Instant Netrunning a Fuzion Plug-In by Christian Conkle

Total Page:16

File Type:pdf, Size:1020Kb

Instant Netrunning a Fuzion Plug-In by Christian Conkle Instant Netrunning A Fuzion Plug-In by Christian Conkle ([email protected], http://www.europa.com/~conkle) Introduction All computers connected to the Net are assigned LDL. This LDL serves as a kind of telephone number for This is a system of rules expanding the hacking rules that computer, to which other computers know where for Fuzion and Interlock. These rules draw heavily on to send information. In a futuristic setting, a Virtual Cyberpunk 2020's Netrunning rules and are intended Construct or Icon may substitute for the LDL. The Net to be native in a Cyberpunk environment where neural User connects their computer to a Virtual Reality Inter- cyber-interfaces are standard, though they are written face, within which companies pay for space and create generically enough to be useable in a modern setting as elaborate virtual constructs to represent their LDL, the well. VR equivalent of Internet Portal Sites such as Infos- eek or Yahoo! today. The Net User may now tour the These rules were designed to use existing Cyberpunk bustling 3D Virtual City regardless of gravity or speed. 2020 equipment and software with little modication. Corporate virtual constructs are like giant 3D advertise- There are several dierences from the original rules, how- ments, attempting to entice the average Net User into ever, that are intended to speed play and optimize sim- their Virtual Realities to sell products or services. Some plicity. First, these rules lack a grid. Movement within Virtual Realities actually provide useful services such the virtual environment of cyberspace is conceptual. To as information or online software applications. The VR convert applications that give ranges, simply apply a equivalent to modern Websites. These Virtual Realities percentage chance of eectiveness based on range. Sec- are housed on Dataservers maintained by the respec- ond, these rules incorporate the Power attribute from tive corporations or institutions. It is the information other Fuzion games, essentially the equivalent to a com- housed on these Dataservers that isn't readily available puter's Intelligence from CP2020. Third, software and to the public that draws the Hacker. Normally, a cor- memory no longer needs to be assigned to specic CPUs. porate dataserver is openly accessible to the Net public, If the GM wishes, each MU of application and datale providing information either to the public or its employ- can be assigned to specic CPUs such that if that CPU ees through a variety of interfaces: text-only, text and fails, the application or datale is no longer available. graphics (the Web), audio/video, or fullsensory virtual This process was removed to eliminate extra bookkeep- reality (the Net). ing. These rules assume a 3d6 die-rolling mechanic op- tion of Fuzion. If you're playing Interlock, or the Fuzion However, the value of information available on public option of 1d10, simply replace the 3d6 with a 1d10 die dataserver sites is poor and bland. In addition, access to roll. You won't achieve the same kind of bell curve, but remote software applications is limited to public-domain the results will be suciently randomized. applications. Datafortresses are the restricted hidden levels of a The Net dataserver providing remote access to restricted data or software applciations to authorized users. Security is The Net is a global computer network allowing fast maintained through the datafortress' DataWall program. and convenient access to millions of computers from The level of security restriction depends on the value of any other computer on earth or beyond. Any computer the information or application. Secure information may connected to this network has the capability to access be housed on the same dataserver as public information, information from any other computer connected to this only hidden in restricted directories, eectively invisible network regardless of distance or time of day. Whether it from those who lack proper authorization. Authorization is called the Internet, the Web, the Cybernet, the Face, comes with proper identication. Identication can or the Net, all use dierent special eects and technolo- come in many forms: Authorized Net LDLs, passwords, gies to describe the same thing. This plug-in assumes a proper interface software, or even biometric data. near-future setting which makes use of a Virtual Reality It is a hacker's goal in life to gain unrestricted access interface and gives exciting names to actions and tasks to restricted information, uncover secrets, make unau- which can be easily modied to t a more mundane thorized changes to data, or to use a restricted software modern setting. application. Instant Netrunning Netrunning Softwares 1/25 When attempting to gain unauthorized access to a cor- porate datafortress, the hacker establishes a legal con- nection to the company's dataserver. Once connected, The SysAdmin the hacker has normal access to the free services. Nor- mally, an authorized user will then use an interface pro- The SysAdmin is in charge of security for a gram to gain access to the datafortress. The datafortress' Dataserver/Datafortress. It is their primary job to pre- Code Gate program veries authorization and allows ac- vent Hackers from illegally gaining unauthorized access cess. The hacker attempts to fool the code gate into to restricted data. It is their secondary job to catch authorizing entry. Should that fail, the hacker may at- hackers who have already have. tempt to gain entry by disabling the DataWall program protecting the information. SysAdmins use their own computers connected to a Dataserver/Datafortress to execute software applica- Once past security, the Datafortress constantly re-checks tions. The Dataserver/Datafortress itself uses software authorization through the use of Detection software. De- such as Codegates, Datawalls, and Detection software tection software double-checks the authorization of all deter and identify hackers, yet allow authorized users in. the users connected to the datafortress. If it nds a discrepancy or error, it noties the Datafortress System A Datafortress is also characterized by its Power and its Administrator (SysAdmin) who will either attempt to Speed. A Datafortress is also rated by a Security Level disconnect the hacker, determine the hacker's location from 1 to 10. This number is added as a skill would to with a Trace application, disable the hacker's software the computer's Power when executing software applica- with an Anti-ICE application, disable the hacker's com- tions. The computer's Security Level is also it's Trace puter with Anti-System software, or physically injure the Value if being used to chain connections. A SysAdmin hacker with Anti-Personnel software. The hacker uses can't do anything to catch a Hacker if he doesn't know Stealth software to fool detection software into either they're there, so the SysAdmin relies heavily on De- authorizing or ignoring the hacker's connection. If dis- tection software to notify them of unauthorized access. covered, the hacker may ght back against the SysAdmin Once detected, the SysAdmin can run Anti- Personnel with Anti-ICE, Anti-System, or Anti-Personnel software software against the intruder, or opt to trace the hacker of their own. and run Anti-System software against the Hacker's com- puter. Should the hacker gain access to the Datafortress' di- rectories, they may view, copy, or alter data. Data The Computers comes in the form of online applications for remote use, inter-oce communication, public display data (text, Computers, whether they are Palmtops, Desktops, Mi- audio-video, or VR), databases, or records. nis, or mainframe supercomputers, exist to execute soft- ware applications. The computer is characterized by its Power and its Speed and its Security Level. The Hacker The Power is used like the computer's Body and it's Reexes, it determines it's resiliency to attack and its The Hacker's arsenal includes a computer, specialized base chance to perform an action. Power is based on the hacking software, and, foremost, a way to connect to number of Central Processing Units driving a computer. a remote target computer, usually via the Net though One CPU has a Power of 3, each additional CPU adds direct connections, however unwise, can be made. an additional 3. Each CPU costs $10,000. A Computer may have up to 7 CPUs for a Power of 21. Additional A Hacker's access to the Net is very important. To con- CPUs increase processing capacity and provide backups nect to the Net, the Hacker must have an LDL. LDL's in case one CPU should fail due to Anti-System soft- cost 50 euro a month from the Internet Corporation, ware. though they, too, can be hacked. Connections between computers are relatively easy to trace. Each computer A Computer's CPU also determines how much software connection has a corresponding Trace Value from 1 to it can run and data it can store. Software and Data 10. Hackers generally make a chain of several connec- are stored in Memory Units. A Computer can store as tions before they proceed to their target computer. A many MU's as it's CPU x 40. Memory can be improved SysAdmin wishing to trace the ultimate origin of the for $250 per MU. CPUs also determines the starting Hacker must trace every connection to nd the source. level of system Datawall. A Datafortress' base Datawall strength is equal to the number of CPUs driving it. 2/25 Instant Netrunning Netrunning Softwares Computers with Powers higher than 10 are Articial Cyberdecks vs. Computers Intelligences with complete personalities and full inter- activity. Power can be decreased for a cost reduction In games where cybernetic interfaces are common and of $3000 per level. A Computer may also possess skills older manual interfaces are uncommon, simply apply a like a character.
Recommended publications
  • Cyberpunk 2077 : the Complete Official Guide Pdf, Epub, Ebook
    CYBERPUNK 2077 : THE COMPLETE OFFICIAL GUIDE PDF, EPUB, EBOOK Piggyback | 480 pages | 10 Dec 2020 | PIGGYBACK INTERACTIVE | 9781911015772 | English | none Cyberpunk 2077 : The Complete Official Guide PDF Book Here are nine very useful ways to prepare for the game's imminent release , and here's a look at the eight year wait for CD Projekt Red's massive RPG. One lucky person is about to have an amazing Christmas thanks to this incredible Lego Star Wars set worth R! Do you want to learn about Cyberpunk genre motifs, genre history, and most important works? Choose an option Softcover Hardcover Clear. Float Left Float Right. Collectible Hardcover Guide Includes: - Deluxe foil stamped hardcover strategy guide featuring exclusive art specifically created by the artists at CD Projekt Red. Prepare to meet a lot of intense characters like V or Johnny Silverhand , urban mercenaries of the future obsessed with body modifications and equipped with cybernetic enhancements. What size image should we insert? Regardless of your character's origin and play style, all new players going into Night City could benefit from this guide. Get your Pro tips now.? Hi-res maps of Night City: each annotated with locations of collectibles and points of interest. Jan 16, PST. Verily a tome of Tolstoyan proportions. With details on every last challenge and feature, the guide offers streamlined progression through the entire adventure, as well as a commanding expertise on all key systems. Explore the various districts, gangs, and history of Night City. Boutique is a participant in the Amazon Associates Program. Similar sponsored items Feedback on our suggestions - Similar sponsored items.
    [Show full text]
  • MARCH 1St 2018
    March 1st We love you, Archivist! MARCH 1st 2018 Attention PDF authors and publishers: Da Archive runs on your tolerance. If you want your product removed from this list, just tell us and it will not be included. This is a compilation of pdf share threads since 2015 and the rpg generals threads. Some things are from even earlier, like Lotsastuff’s collection. Thanks Lotsastuff, your pdf was inspirational. And all the Awesome Pioneer Dudes who built the foundations. Many of their names are still in the Big Collections A THOUSAND THANK YOUS to the Anon Brigade, who do all the digging, loading, and posting. Especially those elite commandos, the Nametag Legionaires, who selflessly achieve the improbable. - - - - - - - – - - - - - - - - – - - - - - - - - - - - - - - – - - - - - – The New Big Dog on the Block is Da Curated Archive. It probably has what you are looking for, so you might want to look there first. - - - - - - - – - - - - - - - - – - - - - - - - - - - - - - - – - - - - - – Don't think of this as a library index, think of it as Portobello Road in London, filled with bookstores and little street market booths and you have to talk to each shopkeeper. It has been cleaned up some, labeled poorly, and shuffled about a little to perhaps be more useful. There are links to ~16,000 pdfs. Don't be intimidated, some are duplicates. Go get a coffee and browse. Some links are encoded without a hyperlink to restrict spiderbot activity. You will have to complete the link. Sorry for the inconvenience. Others are encoded but have a working hyperlink underneath. Some are Spoonerisms or even written backwards, Enjoy! ss, @SS or $$ is Send Spaace, m3g@ is Megaa, <d0t> is a period or dot as in dot com, etc.
    [Show full text]
  • BEYOND the EDGE Inside the Edgerunner Altcult C Ontents ST ILL
    EDGEBOOK1a.qxd 12/19/07 12:06 PM Page 1 InsideInside thethe EdgerunnerEdgerunner AltcultAltcult Sample file THE CYBERPUNKS RETURN TO NIGHT CITY BEYOND THE EDGE 2 InsideInside thethe EdgerunnerEdgerunner AltcultAltcult MEE T TH E CAS T , CRE W AN D TH E LEG A L STU F F Cre w Co n t e n t s Wr i t e r s STI L L ON THE EDG E IN 20 3 X Ken MacKriell RIS E OF THE ‘R UN N E R S : THE KNO W N HIS T O R Y.. 4 Mike Pondsmith THE SEC R E T HIS T O R Y OF THE EDG E R U N N E R S .. 8 WHO RUN S THE EDG E R U N N E R S ? .. .1 3 Cover & Illustrations LEA D E R S .. .1 4 Jay Libby DYL A N MUR P H Y .. .1 4 Otto Blix SET H MEN D E Z .. .1 6 Mike Pondsmith MON I C A CHE U N G .. .1 8 VID A -M AR I A WES T .. .1 9 Layout & Design “P RI N C E ” LEO BAK H T I A R .. .2 1 VIN C E N T “S IL K ” FOU C A U L T.. .2 2 Mike Pondsmith THE PLAY E R S .. .2 4 Ty p o g r a p h y FATH E R KEV I N SUL L I VA N .. .2 4 Ted Tal s o r i a n OLE G MIK H A I L O V .
