RULES Program & Daemon Creation Template

Administrator
Eddies
1,791
Program & Daemon Creation Template

The Template's Code
Code:
[center][img]header picture[/img][/center]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]OUT OF CHARACTER INFORMATION[/SIZE][/COLOR][/B]
[list][*][B]Image Source[/B]: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
[*][B]Permission[/b]: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)
[/list]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON INFORMATION[/SIZE][/COLOR][/B]
[LIST][*][B]Name:[/B] (What is the name of your Program or Daemon?)
[*][B]Type:[/B] (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
[*][B]Functionality:[/B] (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
[*][B]Complexity Level:[/B] (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
[*][B]Cost (Eddies):[/B] (What does it cost to acquire or develop?)
[*][B]Availability: [/B](Common? Limited? Rare? Unique?)
[*][B]Activation Requirements:[/B] (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
[*][B]Scope of Impact:[/B] (Does it target a single device, multiple systems, or entire networks?)
[/LIST]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON DESCRIPTION[/SIZE][/COLOR][/B]
[LIST]
[*][B]Primary Effect:[/B] (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
[*][B]Secondary Features:[/B] (Optional: List any secondary or bonus effects.)
[*][B]Visual/Aesthetic:[/B] (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
[*][B]Limitations:[/B] (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
[*][B]Countermeasures:[/B] (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
[/LIST]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]RATIONALE AND FUNCTION[/SIZE][/COLOR][/B]
[LIST][*][B]Design Intent:[/B] (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
[*][B]Impact on Netrunning:[/B] (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
[*][B]Risk vs. Reward:[/B] (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
[*][B]Upgrade Paths:[/B] (Can this Program/Daemon be enhanced or modified over time? How?)
[*][B]Special Features:[/B] (Does it offer any unique interactions, rare benefits, or lore-based applications?)
[*][B]Potential Uses in Roleplay:[/B] (Describe how this Program/Daemon could shape interactions or scenarios.)
[/LIST]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]DESCRIPTION[/SIZE][/COLOR][/B]
(All other information about technology/item in brief.)
The Template With Simple Template

OUT OF CHARACTER INFORMATION
  • Image Source: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
  • Permission: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)

PROGRAM/DAEMON INFORMATION
  • Name: (What is the name of your Program or Daemon?)
  • Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
  • Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
  • Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
  • Cost (Eddies): (What does it cost to acquire or develop?)
  • Availability: (Common? Limited? Rare? Unique?)
  • Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
  • Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)

PROGRAM/DAEMON DESCRIPTION
  • Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
  • Secondary Features: (Optional: List any secondary or bonus effects.)
  • Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
  • Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
  • Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)

RATIONALE AND FUNCTION
  • Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
  • Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
  • Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
  • Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
  • Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
  • Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)

DESCRIPTION
(All other information about technology/item in brief.)
The Code for the Double Template
Code:
[div2][center][img]header picture[/img][/center]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]OUT OF CHARACTER INFORMATION[/SIZE][/COLOR][/B]
[list][*][B]Image Source[/B]: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
[*][B]Permission[/b]: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)
[/list]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON INFORMATION[/SIZE][/COLOR][/B]
[LIST][*][B]Name:[/B] (What is the name of your Program or Daemon?)
[*][B]Type:[/B] (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
[*][B]Functionality:[/B] (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
[*][B]Complexity Level:[/B] (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
[*][B]Cost (Eddies):[/B] (What does it cost to acquire or develop?)
[*][B]Availability: [/B](Common? Limited? Rare? Unique?)
[*][B]Activation Requirements:[/B] (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
[*][B]Scope of Impact:[/B] (Does it target a single device, multiple systems, or entire networks?)
[/LIST]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON DESCRIPTION[/SIZE][/COLOR][/B]
[LIST]
[*][B]Primary Effect:[/B] (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
[*][B]Secondary Features:[/B] (Optional: List any secondary or bonus effects.)
[*][B]Visual/Aesthetic:[/B] (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
[*][B]Limitations:[/B] (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
[*][B]Countermeasures:[/B] (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
[/LIST]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]RATIONALE AND FUNCTION[/SIZE][/COLOR][/B]
[LIST][*][B]Design Intent:[/B] (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
[*][B]Impact on Netrunning:[/B] (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
[*][B]Risk vs. Reward:[/B] (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
[*][B]Upgrade Paths:[/B] (Can this Program/Daemon be enhanced or modified over time? How?)
[*][B]Special Features:[/B] (Does it offer any unique interactions, rare benefits, or lore-based applications?)
[*][B]Potential Uses in Roleplay:[/B] (Describe how this Program/Daemon could shape interactions or scenarios.)
[/LIST]

