Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ICE #6

Open
tukkek opened this issue Mar 17, 2017 · 7 comments
Open

ICE #6

tukkek opened this issue Mar 17, 2017 · 7 comments
Milestone

Comments

@tukkek
Copy link
Owner

tukkek commented Mar 17, 2017

Other classes are probably gonna have to be factored in, if only to create ICE dynamically. Having a fixed or semi-fixed build for each would make it easy to generate those on the fly. #2

@tukkek tukkek mentioned this issue Mar 17, 2017
@tukkek
Copy link
Owner Author

tukkek commented Mar 17, 2017

Types of ICE: #2

  • Soldier ICE (guards) will guard a single node.
  • Jackers (patrol) walk around the network looking for intruders
  • Technician ICE (workers) spawn in a single Datastore (or 10% chance of Control) node but can move to pursue intruders they Listen to Skills #5 They will actively hunt down intruders on certain alarm levels
  • Sysadmins Sysadmins #13 don't count for normal ICE generation. They are only there if a sysadmin is present, and even then only on a % chance. If one is jacked in, though, the same % chance will apply cumulatively, that more than one is. They have a 50% chance of spawning in a single node or in another node. They are a subclass of technical nodes and mostly act like them, despite having different statistics.

@tukkek tukkek mentioned this issue Mar 17, 2017
@tukkek
Copy link
Owner Author

tukkek commented Mar 17, 2017

Listens are always made against the characters take 10 on Move Silently #5

@tukkek tukkek modified the milestone: The web Mar 18, 2017
@tukkek
Copy link
Owner Author

tukkek commented Mar 20, 2017

Jacker ice will try to disable a player's programs. To do that they need to run a Computer Use against the programming DC (+ 5 if non-session). On success there's a 1/3 chance the program will be removed from memory. That's a full-round action.

@tukkek tukkek mentioned this issue Mar 20, 2017
@tukkek
Copy link
Owner Author

tukkek commented Mar 20, 2017

On a red alert, ICE can find the shortest path to an intruder by rolling Perceive against Stealth.

@tukkek
Copy link
Owner Author

tukkek commented Mar 24, 2017

Stealth ICE can be created if they have purchase the appropriate programs (roll take 10 perceive).

@tukkek
Copy link
Owner Author

tukkek commented Jul 12, 2018

Healing ICE. Better placed last in nodes with highest amount of ice.

@tukkek
Copy link
Owner Author

tukkek commented Jul 22, 2018

The unused ICE images are a great source of inspiration too: from a Bomb who will auto-destruct causing huge damage on attack to a Sphinx who doesn't move or attack but has superior querying (level+=2), etc.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant