Administrator
- Eddies
- 1,791
Program & Daemon Creation Template
- The Template's Code
-
Code:
[center][img]header picture[/img][/center] [b][COLOR=rgb(184, 49, 47)][SIZE=5]OUT OF CHARACTER INFORMATION[/SIZE][/COLOR][/B] [list][*][B]Image Source[/B]: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.) [*][B]Permission[/b]: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.) [/list] [b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON INFORMATION[/SIZE][/COLOR][/B] [LIST][*][B]Name:[/B] (What is the name of your Program or Daemon?) [*][B]Type:[/B] (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.) [*][B]Functionality:[/B] (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.) [*][B]Complexity Level:[/B] (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.) [*][B]Cost (Eddies):[/B] (What does it cost to acquire or develop?) [*][B]Availability: [/B](Common? Limited? Rare? Unique?) [*][B]Activation Requirements:[/B] (What is required to run it? Specify cyberdeck power, skill level, or special conditions.) [*][B]Scope of Impact:[/B] (Does it target a single device, multiple systems, or entire networks?) [/LIST] [b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON DESCRIPTION[/SIZE][/COLOR][/B] [LIST] [*][B]Primary Effect:[/B] (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.) [*][B]Secondary Features:[/B] (Optional: List any secondary or bonus effects.) [*][B]Visual/Aesthetic:[/B] (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?) [*][B]Limitations:[/B] (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.) [*][B]Countermeasures:[/B] (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.) [/LIST] [b][COLOR=rgb(184, 49, 47)][SIZE=5]RATIONALE AND FUNCTION[/SIZE][/COLOR][/B] [LIST][*][B]Design Intent:[/B] (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?) [*][B]Impact on Netrunning:[/B] (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?) [*][B]Risk vs. Reward:[/B] (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?) [*][B]Upgrade Paths:[/B] (Can this Program/Daemon be enhanced or modified over time? How?) [*][B]Special Features:[/B] (Does it offer any unique interactions, rare benefits, or lore-based applications?) [*][B]Potential Uses in Roleplay:[/B] (Describe how this Program/Daemon could shape interactions or scenarios.) [/LIST] [b][COLOR=rgb(184, 49, 47)][SIZE=5]DESCRIPTION[/SIZE][/COLOR][/B] (All other information about technology/item in brief.)
- The Template With Simple Template
-
OUT OF CHARACTER INFORMATION
- Image Source: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
- Permission: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)
PROGRAM/DAEMON INFORMATION
- Name: (What is the name of your Program or Daemon?)
- Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
- Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
- Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
- Cost (Eddies): (What does it cost to acquire or develop?)
- Availability: (Common? Limited? Rare? Unique?)
- Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
- Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)
PROGRAM/DAEMON DESCRIPTION
- Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
- Secondary Features: (Optional: List any secondary or bonus effects.)
- Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
- Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
- Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
RATIONALE AND FUNCTION
- Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
- Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
- Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
- Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
- Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
- Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)
DESCRIPTION
(All other information about technology/item in brief.)
