From: Deadlock <[d--dl--k] at [hopi.dtcc.edu]> Newsgroups: rec.games.frp.cyber Subject: [REPOST] Programming 101 Date: Tue, 23 Apr 1996 20:32:06 -0400 Because of the demand for the warez I have written, I am postin' 'em again for those who have missed out on the salez. ============================================================================== Hello, all you weefle runners out there. This includes all you posers out there tryin' tah invade the matrix too! I just formed a small corp in my apartment called Deadlock Enterprises and I deal in software at the moment. Software you can use on your run in the Net. If you want a copy of my warez, drop me a line. This is the actual deal, choomba. My Cyber Master said if I can get people to write me and say that their Cyberpunk 2.0.2.0 characters want copies of the programs I write for my netrunner, I can use them as a valid sale for my character. WRITE AND REQUEST COPIES NOW!!!! NAME: Sapper STRENGTH: 2 COST: 250eb MU: 3 CLASS: Intrusion PROG/DIFF: 150/25 FUNCTIONS: Intrusion (15) OPTIONS: Invisibility (3); Superrealistic ICON (5) COST MULTIPLIER: x1 (Intrusion x1) Sapper uses small electrical pulses to breech data walls. The drawback to this is it sets off a loud electrical "explosion" on the final breech. It will alert any Anti-IC, Anti-Personnel, or Sysop to where the breech occurred after 1D10 rounds. The attack does 1D6 damage to the data wall's strength. ICON: A small, statured person wearing black underwear and carrying several satchel charges under his arms. NAME: Dynamite STRENGTH: 4 COST: 240eb MU: 3 CLASS: Intrusion PROG/DIFF: 144/24 FUNCTIONS: Intrusion (15) OPTIONS: Superrealistic ICON (5) COST MULTIPLIER: x1 (Intrusion x1) Dynamite is a stronger version of Sapper. It bombards the data wall with a strong electrical pulse. The attack will do 2D6 damage to the data wall's strength. It is very noisy and will automatically alert any defense program within ten spaces. ICON: Six sticks of dynamite tied together with four wires (red, blue, green, and yellow) and attached to a stopwatch. NAME: C-4 STRENGTH: 7 COST: 270eb MU: 4 CLASS: Intrusion PROG/DIFF: FUNCTIONS: Intrusion (15) OPTIONS: Superrealistic ICON (5) COST MODIFIER: x1 (Intrusion x1) As modern technology keeps up in the real world, so must it keep up in the matrix. Here is another installment in my Explosive series of Intrusion programs to ass to your arsenal. This "explosive" bombards the data wall with an even stronger pulse of raw electrical power. The "explosive" will do 3D6 damage to the data wall's strength. Although it is not as loud as the other two in the series, it will automatically alert any defense system within seven spaces after 1D10/2 rounds. ICON: A ball of pink clay with a timer imbedded in it. NAME: Recon STRENGTH: 4 COST: 420eb MU: 7 CLASS: Intrusion PROG/DIFF: 252/42 FUNCTIONS: Intrusion (15) OPTIONS: Movement Ability (5); Recognition (2); Invisibilty (3); Memory (5); Endurance (3); Superrealistic ICON (5) COST MULTIPLIER: x1 (Intrusion x1) For those who prefer the silent approach to entering a Data Fortress, Deadlock Enterprises proudly introduces the first program in the Recon Series. This program is designed to emulate part of the architecture of the structure, slip in, and reconnaissance the contents contained within. It can recognize the difference between a program's signal and one belonging to a netrunner, it will remember anything it comes across, it's invisible, and best of all, it doesn't stop until it returns to you or it gets deleted by the opposition! ICON: A small man wearing black and gray camouflage fatigues carrying a wide variety of breaking and entrance tools. NAME: Fire Support STRENGTH: 3 COST: 1,120eb MU: 4 CLASS: Anti-IC PROG/DIFF: 168/28 FUNCTIONS: Anti-Program (20) OPTIONS: Superrealistic ICON (5) COST MULTIPLIER: x4 (Anti-IC x4) In a bind, that Anti-Personnel program about to flatline you? Not to worry, just call in some fire support. Go ahead, the other guys are doing it and so should you! This program enters the main processing module of the program and enters error statements into it. ICON: A battery of three 240mm Howitzers. NAME: Sniper STRENGTH: 6 COST: 1,400eb MU: 5 CLASS: Demon PROG/DIFF: 210/35 FUNCTIONS: Compiler (10) OPTIONS: Movement Abililty (5); Recognition (2); Invisibility (3); Superrealistic ICON (5) COST MULTIPLIER: x4 (Compiler x4) You've seen it here first as a customer and not as a target, the first compiler in the Soldier Series! It carries four programs as well as being able to move independently, recognize the difference between a netrunner and a program, and it's invisible. ICON: A huge, powerfully built caucasian male. He is dressed in a gully suit with the standard forest camouflage pattern. He is armed with a Walther 2000 Sniper Rifle. NAME: Sniper Subroutine PROG/DIFF: 195/32.5 COST: 3,150eb FUNCTIONS: Evasion (10); Stealth (15); Anti-IC (20); Anti-Personnel (20) COST MULTIPLIER: x200 (Evasion x2; Stealth x2; Anti-IC x4; Anti-Personnel x25; Subroutine x1/2) Those who live by the sword, get shot with a gun! EMAIL: [d--dl--k] at [hopi.dtcc.edu] HOME PAGE: http://www.dtcc.edu/personal/staff/deadlock/