Administrator
- Eddies
- 986
Program & Daemon Creation Template
REFERENCE - BALANCING CHART
Type | Cost (Eddies) | Effectiveness | Complexity Level | Limitations | Scope |
---|---|---|---|---|---|
Utility Program | 500 - 2,000 | Unlocks or enhances basic systems | Low to Medium | Limited to one action per use | Single target or small networks |
Defensive Program | 1,000 - 5,000 | Shields or repairs cyber systems | Medium to High | Slower activation, high RAM usage | Multiple systems or self-defense |
Offensive Program | 2,000 - 8,000 | Damages ICE or netrunners | Medium to High | High RAM use, easy to detect | Single or multiple ICE targets |
Black ICE Daemon | 10,000+ | Lethal to netrunners, autonomous | High to Experimental | Self-destructive, limited runs | Entire networks or critical systems |
Hybrid Program | 5,000 - 15,000 | Combines multiple functions | High to Experimental | Prone to failure, high upkeep | Variable (depends on design) |
Data Fortress | 50,000+ | Full control over a network hub | Experimental | Immovable, expensive, vulnerable | Entire local or regional networks |
Encryption Program | 2,000 - 5,000 | Protects data with advanced encoding | Medium | Slows down authorized access | Small or medium-sized networks |
Decryption Program | 3,000 - 7,000 | Breaks through encoded data | Medium to High | Time-intensive, high detection risk | Single file or connected systems |
Spy Daemon | 4,000 - 8,000 | Monitors or records activities | Medium | Can be traced if left too long | Single or multiple nodes |
Cloaking Program | 5,000 - 10,000 | Hides presence of netrunners | Medium to High | Limited duration, drains resources | Localized networks |
Recon Daemon | 3,000 - 6,000 | Maps out network architecture | Low to Medium | Limited by complexity of network | Entire connected systems |
Trap Daemon | 8,000+ | Sets automated countermeasures | High | Vulnerable to decryption programs | Single point or node |
Combat Program | 6,000 - 12,000 | Directly engages intruders | High | High resource demand, noticeable delay | Single or multiple targets |
Virus Program | 10,000+ | Corrupts or disables systems | High to Experimental | Hard to control spread, potential recoil | Entire network |
Firewall Booster | 5,000 - 10,000 | Temporarily strengthens defenses | Medium | Short-lived, costly to maintain | Localized or regional networks |
Net Launcher Daemon | 8,000+ | Traps netrunners in localized areas | High | Risk of entangling allies | Specific user nodes |
Honeypot Program | 7,000 - 15,000 | Lures attackers into false systems | High to Experimental | Requires advanced programming | Decoy or false nodes |
Adaptive ICE | 12,000+ | Reacts to intruders with learning AI | Experimental | Extremely expensive, hard to upgrade | Entire networks or high-security hubs |
Resource Leech | 4,000 - 9,000 | Drains processing power or RAM | Medium to High | Slow to activate, detectable | Individual targets |
Emergency Reset | 3,000 - 8,000 | Resets compromised systems | Medium | Leaves system vulnerable temporarily | Single or small clusters |
Skill Enhancement | 6,000 - 12,000 | Temporarily boosts netrunning skills | Medium to High | Limited to short durations | Netrunner-focused |
Signal Jammer | 4,000 - 8,000 | Blocks communication between nodes | Medium | Limited range, can be countered | Localized systems |
Proxy Shield | 6,000 - 11,000 | Masks the source of an attack | Medium to High | Can fail against advanced tracing | Entire regional systems |
Neural Feedback ICE | 15,000+ | Causes physical harm to intruders | Experimental | Risk of collateral damage | Individual or small connected systems |
Replication Virus | 20,000+ | Multiplies itself across networks | Experimental | Hard to contain once activated | Entire system ecosystems |
GENERAL OOC INFORMATION
- Image Source: (Provide a link to any images used for your submission, with credit to the creator or original source if possible.)
PROGRAM/DAEMON INFORMATION
- Name: (What is the name of your Program or Daemon?)
- Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
- Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
- Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
- Cost (Eddies): (What does it cost to acquire or develop?)
- Availability: (Common? Limited? Rare? Unique?)
- Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
- Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)
PROGRAM/DAEMON DESCRIPTION
- Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
- Secondary Features: (Optional: List any secondary or bonus effects.)
- Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
- Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
- Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
RATIONALE AND FUNCTION
- Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
- Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
- Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
- Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
- Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
- Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)
.