Make your own free website on

Shadows over Baltimore


Home | Map | Log In

Matrix Programs


Analyze (Computer)

Analyze programs gather data about other “things” in the Matrix—nodes, users, programs, etc.—by issuing queries, analyzing system resources, performing registry look-ups, and so on. Use Analyze for Matrix Perception and for detecting hacking attempts.



Armor programs are software redundancy systems that protect icons from attacks that cause Matrix damage.


Attack (Cybercombat/Hacking)

Attack programs are hostile code carriers that attempt to kill processes, introduce random input, create buffer overflows or program faults, and otherwise make a program/icon crash.


Biofeedback Filters

Biofeedback filters are software routines that monitor for and prevent dangerous simsense signals. Hackers specifically use biofeedback filters as a defense against Black Hammer and Blackout programs.


Black Hammer (Cybercombat/Hacking)

Black Hammer samples the command transactions between the target and his commlink and injects dangerous biofeedback responses into the target’s simsense interface. These aggravated BTL-level signals may overload the target’s neural connections and in turn render him unconscious, trigger psychological disorders, brainwash him, or cause death from stroke, heart failure, respiratory paralysis, aneurysm, or neurotransmitter autotoxicity—and those are just a few of the possible effects.

Black Hammer is intended as a weapon against hot-sim full-VR hackers; against cold-sim VR users it only inflicts Stun damage.

It has no effect on programs, agents, IC, or sprites, nor will it affect AR users.


Blackout (Cybercombat/Hacking)

Blackout is a nonlethal version of Black Hammer—it causes Stun damage rather than physical.


Browse (Data Search)

Browse programs are specialized search routines that help track down information on a particular node or in the Matrix at large. Use Browse programs for Data Search actions


Command (misc.)

Command programs allow the user to control a device through the Matrix, whether it be a surveillance camera, a drone, an agent, or an electronic system.


Data Bomb

Data Bombs are a specialized form of reactive attack program. A Data Bomb is attached to a specific file or device and set to activate if someone accesses the file/device without authorization. When triggered, Data Bombs “explode” and attempt to crash the icon that illegally accessed the file/device. Data Bombs may also be instructed to erase the file, if the owner chooses.

Only one Data Bomb may be attached to a particular file or device. Data Bombs may be attached to icons that are also protected by Encrypt or Scramble programs. You can detect a Data Bomb with a successful Matrix Perception Test.

You can defuse Data Bombs simply by entering the correct passcode (unfortunately, the person who set the Data Bomb is usually the only person who knows the passcode). Without the passcode, you can only disable a detected Data Bomb with a successful Disarm Data Bomb action. Undetected Data Bombs cannot be defused. Data Bombs inflict a number of boxes of Matrix damage equal to their rating. Once triggered, the Data Bomb program crashes.


Decrypt (Electronic Warfare)

Decrypt programs are designed to conduct a number of cipher-busting attacks—from pattern analysis to brute-force dictionary assaults to sophisticated mathematical tricks—to break into an encrypted system or service.


Defuse (Hacking)

The sole purpose of Defuse programs is to deactivate Data Bombs that are protecting files or devices.



Electronic counter-countermeasures (ECCM) filter out jamming signals that attempt to disrupt a wireless connection. ECCM adds its rating to a protected device’s Signal rating when defending against jamming.


Edit (Computer/Hacking)

Edit is a combination word processor, graphic design tool, and layout and video/animation editor. You can use it to create, alter, and remove files of any media type: text, graphics, video, trideo, etc. Edit sees common usage in the corporate world, but hackers use it for their own subversive ends. Use Edit for the Edit action.

Edit can also be used as a file transfer, text messaging, video conferencing, and email program. You can use a Transfer Data action  to transfer data and files of any media type: text, graphics, video, trideo, etc.


Encrypt (Electronic Warfare)

Encrypt programs utilize various cryptographic schemes and ciphers to secure files, access nodes, and communications between nodes. Encrypted items are accessed with the proper passcode; otherwise they are gibberish. Use Encrypt programs for the Encrypt action.

Multiple files may be archived and encrypted together.


Exploit (Hacking)

Exploit programs are constantly-evolving hacker tools specifically designed to take advantage of security flaws and weaknesses so that a hacker can gain unauthorized access to a node. Exploit programs are used for hacking in without authorized access.


Medic (Computer)

Use Medic to repair Matrix damage inflicted on icons. Though legitimate users sometimes use Medic to fix corrupted files, misbehaving programs, and other errors, hackers use Medic to keep functioning after a bout of cybercombat. Some IC programs carry Medic programs to repair themselves. Use Medic for the Repair Icon action.


Reality Filter (Response)

A Reality Filter program translates a node’s VR simsense sculpting into the metaphor of your choice. In order to determine which system’s metaphor dominates, make an Opposed Test pitting Reality Filter + Response versus the node’s System + Response. If the filter wins, your preprogrammed paradigm overrides the node’s signals and you receive a +1 Response bonus while in that node. If the node wins, or a tie results, its metaphor overwhelms the filter enough that you suffer –1 Response while in the node.


Scan (Electronic Warfare)

Scan programs allow you to locate wireless networks. Every wireless device OS has a built-in Scan program at rating 1, but users who want better access control may upgrade to a superior utility. Scan is used for Detecting Wireless Nodes.


Sniffer (Hacking/Electronic Warfare)

Use Sniffer programs to intercept data traffic and wireless signals and scan/capture the information. Sniffer programs are the ultimate Matrix spying utility, used for the Intercept Traffic and Intercept Wireless Signals actions.


Spoof (Hacking)

You can use Spoof programs to generate false access IDs and forge misleading data packets with the intent of confusing Track programs. Use Spoof for the Redirect action

Enter content here

Enter supporting content here