No edit summary |
mNo edit summary |
||
Line 155: | Line 155: | ||
***Illusion Spells |
***Illusion Spells |
||
***Manipulation Spells |
***Manipulation Spells |
||
+ | *'''MATRIX''' |
||
+ | **Accessing the Matrix |
||
+ | **Time and Movement In the Matrix |
||
+ | ***Passcodes |
||
+ | ***Hello. Operator |
||
+ | ***Security Codes |
||
+ | ***Directory Assistance |
||
+ | ***Leaving the Matrix |
||
+ | **Matrix Geography |
||
+ | ***Nodes and Their Functions |
||
+ | ***Central Processing Unit |
||
+ | ***Datastore |
||
+ | ***I/O Ports |
||
+ | ***Sub-Processing Units |
||
+ | ***System Access Node (SAN) |
||
+ | ***Slave |
||
+ | ***Mapping Systems |
||
+ | ***Mapping the Telecommunication Grids |
||
+ | **Cyberdecks |
||
+ | ***Master Persona Control Program |
||
+ | ***Cyberdeck Specifications |
||
+ | ***Cyberdeck Options |
||
+ | ***Using Cyberdecks |
||
+ | **Cyberprograms |
||
+ | ***Persona Programs |
||
+ | ***Utility Programs |
||
+ | ***Degradable Utilities |
||
+ | ***Running Utilities |
||
+ | ***Programming on the Fly |
||
+ | ***Combat Utilities |
||
+ | ***Defense Utilities |
||
+ | ***Sensor Utilities |
||
+ | ***Masking Utilities |
||
+ | **Decking |
||
+ | ***Movement in the Matrix |
||
+ | ***Perception in the Matrix |
||
+ | ***Tortoises in the Matrix |
||
+ | ***Naked in the Matrix |
||
+ | **Cybercombat |
||
+ | ***Initiative |
||
+ | ***Actions in Cyberspace |
||
+ | **Intrusion Countermeasures (IC) |
||
+ | ***White IC |
||
+ | ***Gray IC |
||
+ | ***Black IC |
||
+ | ***Alerts |
||
+ | ***The Opposition |
||
+ | **Cyberprogramming |
||
+ | ***Building Cyberdecks |
||
| valign="top" width="34%" | |
| valign="top" width="34%" | |
||
Revision as of 17:06, 28 January 2013
|
|