and could suspect something. Until someone supect that account is compromised, your safe to go.</div>
<div>
<br /></div>
<div>
Once you have a way around the datawalls you can use the remote tools freely.</div>
<div>
<br /></div>
Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com4tag:blogger.com,1999:blog-92731708082864744.post-91313479698530857852013-12-17T12:16:00.001+01:002013-12-17T12:16:22.612+01:00Well, it's been a while ... like ... more than a year? Really? Well, it seems real life can get quite busy isn't it?<br />
<br />
Anyway, I been playing games anyway. I had to go back on Spider processors and almost free wi-fi attacks, they gave to much power to Netrunners as they could control literally anything.<br />
<br />
So I have stepped back and returned to standard hacking rules for implants. Netrunners can still make fun of solos and all that, it is just harder and more limited.<br />
<br />
Spiders had gone the way of Dodo, and I have modified some implants. Interface plugs now are wi-fi hotspots and can pair with anything the user desires. You can still use them to plug yourself physically, and in fact it has better performance (all cable connections are treated as low impedance cables instead) and cannot be hacked wirelessly.<br />
<br />
Other implants include lowering camera gadgets space in implants (like Cyberoptics) and displays (Times Square). Cheapen cellular implants and convert them to small agendas/computers on it's own.<br />
<br />
<a href="http://images.wikia.com/cnc/images/c/c7/CNCRen2_Cyborg_Soviet_Concept.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="http://images.wikia.com/cnc/images/c/c7/CNCRen2_Cyborg_Soviet_Concept.jpg" width="204" /></a>I also incorporated domestic humanoid robots, AI are to large to be put in a simple humanoid, but I use ideas from the movie I Robot and the RPG Game Neurospasta. Basically robots are only vessels and they are remotely controlled by company AI who manage multiple robots on real time.<br />
<br />
Which by itself can led to a lot of adventures.<br />
<br />
Also, cheaper full cyborgs. I know I created a previsoulsy one more cheaper but I have added other variations based on actual cyberimplants found on books. You know, using Enable Cyberlimbs to build an obsolete model has it's charm.<br />
<br />
Also, Soviet ones.<br />
<br />
In a summary, they are quite cheaper, but also a piece of junk that tends to fail more often than not. <a href="https://drive.google.com/file/d/0B3zNtN9gLCdCWGFUZmJSMWNDSVk/edit?usp=sharing" target="_blank">Take a look at the PDF of it's components.</a><br />
<br />
Maybe another day (month or year) I will post the domestic robot statistics. I why not, my actual house rules.Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-76631345940724972692012-09-21T12:15:00.001+02:002019-02-04T18:35:47.453+01:00The previous entry arose some design problems I have with the Maximum Metal rulebook.<br />
<br />
A motorbike is stated as having only 1 space. And you must reserve an space for the pilot … which mean you cannot use options that need more space.<br />
<br />
It doesn't care that you may be working with a huge motorbike or even a trike. It doesn't take in account that thousands of people carry a companion on its motorbike on a daily basis.<br />
<br />
It doesn't even take in account sidecars.<br />
<br />
What if I want to put a sidecar with a mounted turret connected to the cybernetic controls of the motorbike? <br />
<br />
My first reaction was to modify the cycle entrance to allow for 1 to 2 spaces.<br />
My second reaction was to tweak the SDP rules to copy other vehicles so you needed to increase the SDP if you wanted more space.<br />
<br />
My third reaction was to create an extra option (like increased speed) to allow for extra spaces at a speed cost and SDP cost.<br />
<br />
The last option made me think about other kind of options for vehicles. The most obvious, being method of movement. Why I can’t make a cycle with continuous tracks (for a snowmobile)?<br />
<br />
But alternate moving systems come with different speeds and acceleration … so I’m thinking on modifying the cycle entry to add variable SDP based on spaces (15 SDP per space) and adding another entry for cycles with tracks.<br />
<br />
That’s not all. <br />
<br />
Once you add a tracked cycle, you must ask yourself … and why not a walking car, truck or MBT? Because you know you want to make a personal walking MBT with robotic IA … you could be tempted to use ACPA rules, but Fuchikomas, Tachikomas work more like autonomous vehicles than ACPAs.<br />
<br />
If you don’t know what a Fuchikoma is, go kill yourself.<br />
<br />
So later (or not) I will try to make those entries an corresponding options (pincers, retractable wheels, grip pads, etc) to create track vehicles, and walking vehicles.<br />
<br />
<b>Edit</b>: That was a fumble, books already cover vehicles with legs, etcDimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-26231922546911869682012-09-16T00:56:00.005+02:002012-09-16T00:58:56.995+02:00New vehicle ... well, motorbike.Snakeeyes Timber 3 Cyborg Cycle<br />
<br />
The ST3 is a special cycle designed for cybered people. It is robust, armored and fast, and comes with full equipment for the modern day chrome addict.<br />
<br />
It's also bigger than most bikes.<br />
<br />
<b>TOP SPEED</b>: 120 MPH<br />
<b>ACC/DEC</b>: 36/60 MPH<br />
<b>CREW</b>: 1<br />
<b>PASSENGERS</b>: 0<br />
<b>RANGE</b>: 400 MILES<br />
<b>CARGO</b>: 45 KG<br />
<b>MANEUVER</b>: +1<br />
<b>SDP</b>: 37<br />
<b>SP</b>: 15<br />
<b>TYPE</b>: CYCLE<br />
<b>MASS</b>: 250 KG<br />
<b>COST</b>: 23,000 ED<br />
<br />
<b>Equipment</b>: Seat Massager, Auto-pilot, Cybernetic linkage, Entretaintment system, Navigation system, Security system.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://dimuscul.clon01.net/varis/snakeeyestimber3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="268" src="http://dimuscul.clon01.net/varis/snakeeyestimber3.png" width="640" /></a></div>
<br />Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-74016600581946975942012-09-13T01:39:00.001+02:002012-09-13T01:39:55.027+02:00CyberdecksMy player's tend to have difficulties to find the section about cyberdeck prices.<br />
<br />
The next document resumes all the options in the core book taking into account the previous implants and modifications (spider processors, wireless links, etc.). The price for armored decks have been lowered, and cellular decks have been removed entirely.<br />
<br />
Referees need to take into account these changes for previous published cyberdecks with those properties.<br />
<br />
<br /><a title="View CP2020 - House Rules - Cybedecks Revised Prices on Scribd" href="http://www.scribd.com/doc/105757985/CP2020-House-Rules-Cybedecks-Revised-Prices" style="margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block; text-decoration: underline;">CP2020 - House Rules - Cybedecks Revised Prices</a><iframe class="scribd_iframe_embed" src="http://www.scribd.com/embeds/105757985/content?start_page=1&view_mode=scroll&access_key=key-1dh57sv6zrscoooikrgj" data-auto-height="true" data-aspect-ratio="0.772727272727273" scrolling="no" id="doc_98754" width="100%" height="600" frameborder="0"></iframe>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-62163284545905090222012-09-12T12:12:00.000+02:002012-09-13T01:41:02.384+02:00New Cyberware<div class="separator" style="clear: both; text-align: center;">
<a href="http://teamcovenant.com/wp-content/uploads/2012/06/netrunner.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="257" src="http://teamcovenant.com/wp-content/uploads/2012/06/netrunner.jpg" width="640" /></a></div>
<br />
<br />
The following implants and chips where made trying to update the feeling of the setting to more a modern standards. It also serves as a preparation for netrunning other people brains, or ghosting if you prefer.<br />
<br />
Remember that a character can only use as many chips as his INT score, every MU of his spider processor counts as a chip. Spider processors cannot be used for netrunning, you still need a cyberdeck.<br />
<a href="http://www.scribd.com/doc/105692362/CP2020-House-Rules-Neural-Chipware" style="-x-system-font: none; display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto; text-decoration: underline;" title="View CP2020 - House Rules - Neural &amp; Chipware on Scribd"><br /></a><a href="http://www.scribd.com/doc/105692362/CP2020-House-Rules-Neural-Chipware" style="-x-system-font: none; display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto; text-decoration: underline;" title="View CP2020 - House Rules - Neural &amp; Chipware on Scribd">CP2020 - House Rules - Neural & Chipware</a><iframe class="scribd_iframe_embed" data-aspect-ratio="0.707514450867052" data-auto-height="true" frameborder="0" height="600" id="doc_93185" scrolling="no" src="http://www.scribd.com/embeds/105692362/content?start_page=1&view_mode=scroll&access_key=key-gby25cen95pv0tjuuxx" width="100%"></iframe>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-64050367801407580062012-09-09T12:28:00.001+02:002012-09-13T00:59:55.670+02:00Humanity loss alternate rulesOne of my gripes with the humanity rules, is that they are a little bit punishing on the roleplaying side. While I understand its motives, I like to play more cyberized games and having PC and NPC with low EMP make for rather boring encounters.<br />
