Game Play |
Lexicon
LEXICON
Agent:
Expert program designed mainly to collect and distribute data over
The NET. The most sophisticated will protect systems
against intrusions or effectuate complex transactions in the name
of its owner.
Anti-Virus: Software that is used to
fight off viral
infections by repairing the
damage sustained.
Avatar:
The most complex type of agent.
The avatar
represents its owner on The Net. An avatar
can be designed as a receptionist, a legal counsel, a stockbroker,
a system
administrator, etc... The software loaded into the
avatar
will determine its functionality. The NET interface represents
them in human form.
Backdoor:
A backdoor
is a secret access to a system.
By placing a backdoor
into a system's
core,
the next time you access that system,
you will be granted full access privileges even to the private
nodes
of that system.
Breakthrough:
A breakthrough
is a major scientific discovery. It can be found mainly in the
highly secure datastores
of research centers. breakthrough
can be combined to develop a technology
or sold on the black market.
Core:
A node
representing key access to the main processors and functions of a
system.
There is a single core
in every system.
Corporate
Financial Data: Confidential financial information about a
megacorporation that can be sold on the black market. This data is
used in insider trading by shady figures or sold back to the
competition.
Crack:
Software that permits you to open the door of a Warden ICE even
if you do not have a password.
Credit:
The currency in The NET is the credit.
An agent
can accomplish embezzlement by breaking into corporate
datastore
and finding data
blocks
with account numbers for example. Credits
can also be acquired by selling
Corporate
Financial Data on the black market. A large amount of credits
is
needed to develop technologies.
Data
Block: A collection of files containing various information.
The data
manager
software filters the content of a datablock
for useful information. Some datablocks
containing confidential information can be encrypted.
The NET interface represents a datablock as a small
cube.
Data
Manager: Software that permits you to analyze the content of a
data
block.
Datastore:
A node
dedicated to the storage of data
blocks.
Decrypt:
Software that permits you to decrypt
a data
block
so that you may analyze it.
Encrypt:
Software that permits you to encrypt
a data
block
that you have found on the NET.
Firewall:
Software that protects your agent
from various offensive applications.
Gateway:
Entry and exit ports of a system.
It is the first node
you enter when accessing a system.
A router
leads to a gateway,
and a gateway
leads back to a router.
ICE:
Acronym for Intelligent Countermeasures Electronics, the
ICE
is an agent
dedicated to the protection of computer systems.
Various type of ICE
can be encountered in The NET. Warden ICE
guards access to private nodes
of a system.
Exterminator ICE
tracks downs viruses
and eliminates them, as well assisting in the dispatch of
intruder. Black ICE
eradicates intruders. The NET interface represents them in a
robotic form.
IRC
(Infinite Recursive Calculation): Software that causes the
target to start calculating the value of PI thus reducing its
speed of attack and movement until the target can no longer react,
much like a paralysis.
Masquerade:
Software that permits you to hide your true point of origin in a
system
for a short period of time.
Net Control Points: Key systems
in The NET have been attributed an amount of Net Control Points to
represent their importance. Placing a backdoor
into a system
will increase your amount of Net Control Points.
Netcrawler:
A common name to designate retriever,
Tarantula virus
and Black Widow virus.
Node:
Location in a system
where an agent
can interact with the system
or with other agents.
Nodes
can take various shapes in The Net interface according to its
function. An online-store node
can look like a shopping mall or a chat room node
like an amphitheater.
Retriever:
People who cannot afford an avatar
use the simplest kind of agent,
the Retriever.
It is a simple-minded agent
retrieving data for its owner. Retrievers
are also used massively in systems
to maintain datastores.
The NET interface represents them in the form of a benign
arachnid.
Router:
A node
linking systems
in The NET. A router
leads to a system's
gateway,
or to another router.
Agents
enter The NET through their local router.
Spoof:
Software that causes an enemy system
to think that you are part of it.
System:
Representation in The NET of a computer system
or computer network.
Technology:
A technology
is a piece of hardware with complementary software needed to
achieve immortality or consciousness (two of the game's
goals). A technology
can be developed with the required breakthroughs
and by spending a certain amount of credits.
Viral
Infection: Software that permits you to infect a target with
various strains of virulent computer viruses.
Inflicts damage to the target agent.
Virus:
A real nuisance in The NET, this Agent
is designed to spread and destroy data and other agents
Exterminators ICE
were developed to protect systems
against them, but were never successful in eliminating them
completely from The NET. The NET interface represents them in the
form of Tarantula or Black Widow spider.