[b][COLOR=rgb(184, 49, 47)][SIZE=5]DESCRIPTION[/SIZE][/COLOR][/B]
(All other information about technology/item in brief.)
[/div2]
Second Template Version With Headers

Generic-headers-ooc.png
  • Image Source: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
  • Permission: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)

Generic-headers-prog-info.png
  • Name: (What is the name of your Program or Daemon?)
  • Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
  • Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
  • Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
  • Cost (Eddies): (What does it cost to acquire or develop?)
  • Availability: (Common? Limited? Rare? Unique?)
  • Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
  • Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)

Generic-headers-prog-descript.png
  • Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
  • Secondary Features: (Optional: List any secondary or bonus effects.)
  • Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
  • Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
  • Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)

Generic-headers-rationalandfunction.png
  • Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
  • Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
  • Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
  • Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
  • Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
  • Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)

Generic-headers-description.png
(All other information about technology/item in brief.)
Second Template Version With Headers' Code
Code:
[div2][center][img]header picture[/img][/center]

[center][img]https://i.ibb.co/KLdqxDz/Generic-headers-ooc.png[/img][/center]
[list][*][B]Image Source[/B]: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
[*][B]Permission[/b]: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)
[/list]

[center][img]https://i.ibb.co/jyjgwdn/Generic-headers-prog-info.png[/img][/center]
[LIST][*][B]Name:[/B] (What is the name of your Program or Daemon?)
[*][B]Type:[/B] (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
[*][B]Functionality:[/B] (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
[*][B]Complexity Level:[/B] (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
[*][B]Cost (Eddies):[/B] (What does it cost to acquire or develop?)
[*][B]Availability: [/B](Common? Limited? Rare? Unique?)
[*][B]Activation Requirements:[/B] (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
[*][B]Scope of Impact:[/B] (Does it target a single device, multiple systems, or entire networks?)
[/LIST]

[center][img]https://i.ibb.co/Bs0N5wk/Generic-headers-prog-descript.png[/img][/center]
[LIST][*][B]Primary Effect:[/B] (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
[*][B]Secondary Features:[/B] (Optional: List any secondary or bonus effects.)
[*][B]Visual/Aesthetic:[/B] (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
[*][B]Limitations:[/B] (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
[*][B]Countermeasures:[/B] (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
[/LIST]

[center][img]https://i.ibb.co/X7PQ7JS/Generic-headers-rationalandfunction.png[/img][/center]
[LIST][*][B]Design Intent:[/B] (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
[*][B]Impact on Netrunning:[/B] (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
[*][B]Risk vs. Reward:[/B] (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
[*][B]Upgrade Paths:[/B] (Can this Program/Daemon be enhanced or modified over time? How?)
[*][B]Special Features:[/B] (Does it offer any unique interactions, rare benefits, or lore-based applications?)
[*][B]Potential Uses in Roleplay:[/B] (Describe how this Program/Daemon could shape interactions or scenarios.)
[/LIST]

[center][img]https://i.ibb.co/T0jpyDv/Generic-headers-description.png[/img][/center]
(All other information about technology/item in brief.)
[/div2]



