RULES Guide to Netrunning

Status
Not open for further replies.
Administrator
Eddies
986
Guide to Netrunning


Netrunners are savvy hackers, but with a cybernetically augmented interface system implanted into their body. Using their brain-computer interface implants, they roam the Internet, looking for systems to hack and information to sell to fixers. Although anyone can enter the Net (also known as cyberspace), most people can't use the "Menu." The Menu is a group of Applications (Apps) that are Interface programs that allows a Netrunner to Locate Remote, Run Software, Control Remote, LDL Link, Load, Create and Delete.

By 2081, the use of computer technology has become truly universal. Some use a PDA, others personal computers, still others a neural processor. Regular Janes and Joes know how to use these systems to access information, communicate, even fight. But there are others who can use the same tech to work wonders: netrunners. A netrunner knows the ins and outs of computer systems, the programming languages, how to write or mod a killer virus. Deck in hand, they're just as dangerous as a corporate soldier armed to the teeth. Many netrunners are free agents working only for themselves, but a few have signed their own pacts with the megacorps and work to keep corporate data fortresses solid and impenetrable. Today, each and every corporation has a veritable army of netrunners on its payroll. Netrunners were once considered the rulers of cyberspace, using their skull jacks to roam a vast, global network. They also needed special suits to cool their bodies (although a tub full of ice would do for penniless punks). But this era ended with the cataclysm wrought by the greatest runner of all, Rache Bartmoss. Cyberspace became a land of daemons, cut off by the (nearly?) impenetrable Blackwall.

Netrunning is a cornerstone of the Cyberpunk universe, allowing characters to interact with digital environments, hack systems, and influence the physical world through cyberspace. This guide provides a framework for engaging in netrunning roleplay that balances dice rolls and freeform storytelling, ensuring accessibility for all players—whether they prefer stats or not.



The Basics of Netrunning


  1. Define Your Goals
    • Clearly state your objective before diving into the Net. Examples:
      • Accessing a secure data fortress.
      • Disabling a building's security system.
      • Planting false information in a corporate database.
  2. Choose Your Tools
    • Identify the cyberdeck, programs, and daemons your character uses. If unspecified, describe their general capabilities (e.g., "a lightweight deck built for speed, loaded with stealth programs").
    • Use creative descriptions to bring these tools to life in your posts.
  3. The Netrun Environment
    • The Net has two main zones:
      • Open Net: Accessible to everyone, akin to today's internet. Corporate run safe-zones over various cities that monitor information.
      • Blackwall Zone: Dangerous, high-security areas, protected by Black ICE and corporate daemons. The Blackwall prevents most from entry, only through specialized help can one pass the Blackwall and deep dive into the Old Net.



Mechanics of Netrunning


Players can choose between dice-based mechanics or freeform roleplay to resolve challenges. The rules below adapt to both approaches.

Dice-Based Mechanics


  1. Roll to Resolve
    For any action, roll a 1d10:
    • 1–3: Critical failure (unexpected consequences or danger).
    • 4–6: Partial success (progress but with complications).
    • 7–9: Success (achieve the goal without major setbacks).
    • 10: Critical success (exceed expectations or gain an extra benefit).
  2. Modifiers (Optional)
    If your character has established skills, cyberware, or advanced tools, add a modifier (e.g., +1 or +2) to your roll.
  3. Program Use
    • Assign basic effects to your programs. For example:
      • Blackout: Roll to disable cameras or lights (difficulty 6).
      • Worm: Roll to extract data undetected (difficulty 7).
    • Collaborate with your RP partner or moderator to establish difficulties.

Freeform Roleplay


  1. Narrative-Driven Actions
    • Describe your actions in detail, focusing on creativity and collaboration.
    • Example: "Jack plugged into his cyberdeck, feeling the surge of data flood his mind. His stealth daemon cloaked his presence as he slipped past the first layer of ICE."
  2. Mutual Agreement
    Work with your RP partner or a moderator to determine outcomes. Introduce challenges naturally, like encountering Black ICE or needing a unique code.





Encounters in the Net


The Net is filled with dangers and opportunities. Use the following examples to shape your story:
  1. Data Fortresses
    • Corporate or criminal vaults of valuable information.
    • Often protected by ICE, traps, and daemons.
    • Example: "The walls shimmered with Arasaka's iconic crimson sigils. Black ICE spiraled toward him like digital vipers."
  2. Black ICE and Daemons
    • Describe these as sentient programs designed to hunt or destroy intruders.
    • Example: "The ICE took the form of a massive, prowling panther, its digital claws sparking with lethal intent."
  3. Environmental Hazards
    • Crashing programs, corrupted data streams, or rogue AIs.
  4. Rewards
    • Financial gains, secrets, or system control. Define rewards collaboratively to ensure fairness.



Guidelines for Roleplay


  1. Focus on Storytelling
    • Netrunning should enrich the narrative. Use vivid descriptions to make the digital world immersive.
    • Example: "Her avatar leapt from node to node, leaving a trail of green light behind her, her heart racing as the ICE shrieked in pursuit."
  2. Collaboration is Key
    • Whether you're facing off against a moderator-controlled system or working with another player, discuss outcomes openly.
  3. Balance the Stakes
    • Not every Netrun needs to be life-threatening. Use a mix of low- and high-stakes runs to keep things fresh.



Examples of Play


Dice-Based

  • Player: "Jack uploads his stealth daemon and approaches the locked data node. Rolling to bypass the ICE."
  • Roll: 8 (Success).
  • Outcome: "The daemon dissolved the ICE, and the data node unlocked, revealing a trove of encrypted files."

Freeform

  • Player: "She launched the Blackout program, sending ripples through the network. Cameras blinked offline, but her HUD flashed red—an ICE counterattack!"
  • Partner: "The ICE retaliates, corrupting her Blackout program. You'll need to patch it quickly or risk exposure."



This guide ensures that netrunning is accessible and enjoyable for all players, blending mechanics with creativity to make the experience rich and immersive. Let me know if you'd like more examples or refinements!
 
Status
Not open for further replies.
Back
Top