<br />
The following rules add a bit of variety to mental disorders and let players choose how it affect his character.<br /><a href="http://www.scribd.com/doc/105374352/Humanity-Loss-Alternate-Rules" style="-x-system-font: none; display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto; text-decoration: underline;" title="View Humanity Loss Alternate Rules on Scribd"><br /></a><a href="http://www.scribd.com/doc/105374352/Humanity-Loss-Alternate-Rules" style="-x-system-font: none; display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto; text-decoration: underline;" title="View Humanity Loss Alternate Rules on Scribd">Humanity Loss Alternate Rules</a><iframe class="scribd_iframe_embed" data-aspect-ratio="0.706697459584296" data-auto-height="true" frameborder="0" height="600" id="doc_5210" scrolling="no" src="http://www.scribd.com/embeds/105374352/content?start_page=1&view_mode=scroll&access_key=key-2hj1430bnd53ptnkab2t" width="100%"></iframe>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-24637527261256145482012-04-08T20:56:00.001+02:002015-04-03T18:57:29.405+02:00Ghost in the ShellMore days of vacations, more time to throw in unfinished projects XD<br />
<br />
Here goes a preview of a document I'm doing for an adaptation of Ghost in the Shell for Cyberpunk 2020. It's shameful copy of work done by Chris Dias for d20. Until I reach the rules section, the only thing mine is the layout.<br />
<br />
<a href="http://dimuscul.clon01.net/gits.pdf">http://dimuscul.clon01.net/gits.pdf</a><br />
<br />
<i><b>Edit</b>: Damn, I lost the files cannot continue ... I will have to begin anew.</i>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-13745664916777099382011-12-14T12:58:00.001+01:002011-12-14T13:00:35.899+01:00Martial ArtsLater I will try to expand on this, but for now I want to write some concerns about martial arts and non martial arts.<br />
<br />
There are a few skills I find poorly conceived.<br />
<br />
Brawling, Melee, Fencing and Martial Arts ... on one side we have the enormous difference between Brawling and Martial Arts ... on the other the inexistent difference between Melee and Fencing.<br />
<br />
As a Skill Brawling is quite mediocre, even easy MA are fairly superior to it and cost the same to learn. Meanwhile, Melee and Fencing doesn't even have a difference apart from name (and ignoring the optional rule from the GM guide).<br />
<br />
My proposal is to convert Fencing to a martial arts (Pacific Rim style) so swords become more fearsome and Fencing more useful.<br />
<br />
And merging Brawling with Melee ... so maybe you cannot do the same damage, but at least you can fight with anything that comes to your hands.Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0tag:blogger.com,1999:blog-92731708082864744.post-88293230649929820672011-12-14T12:29:00.000+01:002011-12-14T12:29:39.634+01:00A little adventure (Part 1b)I have to continue the adventure, but as the first week ended, so did my free time.<br />
<br />
Eventually I will manage to write it XD<br />
<br />
The schematics for the adventure are:<br />
<b>Chapter 1</b>: Meeting Jaws - <i>Player's get a contract and find a hacker dead.</i><br />
<b>Chapter 2</b>: Searching for clues - <i>Player's need to get in a remote datafortress where Jaws stored valuable secrets from a corporation. They are encrypted with strong keys, they will need a supercomputer to read it's contents.</i><br />
<b>Chapter 3</b>: Creepers - <i>Someone tries to kill the player's using cheap full borgs with brains that self destruct when dead. Attacks repeat during the rest of the adventure at random intervals.</i><br />
<b>Chapter 4</b>: Light on the matter -<i> Player's infiltrate or negotiate to access a supercomputer and decrypt Jaw files. They learn that a corporation is utilizing a variation of Soul Killer to copy minds to computers installed on full prosthetic bodies. The corporation is accused of kidnapping and killing famous people to acquire his minds.</i><br />
<b>Chapter 5</b>: Revenge - <i>Player's get to attack/infiltrate the secret laboratories of the corporation to blow of his experiments/projects. Lot's of C6 involved.</i>Dimusculhttp://www.blogger.com/profile/06068938075388621154noreply@blogger.com0