- The Code for the Double Template
-
Code:
[div2][center][img]header picture[/img][/center] [b][COLOR=rgb(184, 49, 47)][SIZE=5]OUT OF CHARACTER INFORMATION[/SIZE][/COLOR][/B] [list][*][B]Image Source[/B]: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.) [*][B]Permission[/b]: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.) [/list] [b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON INFORMATION[/SIZE][/COLOR][/B] [LIST][*][B]Name:[/B] (What is the name of your Program or Daemon?) [*][B]Type:[/B] (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.) [*][B]Functionality:[/B] (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.) [*][B]Complexity Level:[/B] (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.) [*][B]Cost (Eddies):[/B] (What does it cost to acquire or develop?) [*][B]Availability: [/B](Common? Limited? Rare? Unique?) [*][B]Activation Requirements:[/B] (What is required to run it? Specify cyberdeck power, skill level, or special conditions.) [*][B]Scope of Impact:[/B] (Does it target a single device, multiple systems, or entire networks?) [/LIST] [b][COLOR=rgb(184, 49, 47)][SIZE=5]PROGRAM/DAEMON DESCRIPTION[/SIZE][/COLOR][/B] [LIST] [*][B]Primary Effect:[/B] (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.) [*][B]Secondary Features:[/B] (Optional: List any secondary or bonus effects.) [*][B]Visual/Aesthetic:[/B] (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?) [*][B]Limitations:[/B] (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.) [*][B]Countermeasures:[/B] (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.) [/LIST] [b][COLOR=rgb(184, 49, 47)][SIZE=5]RATIONALE AND FUNCTION[/SIZE][/COLOR][/B] [LIST][*][B]Design Intent:[/B] (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?) [*][B]Impact on Netrunning:[/B] (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?) [*][B]Risk vs. Reward:[/B] (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?) [*][B]Upgrade Paths:[/B] (Can this Program/Daemon be enhanced or modified over time? How?) [*][B]Special Features:[/B] (Does it offer any unique interactions, rare benefits, or lore-based applications?) [*][B]Potential Uses in Roleplay:[/B] (Describe how this Program/Daemon could shape interactions or scenarios.) [/LIST] [b][COLOR=rgb(184, 49, 47)][SIZE=5]DESCRIPTION[/SIZE][/COLOR][/B] (All other information about technology/item in brief.) [/div2]
- Second Template Version With Headers
-
- Image Source: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
- Permission: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)
- Name: (What is the name of your Program or Daemon?)
- Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
- Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
- Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
- Cost (Eddies): (What does it cost to acquire or develop?)
- Availability: (Common? Limited? Rare? Unique?)
- Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
- Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)
- Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
- Secondary Features: (Optional: List any secondary or bonus effects.)
- Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
- Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
- Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
- Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
- Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
- Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
- Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
- Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
- Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)
(All other information about technology/item in brief.)
- Second Template Version With Headers' Code
-
Code:
[div2][center][img]header picture[/img][/center] [center][img]https://i.ibb.co/KLdqxDz/Generic-headers-ooc.png[/img][/center] [list][*][B]Image Source[/B]: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.) [*][B]Permission[/b]: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.) [/list] [center][img]https://i.ibb.co/jyjgwdn/Generic-headers-prog-info.png[/img][/center] [LIST][*][B]Name:[/B] (What is the name of your Program or Daemon?) [*][B]Type:[/B] (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.) [*][B]Functionality:[/B] (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.) [*][B]Complexity Level:[/B] (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.) [*][B]Cost (Eddies):[/B] (What does it cost to acquire or develop?) [*][B]Availability: [/B](Common? Limited? Rare? Unique?) [*][B]Activation Requirements:[/B] (What is required to run it? Specify cyberdeck power, skill level, or special conditions.) [*][B]Scope of Impact:[/B] (Does it target a single device, multiple systems, or entire networks?) [/LIST] [center][img]https://i.ibb.co/Bs0N5wk/Generic-headers-prog-descript.png[/img][/center] [LIST][*][B]Primary Effect:[/B] (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.) [*][B]Secondary Features:[/B] (Optional: List any secondary or bonus effects.) [*][B]Visual/Aesthetic:[/B] (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?) [*][B]Limitations:[/B] (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.) [*][B]Countermeasures:[/B] (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.) [/LIST] [center][img]https://i.ibb.co/X7PQ7JS/Generic-headers-rationalandfunction.png[/img][/center] [LIST][*][B]Design Intent:[/B] (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?) [*][B]Impact on Netrunning:[/B] (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?) [*][B]Risk vs. Reward:[/B] (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?) [*][B]Upgrade Paths:[/B] (Can this Program/Daemon be enhanced or modified over time? How?) [*][B]Special Features:[/B] (Does it offer any unique interactions, rare benefits, or lore-based applications?) [*][B]Potential Uses in Roleplay:[/B] (Describe how this Program/Daemon could shape interactions or scenarios.) [/LIST] [center][img]https://i.ibb.co/T0jpyDv/Generic-headers-description.png[/img][/center] (All other information about technology/item in brief.) [/div2]