REFERENCE - BALANCING CHART
REFERENCE - BALANCING CHART
TypeCost (Eddies)EffectivenessComplexity LevelLimitationsScope
Utility Program500 - 2,000Unlocks or enhances basic systemsLow to MediumLimited to one action per useSingle target or small networks
Defensive Program1,000 - 5,000Shields or repairs cyber systemsMedium to HighSlower activation, high RAM usageMultiple systems or self-defense
Offensive Program2,000 - 8,000Damages ICE or netrunnersMedium to HighHigh RAM use, easy to detectSingle or multiple ICE targets
Black ICE Daemon10,000+Lethal to netrunners, autonomousHigh to ExperimentalSelf-destructive, limited runsEntire networks or critical systems
Hybrid Program5,000 - 15,000Combines multiple functionsHigh to ExperimentalProne to failure, high upkeepVariable (depends on design)
Data Fortress50,000+Full control over a network hubExperimentalImmovable, expensive, vulnerableEntire local or regional networks
Encryption Program2,000 - 5,000Protects data with advanced encodingMediumSlows down authorized accessSmall or medium-sized networks
Decryption Program3,000 - 7,000Breaks through encoded dataMedium to HighTime-intensive, high detection riskSingle file or connected systems
Spy Daemon4,000 - 8,000Monitors or records activitiesMediumCan be traced if left too longSingle or multiple nodes
Cloaking Program5,000 - 10,000Hides presence of netrunnersMedium to HighLimited duration, drains resourcesLocalized networks
Recon Daemon3,000 - 6,000Maps out network architectureLow to MediumLimited by complexity of networkEntire connected systems
Trap Daemon8,000+Sets automated countermeasuresHighVulnerable to decryption programsSingle point or node
Combat Program6,000 - 12,000Directly engages intrudersHighHigh resource demand, noticeable delaySingle or multiple targets
Virus Program10,000+Corrupts or disables systemsHigh to ExperimentalHard to control spread, potential recoilEntire network
Firewall Booster5,000 - 10,000Temporarily strengthens defensesMediumShort-lived, costly to maintainLocalized or regional networks
Net Launcher Daemon8,000+Traps netrunners in localized areasHighRisk of entangling alliesSpecific user nodes
Honeypot Program7,000 - 15,000Lures attackers into false systemsHigh to ExperimentalRequires advanced programmingDecoy or false nodes
Adaptive ICE12,000+Reacts to intruders with learning AIExperimentalExtremely expensive, hard to upgradeEntire networks or high-security hubs
Resource Leech4,000 - 9,000Drains processing power or RAMMedium to HighSlow to activate, detectableIndividual targets
Emergency Reset3,000 - 8,000Resets compromised systemsMediumLeaves system vulnerable temporarilySingle or small clusters
Skill Enhancement6,000 - 12,000Temporarily boosts netrunning skillsMedium to HighLimited to short durationsNetrunner-focused
Signal Jammer4,000 - 8,000Blocks communication between nodesMediumLimited range, can be counteredLocalized systems
Proxy Shield6,000 - 11,000Masks the source of an attackMedium to HighCan fail against advanced tracingEntire regional systems
Neural Feedback ICE15,000+Causes physical harm to intrudersExperimentalRisk of collateral damageIndividual or small connected systems
Replication Virus20,000+Multiplies itself across networksExperimentalHard to contain once activatedEntire system ecosystems



OUT OF CHARACTER INFORMATION
  • Image Source: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
  • Permission: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)

PROGRAM/DAEMON INFORMATION
  • Name: (What is the name of your Program or Daemon?)
  • Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
  • Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
  • Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
  • Cost (Eddies): (What does it cost to acquire or develop?)
  • Availability: (Common? Limited? Rare? Unique?)
  • Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
  • Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)

PROGRAM/DAEMON DESCRIPTION
  • Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
  • Secondary Features: (Optional: List any secondary or bonus effects.)
  • Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
  • Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
  • Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)

RATIONALE AND FUNCTION
  • Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
  • Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
  • Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
  • Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
  • Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
  • Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)

DESCRIPTION
(All other information about technology/item in brief.)
 
Last edited by a moderator:
Back
Top