    [Show full text]
  • Cyberpunk 2020
    Appenix C: Alternative Character Generation This appendix is a synthesis of Interlock, Fuzion, supporting character. So, as an alternative, I've as well as some alternative material from a also included a campaign style table adapted number of websites, including Ocelot's CharGen from the Bubblegum Crisis RPG: System and Blackhammer's merits & flaws. It's core is based on Interlock, with some common Campaign Style Points sense items dragged in from the other Available components. I'm going to start right off the bat by Competent/Realistic 18 points suggesting that you also download the Exceptional/Semi-realistic/Elite 24 points Cyberpunk Master Skill Guide. It will provide you Heroic/TV Action Show 32 points a vast array of definitions of skills, special Legendary/Action Movie 40 points abilities, roles, and statistics. Superheroic/Mythic/Comic Book 48 points Cosmic/Godlike 55 points Okay, all done? Good. Now let's take care of STEP ONE: SET STATS aging. Pick an age of 16 or older, or roll 2d6 and All the stats from CP2020 remain (INT, REF, add 16. Then consult the following chart, if your TECH, COOL, ATTR, LUCK, MA, BODY, EMP). referee allows you to do so: All stats start Final Stat Final Cost Age Total Bonus Other Effects at 5. Now take Points (Cumulative) 21 points and 1 -6 16 0 use them to 2 -4 17 1 buy that’s up 3 -2 or down. You 4 -1 18 2 can also lower 5 0 19 4 stats. Use this 6 1 20 6 chart. 7 2 21 8 8 3 22 10 9 5 23 13 10 7 24 16 25 19 -1 REF We're not quite done yet with the Stats.
    [Show full text]
  • NISEI Comprehensive Rules Document This Rules Document Is to Be Used As Reference Material
    NISEI Comprehensive Rules Document This rules document is to be used as reference material. It is not intended to be read straight through. If you still have questions after consulting this document, please ask us online via email or Twitter. ​ ​ ​ ​ ​ ​ This is version 1.4 of this document, effective 20 December 2019. ​ ​ ​ ​ Summary of Changes Changes from version 1.3 are highlighted in orange. ​ ​ ● Added our email address. ● Performed a complete rewrite and reorganization of section 1.14 (Targets) and section 9 (Abilities). ​ ​ ​ ​ ● Updated imprecise terminology throughout the document to improve clarity now that terms like "using" and "instruction" are used extensively in the rules for abilities. ● Added rules for interrupts (section 9.8) and the interrupt symbol (rule 1.3.10). ​ ​ ​ ​ ● Added rules for double-sided identities (rule 1.5.4d, rule 1.6b, and rule 3.1.1a). ​ ​ ​ ​ ​ ​ ● Clarified that the terms "spend" and "pay" are synonyms (Rule 1.10.3c). ​ ​ ● Expanded the definition of the "source" of an ability and moved these rules from section 1.13.5 to ​ ​ section 9.1.3. ​ ● Codified rules about inherent costs (rule 1.15.4a and rule 1.15.4b). ​ ​ ​ ​ ● Added “if you do" expressions to the list of ways nested costs can be formatted (section 1.15.10). ​ ​ ● Clarified that if a replacement effect replaces adding a card to a hand, score area, or discard pile, that card can still count as drawn, scored, stolen, or trashed (rule 1.8.5, rule 1.16.3f, and rule 1.18.1a). ​ ​ ​ ​ ​ ​ ● Defined "advanced card" (rule 1.17.3). ​ ​ ● Expanded rules on "reveal" and card visibility in general.
    [Show full text]
  • The Top Runners' Quarterly
    The Top Runners‘ Quarterly Newsletter of The Top Runners‘ Conference, The Official Netrunner Players‘ Organization Volume 3, Issue 2 Second Quarter, 1999 www.cyberjunkie.com/trc, www.geocities.com/sunsetstrip/basement/9666 World Domination 1999: Dreff's Revenge State of the Corp—June 1999 by Lukas Kautzsch by Jennifer Clarke Wilkes <[email protected]> <[email protected]> An der Roßweid 18a, 76229 Karlsruhe, Germany There’s little to report on the new cards front, I’m The qualification stage is over: A total of 184 players showed ® th afraid. The Pokémon madness has knocked all the other up in 25 World Domination Qualifier events from March 12 to April card games off balance a bit, though things are calming 25th, leading to 42 qualified players in addition to the 19 prequalified down now and real work can begin. It will probably mean ones (top places from last year’s World Domination and National/Regional championships). Of these players, 21 come from the the cards come out quite late, perhaps not until the end of the United States, 15 from Germany, 6 from the UK, 4 each from France, year. You can be sure I’ll let everyone know whenever I Canada, and Brazil, 2 each from Belgium and Switzerland, and 1 each have news. from the Netherlands, Australia, and New Zealand. However, Wizards of the Coast is supporting the first official US Netrunner Nationals! The tournament will There will be 7 World Domination round 1 tournaments: ® be held at GEN CON in Milwaukee, WI, on the weekend of 1.
    [Show full text]
  • Datafortress 2020
    Presents: INTERLOCK REVISED, REPAIRED, AND RE-EXAMINED A FAN PROJECT FOR FANS - THIS VERSION UPDATED 7-07-14 Written by Deric Bernier ([email protected] ) and R.Talsorian Games (with permission) Table of Contents: Art by Deric Bernier Introduction Pg 1 Indirect Fire Pg 42 ([email protected] ) and 1. Part 1: The Basics Pg 2 Reloads Carried Pg 42 R.Talsorian Games (with permission) Statistics Pg 2 Melee Combat Pg 43 2. Character Identity and Roles Pg 3 Key Attacks Pg 42 Contributions by: Joe Klemann, Ross Standard Roles Pg 3 Moving Attack Maneuvers Pg 46 Wynn, Cameron Jacobs, James Bernier, Multiple Roles Pg 3 Counter Attack Pg 46 Brandon Fleming, Jesse Miller, Richard Role Descriptions Pg 3 Melee Damage Pg 46 Balmer, Jason Parent, Ted Salonich, Paul 3. Skills Pg 5 Improvised Weapons Pg 46 Romine, Richard Harris, Gary Astleford, Learning New Skills Pg 5 Hand To Hand Penalties Pg 47 Tom Mosely, Suhiir, Trentin C Bergeron, IP Distribution Pg 5 Friendly Fighting Pg 47 Jim Lawrie, Omar (Blank Redge), Mike Skill list by era/setting Pg 7 Incapacitation/Nerve Clusters Pg 47 Van Atta, David Pietz, Steven Rennie, Skill Descriptions Pg 8 Death & Maiming Pg 47 Dan Winemiller, David Simpson, Karsten Languages Pg 14 Called Shots Pg 48 Voigt, Seth Skorkowsky, James Durand, Martial Arts Pg 15 Surprise Melee Attacks Pg 48 Sardukhar, Kyberpunkki, Richard Skills And Task Resolution Pg 16 Other Combat Rules Pg 49 Glendinning, Mark Cook, C. J. Maddox 4. Breathing Life Into Your Character Pg 17 Chink In The Armor Pg 49 Origins And Personal Style Pg 18 SP and Its Relation To SDP Pg 49 Playtesters: Motivations Pg 19 Taking It Like A Man Pg 49 Jeff Gray Life Events Pg 20 Falling Damage Pg 49 Matt Baldwin Friends & Enemies Pg 21 Impact Damage Pg 49 Andrew Steel Romantic Life Pg 21 Hard Road (vehicle rules) Pg 50 Al Bob Misc.
    [Show full text]
  • Cyberpunk Red Errata Last Updated 06.02.2021
    BY ANSELM ZIELONKA cyberpunk red errata last updated 06.02.2021 The following errata applies to the First and Second Printing of the Cyberpunk RED core rulebook. The changes have been applied to the digital version which is marked as v1.25. Copyright © 2020 by R. Talsorian Games, Inc., Cyberpunk is a registered trademark of CD Projekt Red S.A. All rights reserved under the Universal Copyrights Convention. All situations, governments, and people herein are fictional. Any similarities portrayed herein without satiric intent are strictly coincidental. 1 CYBERPUNK RED ERRATA Changes for v1.25/3rd Printing are noted with an @ at the front of the entry. Minor typos have been fixed throughout the book. Page 63: On the What Kind of Corp Do You Work For table you roll 1d10, not 1d6. Page 95: The Air Pistol listing on the Exotic Weapons table incorrectly notes it as a Very Heavy Pistol. It is a Medium Pistol. @ Page 102 and 356: The cost of High Fashion jewelry has been changed to 5,000 (Luxury). Page 114: The Description & Data for Grafted Muscle and Bone Lace has changed to clarify multiple instances stack. It now reads: Increases BODY by 2. The increase changes HP, Wound Threshold, and Death Save. Multiple installments stack. Cannot raise BODY above 10. Page 117: The EMP loss for the Cyberware packages are incorrect. They should read as follows: Rockerboy: -1 EMP • Solo: -2 EMP • Netrunner: -2 EMP • Tech: -2 EMP • Medtech: -2 EMP • Media: -1 EMP • Lawman: -1 EMP • Exec: -2 EMP • Fixer: -2 EMP • Nomad: -2 EMP @ Page 121: The chapter subheader has been changed to read 2023 (22 Years Ago).
    [Show full text]
  • OVERVIEW of NETRUNNER Netrunner Is a Two-Player Deckmaster® Game Set in the World of R
    Versione 1.0 – Dal sito http://www.incabrain.com/netrunner/rules.htm The contents of this page are ©1996 Wizards of the Coast, Inc. Cyberpunk 2020, Cyberpunk, and Netrunner therein are trademarks of R. Talsorian Games, Inc. Copyrights in certain text, graphic designs, characters, and places derived from Cyberpunk 2020® are the property of R. Talsorian Games, Inc., and are produced under license to Wizards of the Coast, Inc. Deckmaster, Wizards of the Coast, and Proteus™ are registered trademarks of Wizards of the Coast, Inc. This copy of the Netrunner rules was originally posted as a text file to Netrunner-L on April 18, 1996 by Marc Schmalz, a WotC employee who was netrepping at the time. i have reformatted the original text file to more closely match the original rulebook, since much of the formatting was lost in the text file (you'll note that many of the symbols are missing too). i have also added some text (from pp44-46) that was missing from the file. If anyone at WotC has an objection to my posting these rules, please feel free to contact me at azuay\at/incabrain\dot/com. OVERVIEW OF NETRUNNER Netrunner is a two-player Deckmaster® game set in the world of R. Talsorian's Cyberpunk® roleplaying game. There are two roles in Netrunner: the Runner, who is a high-tech data thief; and the Corporation. Using a computer that feeds output from a telecommunication link directly to his or her brain, the Runner navigates the virtual-reality environment of a global computer network known as the Net.
    [Show full text]
  • JULY 25Th 2018
    July 25th We love you, Archivist! JULY 25th 2018 Attention PDF authors and publishers: Da Archive runs on your tolerance. If you want your product removed from this list, just tell us and it will not be included. This is a compilation of pdf share threads since 2015 and the rpg generals threads. Some things are from even earlier, like Lotsastuff’s collection. Thanks Lotsastuff, your pdf was inspirational. And all the Awesome Pioneer Dudes who built the foundations. Many of their names are still in the Big Collections A THOUSAND THANK YOUS to the Anon Brigade, who do all the digging, loading, and posting. Especially those elite commandos, the Nametag Legionaires, who selflessly achieve the improbable. - - - - - - - – - - - - - - - - – - - - - - - - - - - - - - - – - - - - - – The New Big Dog on the Block is Da Curated Archive. It probably has what you are looking for, so you might want to look there first. - - - - - - - – - - - - - - - - – - - - - - - - - - - - - - - – - - - - - – Don't think of this as a library index, think of it as Portobello Road in London, filled with bookstores and little street market booths and you have to talk to each shopkeeper. It has been cleaned up some, labeled poorly, and shuffled about a little to perhaps be more useful. There are links to ~16,000 pdfs. Don't be intimidated, some are duplicates. Go get a coffee and browse. Some links are encoded without a hyperlink to restrict spiderbot activity. You will have to complete the link. Sorry for the inconvenience. Others are encoded but have a working hyperlink underneath. Some are Spoonerisms or even written backwards, Enjoy! ss, @SS or $$ is Send Spaace, m3g@ is Megaa, <d0t> is a period or dot as in dot com, etc.
