Game Play | Lexicon

 

LEXICON

  • Agent: Expert program designed mainly to collect and distribute data over The NET. The most sophisticated will protect systems against intrusions or effectuate complex transactions in the name of its owner.
  • Anti-Virus: Software that is used to fight off viral infections by repairing the damage sustained.
  • Avatar: The most complex type of agent. The avatar represents its owner on The Net. An avatar can be designed as a receptionist, a legal counsel, a stockbroker, a system administrator, etc... The software loaded into the avatar will determine its functionality. The NET interface represents them in human form.
  • Backdoor: A backdoor is a secret access to a system. By placing a backdoor into a system's core, the next time you access that system, you will be granted full access privileges even to the private nodes of that system.
  • Breakthrough: A breakthrough is a major scientific discovery. It can be found mainly in the highly secure datastores of research centers. breakthrough can be combined to develop a technology or sold on the black market.
  • Core: A node representing key access to the main processors and functions of a system. There is a single core in every system.
  • Corporate Financial Data: Confidential financial information about a megacorporation that can be sold on the black market. This data is used in insider trading by shady figures or sold back to the competition.
  • Crack: Software that permits you to open the door of a Warden ICE even if you do not have a password.
  • Credit: The currency in The NET is the credit. An agent can accomplish embezzlement by breaking into corporate datastore and finding data blocks with account numbers for example. Credits can also be acquired by selling Corporate Financial Data on the black market. A large amount of credits is needed to develop technologies.
  • Data Block: A collection of files containing various information. The data manager software filters the content of a datablock for useful information. Some datablocks containing confidential information can be encrypted. The NET interface represents a datablock as a small cube.
  • Data Manager: Software that permits you to analyze the content of a data block.
  • Datastore: A node dedicated to the storage of data blocks.
  • Decrypt: Software that permits you to decrypt a data block so that you may analyze it.
  • Encrypt: Software that permits you to encrypt a data block that you have found on the NET.
  • Firewall: Software that protects your agent from various offensive applications.
  • Gateway: Entry and exit ports of a system. It is the first node you enter when accessing a system. A router leads to a gateway, and a gateway leads back to a router.
  • ICE: Acronym for Intelligent Countermeasures Electronics, the ICE is an agent dedicated to the protection of computer systems. Various type of ICE can be encountered in The NET. Warden ICE guards access to private nodes of a system. Exterminator ICE tracks downs viruses and eliminates them, as well assisting in the dispatch of intruder. Black ICE eradicates intruders. The NET interface represents them in a robotic form.
  • IRC (Infinite Recursive Calculation): Software that causes the target to start calculating the value of PI thus reducing its speed of attack and movement until the target can no longer react, much like a paralysis.
  • Masquerade: Software that permits you to hide your true point of origin in a system for a short period of time.
  • Net Control Points: Key systems in The NET have been attributed an amount of Net Control Points to represent their importance. Placing a backdoor into a system will increase your amount of Net Control Points.
  • Netcrawler: A common name to designate retriever, Tarantula virus and Black Widow virus.
  • Node: Location in a system where an agent can interact with the system or with other agents. Nodes can take various shapes in The Net interface according to its function. An online-store node can look like a shopping mall or a chat room node like an amphitheater.
  • Retriever: People who cannot afford an avatar use the simplest kind of agent, the Retriever. It is a simple-minded agent retrieving data for its owner. Retrievers are also used massively in systems to maintain datastores. The NET interface represents them in the form of a benign arachnid.
  • Router: A node linking systems in The NET. A router leads to a system's gateway, or to another router. Agents enter The NET through their local router.
  • Spoof: Software that causes an enemy system to think that you are part of it.
  • System: Representation in The NET of a computer system or computer network.
  • Technology: A technology is a piece of hardware with complementary software needed to achieve immortality or consciousness (two of the game's goals). A technology can be developed with the required breakthroughs and by spending a certain amount of credits.
  • Viral Infection: Software that permits you to infect a target with various strains of virulent computer viruses. Inflicts damage to the target agent.
  • Virus: A real nuisance in The NET, this Agent is designed to spread and destroy data and other agents Exterminators ICE were developed to protect systems against them, but were never successful in eliminating them completely from The NET. The NET interface represents them in the form of Tarantula or Black Widow spider.