is the Information Galactic Highway. From the
smallest personal computer, to the Holonet, to the super
computers of the Imperial fleet.
could be described as a living computer entity. It
is an infinite world made up of billions of smaller
Hackers, or computer geeks. Whatever you call them,
be they hacking from home or be Corporate Sector Wage
Slaves, these are the ones who know how to 'surf' the
Matrix appears to your PC's is up to you. Personally
I have each System be designed according to it's owner.
So Knight Industries system may well look like a Medieval
Castle, Reg's Speeder may appear as a Speeder Lot, while
Big Dick's home system could be.. well, anything.
character enters the Matrix they can usually choose their
own form, though this may well depend on the system they
are accessing from.
Computer (100 credits) - these have limited
access capabilities. Full Matrix access is not
possible as pocket computers don't have neural
(500 credits - 2000 credits with implant connection) -
these are the tools of the true Slicer. Two kinds of
access is possible. A Neutal connector is placed on
the users temples, not requiring any implants, or via a
direct Cyber-jack implant. Either way transfers the
users consciousness into the Matrix.
System (20,000+ credits) - As per a Cyber-Deck, though
usually much more powerful giving it's users extra
abilities and access to nearly unlimited software and
of the Matrix
(Central Processing Unit) - this is what controls the
system and is usually well guarded. Large
Corporations or Imperial systems will often have many
defenses. Once the CPU is accessed the Slicer can do
whatever he wishes to a system. The CPU can only be
Accessed by characters with Computer Engineer (A).
They will have to make an opposed roll vs. the CPU using
their Advanced (A) skill only.
all Patrol Software
infect the system
Gate / Security Alert - in other words, 'What is your
password?' The Slicer must roll their Security skill
to by-pass Security Gates & Alerts. If the
Slicer rolls 3 less than the difficulty for a Security
Alert then an alarm will sound to the System
Store - this is where the info is. It's the same
as a Windows directory or folder, though in the Matrix it
could appear as anything from a house to a blue ball.
Just because you can get the data though doesn't mean that
the file isn't passworded or in code.
Terminal - whether from a pocket computer, Cyber-Deck,
or the on desk office terminal, this is where you access
from. Some access terminals can be remote access,
connecting the small system to the Computer Matrix.
Guardian / Sentinel - these are defense programs.
They can either sit in one location to protect a Data
Store or the CPU, or roam the system looking for
intruders. Without proper access codes these defense
programs will always attack, their aim being to dump
Slicers from the system.
Simple Computer System
like this: This system can only be accessed via one
of four Access Terminals. The user must first pass
the Security Gate (Moderate difficulty for a Slicer).
The user can either access the first Data Store
(Directory/folder) or continue to one of the next two Data
Stores. However, the System Administrator has
invested in a Patrol Program. Unauthorised users
would need to destroy the Patrol before proceeding.
There is then another Security Gate that needs to be
by-passed to gain access to the Data Store or the CPU.
This would be an Easy to Moderate system for a Slicer to
You may not
want to always draw the system, especially for large
Corporations that have thousands of Access Terminals and
Data Stores. A Small area of the system could be
drawn, or describe it as it is viewed
you exit the blue grass valley a castle only seen in fairy
stories, and on the Knight Industries corporate logo,
looms before you. As you approach you find that the
Draw-Bridge to the Castle is raised. To your right
is a computer post with four buttons requiring the correct
four digit sequence (This is a Security Gate: Moderate
Security is required). You now find yourself in
the courtyard with many smaller buildings in perfect order
(Data Stores). You hear the sound of hooves,
what do you do (PC "I hide" - roll dice).
Sorry, you failed to move quick enough. Before you
now is a magnificent white steed, it's rider dressed in
resplendent Knights armour wielding a menacing looking
Mace. (This is a Guardian - roll combat).
Store Access Difficulties / System Costs / CPU Rating
cr - 1000 cr
cr - 20,000 cr
cr - 1,000,000 cr
cr - 1,000,000 cr
- Very Difficult
guards and intelligent programs that can either wait for
hackers or surf for the intruder.
programs may be purchased, though restricted on some
worlds, to help access to computer systems.
Programs gives the Slicer a bonus onto their Attack or
Defense skills when in Combat. Slicer Programs give
other bonus's. Shadow software is used to hide from
Patrols or other system users, Skeleton Keys give a bonus
vs. Security Gates & alerts while Smart Bombs are
simply that, bombs that can be used against all patrols of
a type or against an individual (such as the system
Administrator who is trying to kick you out!)
are expended once the character disconnects from
the system. Being dumped therefore wastes the
(dumps all guards of a type or used as a weapon
against a single target)
Patrol 500 cr
Guardian 1000 cr
Sentinel 2000 cr
All 10,000 cr
3D 200 cr.
5D 350 cr
7D 500 cr
program can be used only once. Using a ‘vs. All’ Smart
Bomb clears the system of all Computer Guards. However, it
would only take a moment for someone to reload them and
does not dump users.
It's got to
happen. It will happen, the first time you encounter
a Patrol. MATRIX combat is much like normal combat,
though no one really gets hurt, just dumped from the
Computers & Computer Eng (A)
Computer Attack /
Defense Total - this
is the users Computers + Computer Eng (A)
play Computer-wounds as per 2nd Edition rules, or
if you like my hit-point rules roll Computers to a Computer-Stamina
Strength / Damage
- This is your characters Computers skill (do not add
character declares their actions (see below). Most
of the actions are for Advanced (A) skilled characters.
The Advanced (A) skill is added to the combat roll.
In order for the move to be successful the character must
move difficulty number with their Advanced dice only.
I therefore recommend using different coloured dice for
the Advanced. All dice are counted for the attac
total. Descriptions of moves are below.
/ Melee / Brawl
Character form a bolt of lightening in their hand, firing
it at their opponent
Kasi Kick Combo
Character levitates and delivers a multitude of kicks at
to all nearby targets
Creates a sphere of energy around character that explodes
outwards in all directions
/ Virus / Dump
Opponents Computer Eng (A) +5
Dumps opponent from the system
Access / Alter opponents form
Opponents Computer Eng (A) +10
Either alter Opponents appearance or their Access so they
too are deemed as an Intruder.
difficulty is made Roll an extra 1D for this Dodge or
Parry & count 6’s as in a Wild Die (ignore 1’s)
Shield / Great Shield
10 / 15
/ +2D Armour