    [Show full text]
  • Cast and Crew
    CAST AND CREW Writing and Design by Mike Pondsmith, James Hutt, Cody Pondsmith, Jay Parker, J Gray, David Ackerman, and Jaye Kovach Based on Material Originally Created by David Ackerman, Matt Anacleto, Mike Blum, Edward Bolme, Colin Fisk, Dave Friedland, Bruce Harlick, Scott Hedrick, Michael LaBossiere, Mike MacDonald, Will Moss, Lisa Pondsmith, Mike Pondsmith, Derek Quintanar, Mike Roter, Scott Ruggels, Craig Sheeley, Mark Schumann, Ross Winn, Benjamin Wright, and the many writers who worked on the Cyberpunk line in the past. Beat Chart Concepts Contributed by Flint Dille Lyrics for Black Dog and Never Fade Away by David Sandström and Dennis Lyxzén Business Management by Lisa Pondsmith Project Management by Cody Pondsmith and Mike Pondsmith Art Direction by Jaye Kovach Cover Illustration by Anselm Zielonka Interior Illustration and Graphics by Doug Anderson, Bad Moon Art Studio, Richard Bagnall, Santiago Betancur, Neil Branquinho, Alexander Dudar, Colin Fisk, Matthew S. Francella, Hélio Frazão, Huntang, J Gray, Maksym Harahulin, DariusK, Jaye Kovach, Bernard Kowalczuk, Adrian Marc, Jan Marek, Eddie Mendoza, Pedram Mohammadi, Alan Okamoto, Anna Podedworna, Sebastian Szmyd, Eve Ventrue, 望瑾 Jin Wang, Wavefront, and Anselm Zielonka Editing by Carol Darnell, Michael Matheson, Josh Vogt, and Dixie Cochran Layout and Page Design by J Gray, Irrgardless, and Adam Jury Product Consultation by Aron Tarbuck Playtesting and Beta Reading by James "ELH" Adams, Azalah, Jared Doyle Barnes, Ben, Gabriel Boleau, Naomi Calhoun, Matt "Sir Fluffles" Carroll, Kevin Diehl, Linda "Druttercup" Evans, James Fullerton, Allen Hawkins, Matthew House, Jay Jasti, Paul Khalifé, The MadQueen, Ashley Mayo, Leon "Leothedino" Mendez, Dan "F00d4Th0ught" Richardson, Ryan "Boss_Angler" St.
    [Show full text]
  • GURPS Cyberpunk Is Copyright © 1990 by Steve Jackson Games Incorporated
    GUMCYBERPUNK High-Tech Low-Life Roleplaying By Loyd Blankenship Edited by Steve Jackson and Creede Lambard Additional Material by Brian Edge, Cheryl G. Freedman, Steve Jackson, Mike Nystul, Creede Lambard, David Pulver, Alex Von Thorn, and Karl Wu Cover by David Schleinkofer Illustrated by Paul Mounts, Carl Anderson, Angela Bostick and Rick Lowry GURPS System Design by Steve Jackson Loyd Blankenship, Managing Editor Carl Anderson, Production Manager Page Layout and Typography by Loyd Blankenship Production by Carl Anderson and Dana Blankenship Proofreading by Chris McCubbin Hacking Consultants: The Legion of Doom Unsolicited Comments: United States Secret Service Dedicated with love to my wife, Whitney, who is my strength when I'm weak and my hope when I despair. Ideas and Comments: Randy Abel, Whitney Blankenship, John M. Ford, David Greig, Chris Goggans, Kerry Havas, Caroline Julian, Lisa Mackenzie and the Z-Team (Bill Ayers, Sheryl Beaver, Steven Drevik, Allen Hsu, Colin Klipsch, Tery Massey, Chris Peterson, Matt Riggsby and Tim VanBeke) Playtesters: Lowell Blankenship, John Boulton, Bill Brantley, Eric Brantley, Timothy M. Carroll, Bryan Case, Jay Charters, Mike Crhak, Loren Davie, Mike DeWolfe, Brian Edge, Aaron Johnson, Jason Johnson, Mark Johnson, Ben Kloepper, John Kono, Michael Lee, Dave Magnenat, Scott Paul Maykrantz, Kathy McClure, Scott McClure, Janet Naylor, Mike Naylor, David Pulver, Scott Smith, Steve Stevens, Jason Stiney, John Sullivan, Theresa Verity, Sasha Van Hellberg, Chris Vermeers, Jerry Westergaard, Tony Winkler, Richard Wu, Snowden Wyatt, Anna Yuzefov, Bryan Zarnett and Zlika GURPS, Rcleplayer and the all-seeing pyramid are registered trademarks and Supers is a trademark of Steve Jackson Games Incorporated.
    [Show full text]