
Analyze (Computer)
Analyze programs gather data about other “things” in the Matrix—nodes, users, programs, etc.—by
issuing queries, analyzing system resources, performing registry look-ups, and so on. Use Analyze for Matrix Perception and
for detecting hacking attempts.
|

Armor
Armor programs are software redundancy systems that protect icons from attacks that cause Matrix damage.
|

Attack (Cybercombat/Hacking)
Attack programs are hostile code carriers that attempt to kill processes, introduce random input, create buffer
overflows or program faults, and otherwise make a program/icon crash.
|

Biofeedback Filters
Biofeedback filters are software routines that monitor for and prevent dangerous simsense signals. Hackers specifically
use biofeedback filters as a defense against Black Hammer and Blackout programs .
|

Black Hammer (Cybercombat/Hacking)
Black Hammer samples the command transactions between the target and his commlink and injects dangerous biofeedback
responses into the target’s simsense interface. These aggravated BTL-level signals may overload the target’s neural
connections and in turn render him unconscious, trigger psychological disorders, brainwash him, or cause death from stroke,
heart failure, respiratory paralysis, aneurysm, or neurotransmitter autotoxicity—and those are just a few of the possible
effects.
Black Hammer is intended as a weapon against hot-sim full-VR hackers; against cold-sim VR users it only inflicts
Stun damage.
It has no effect on programs, agents, IC, or sprites, nor will it affect AR users.
|

Blackout (Cybercombat/Hacking)
Blackout is a nonlethal version of Black Hammer—it causes Stun damage rather than physical.
|

Browse (Data Search)
Browse programs are specialized search routines that help track down information on a particular node or in
the Matrix at large. Use Browse programs for Data Search actions
|

Command (misc.)
Command programs allow the user to control a device through the Matrix, whether it be a surveillance camera,
a drone, an agent, or an electronic system.
|

Data Bomb
Data Bombs are a specialized form of reactive attack program. A Data Bomb is attached to a specific file or
device and set to activate if someone accesses the file/device without authorization. When triggered, Data Bombs “explode”
and attempt to crash the icon that illegally accessed
the file/device. Data Bombs may also be instructed to erase the file, if the owner chooses.
Only one Data Bomb may be attached to a particular file or device. Data Bombs may be attached to icons that
are also protected by Encrypt or Scramble programs. You can detect a Data Bomb with a successful Matrix Perception Test.
You can defuse Data Bombs simply by entering the correct passcode (unfortunately, the person who set the Data
Bomb is usually the only person who knows the passcode). Without the passcode, you can only disable a detected Data Bomb with
a successful Disarm Data Bomb action. Undetected Data Bombs cannot be defused. Data Bombs inflict a number of boxes of Matrix
damage equal to their rating. Once triggered, the Data Bomb program crashes.
|

Decrypt (Electronic Warfare)
Decrypt programs are designed to conduct a number of cipher-busting attacks—from pattern analysis to brute-force
dictionary assaults to sophisticated mathematical tricks—to break into an encrypted system or service.
|

Defuse (Hacking)
The sole purpose of Defuse programs is to deactivate Data Bombs that are protecting files or devices.
|

ECCM
Electronic counter-countermeasures (ECCM) filter out jamming signals that attempt to disrupt a wireless connection.
ECCM adds its rating to a protected device’s Signal rating when defending against jamming.
|

Edit (Computer/Hacking)
Edit is a combination word processor, graphic design tool, and layout and video/animation editor. You can use
it to create, alter, and remove files of any media type: text, graphics, video, trideo, etc. Edit sees common usage in the
corporate world, but hackers use it for their own subversive ends. Use Edit for the Edit action.
Edit can also be used as a file transfer, text messaging, video conferencing, and email program. You can use
a Transfer Data action to transfer data and files of any media type: text, graphics, video, trideo, etc.
|
Encrypt (Electronic Warfare)
Encrypt programs utilize various cryptographic schemes and ciphers to secure files, access nodes, and communications
between nodes. Encrypted items are accessed with the proper passcode ; otherwise they are gibberish. Use Encrypt programs for the Encrypt action.
Multiple files may be archived and encrypted together.
|

Exploit (Hacking)
Exploit programs are constantly-evolving hacker tools specifically designed to take advantage of security flaws
and weaknesses so that a hacker can gain unauthorized access to a node. Exploit programs are used for hacking in without authorized
access.
|

Medic (Computer)
Use Medic to repair Matrix damage inflicted on icons. Though legitimate users sometimes use Medic to fix corrupted
files, misbehaving programs, and other errors, hackers use Medic to keep functioning after a bout of cybercombat. Some IC
programs carry Medic programs to repair themselves. Use Medic for the Repair Icon action.
|

Reality Filter (Response)
A Reality Filter program translates a node’s VR simsense sculpting into the metaphor of your choice. In order to determine which system’s metaphor dominates,
make an Opposed Test pitting Reality Filter + Response versus the node’s System + Response. If the filter wins, your
preprogrammed paradigm overrides the node’s signals and you receive a +1 Response bonus while in that node. If the node
wins, or a tie results, its metaphor overwhelms the filter enough that you suffer –1 Response while in the node.
|

Scan (Electronic Warfare)
Scan programs allow you to locate wireless networks. Every wireless device OS has a built-in Scan program at
rating 1, but users who want better access control may upgrade to a superior utility. Scan is used for Detecting Wireless
Nodes.
|

Sniffer (Hacking/Electronic Warfare)
Use Sniffer programs to intercept data traffic and wireless signals and scan/capture the information. Sniffer
programs are the ultimate Matrix spying utility, used
for the Intercept Traffic and Intercept Wireless Signals actions.
|

Spoof (Hacking)
You can use Spoof programs to generate false access IDs and forge misleading data packets with the intent of
confusing Track programs. Use Spoof for the Redirect action
|