REFERENCE - BALANCING CHART
- REFERENCE - BALANCING CHART
-
Type Cost (Eddies) Effectiveness Complexity Level Limitations Scope Utility Program 500 - 2,000 Unlocks or enhances basic systems Low to Medium Limited to one action per use Single target or small networks Defensive Program 1,000 - 5,000 Shields or repairs cyber systems Medium to High Slower activation, high RAM usage Multiple systems or self-defense Offensive Program 2,000 - 8,000 Damages ICE or netrunners Medium to High High RAM use, easy to detect Single or multiple ICE targets Black ICE Daemon 10,000+ Lethal to netrunners, autonomous High to Experimental Self-destructive, limited runs Entire networks or critical systems Hybrid Program 5,000 - 15,000 Combines multiple functions High to Experimental Prone to failure, high upkeep Variable (depends on design) Data Fortress 50,000+ Full control over a network hub Experimental Immovable, expensive, vulnerable Entire local or regional networks Encryption Program 2,000 - 5,000 Protects data with advanced encoding Medium Slows down authorized access Small or medium-sized networks Decryption Program 3,000 - 7,000 Breaks through encoded data Medium to High Time-intensive, high detection risk Single file or connected systems Spy Daemon 4,000 - 8,000 Monitors or records activities Medium Can be traced if left too long Single or multiple nodes Cloaking Program 5,000 - 10,000 Hides presence of netrunners Medium to High Limited duration, drains resources Localized networks Recon Daemon 3,000 - 6,000 Maps out network architecture Low to Medium Limited by complexity of network Entire connected systems Trap Daemon 8,000+ Sets automated countermeasures High Vulnerable to decryption programs Single point or node Combat Program 6,000 - 12,000 Directly engages intruders High High resource demand, noticeable delay Single or multiple targets Virus Program 10,000+ Corrupts or disables systems High to Experimental Hard to control spread, potential recoil Entire network Firewall Booster 5,000 - 10,000 Temporarily strengthens defenses Medium Short-lived, costly to maintain Localized or regional networks Net Launcher Daemon 8,000+ Traps netrunners in localized areas High Risk of entangling allies Specific user nodes Honeypot Program 7,000 - 15,000 Lures attackers into false systems High to Experimental Requires advanced programming Decoy or false nodes Adaptive ICE 12,000+ Reacts to intruders with learning AI Experimental Extremely expensive, hard to upgrade Entire networks or high-security hubs Resource Leech 4,000 - 9,000 Drains processing power or RAM Medium to High Slow to activate, detectable Individual targets Emergency Reset 3,000 - 8,000 Resets compromised systems Medium Leaves system vulnerable temporarily Single or small clusters Skill Enhancement 6,000 - 12,000 Temporarily boosts netrunning skills Medium to High Limited to short durations Netrunner-focused Signal Jammer 4,000 - 8,000 Blocks communication between nodes Medium Limited range, can be countered Localized systems Proxy Shield 6,000 - 11,000 Masks the source of an attack Medium to High Can fail against advanced tracing Entire regional systems Neural Feedback ICE 15,000+ Causes physical harm to intruders Experimental Risk of collateral damage Individual or small connected systems Replication Virus 20,000+ Multiplies itself across networks Experimental Hard to contain once activated Entire system ecosystems
OUT OF CHARACTER INFORMATION
- Image Source: (The location of the image link, if it is a gif, the official website of the movie/game or the IMDB link is sufficient. In all other cases, if possible, link the image from the original creator. We only accept Pinterest and Reddit links if the image can't be found elsewhere, because those places don't respect the creators. And in all cases, you need the full link where you found the image, not just the image itself.)
- Permission: (It must be filled in if you need to ask permission from someone else to use their character, another submission, etc. in this submission. Otherwise please write N/A to this field. | In all cases, the permission print screen/picture must be linked, which must include the question for which you are requesting permission and the answer from the other person.)
PROGRAM/DAEMON INFORMATION
- Name: (What is the name of your Program or Daemon?)
- Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
- Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
- Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
- Cost (Eddies): (What does it cost to acquire or develop?)
- Availability: (Common? Limited? Rare? Unique?)
- Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
- Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)
PROGRAM/DAEMON DESCRIPTION
- Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
- Secondary Features: (Optional: List any secondary or bonus effects.)
- Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
- Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
- Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)
RATIONALE AND FUNCTION
- Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
- Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
- Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
- Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
- Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
- Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)
DESCRIPTION
(All other information about technology/item in brief.)
Last edited by a moderator: