-
程序
为了与矩阵互动,你需要使用程序。程序可以被购买(或由黑客编写),然后储存在化身或代理中。被存储的程序被加载到化身或代理中。这类似于佩戴枪套或把工具放在口袋里;加载的程序被携带以备日后使用。一个化身或代理可以加载的程序数量没有限制。
为了使用一个程序,它必须正在运行。运行中的程序由化身所在的设备执行,属于化身,只有你可以使用该程序。设备的系统等级限制了程序的等级。一个程序以其自身的等级或设备的系统等级运行,以较低者为准。
一个运行中的程序会被计入设备的处理器限制。对于每处理器限制个在设备上运行的程序(不包括化身程序,但包括代理),设备的响应能力会暂时降低一级;这种响应能力损失不会影响设备的最大系统等级。一个通讯链有等于其系统等级的处理器限制。例如,一个系统等级4和响应能力4的通讯链,如果运行3个程序,它的响应能力为4,如果运行4至7个程序,响应能力为3,如果运行8至11个程序,响应能力为2,等等。
你在同一时间只能使用一种类型的程序。例如,如果你有一个矩阵护甲3和一个矩阵护甲5程序在运行,你只能使用其中一个来抵抗矩阵伤害(我们建议使用等级较高的那个)。
超链者使用复合程式而不是程序。然而,他们所使用的复合程式与程序所做的事情相同,尽管它们的工作方式不一样。
下面的列表描述了暗影狂奔中的大部分程序。每个程序最常使用的技能与程序名称一起列在括号中。
PROGRAMS
In order to interact with the Matrix, you need to use programs. Programs can be purchased (or written by a hacker) and then stored with a persona or agent. A program that is stored is loaded into the persona or agent. This is analogous to wearing a holstered weapon or putting a tool in your pocket; a loaded program is being carried for later use. There is no limit to the number of programs that may be loaded into a persona or agent.
In order to use a program, it must be running. A running program is executed by the device on which your persona is running and belongs to your persona; only you may use the program. The System rating of the device limits the rating of the program. A program operates at its own rating or the System of the device, whichever is lower.
A running program counts against the device’s processor limit. For every (processor limit) programs running on a device (not including persona programs but including agents), the device’s Response rating is temporarily reduced by one; this Response loss does not affect the device’s maximum System rating. A commlink has a processor limit equal to its System rating. For example, a commlink with System 4 and Response 4 would have a Response of 4 if it was running up to three programs, Response 3 if running 4 to 7 programs, Response 2 if running 8 to 11 programs, etc.
You may only use one program of each type at a time. For example, if you have an Armor 3 and an Armor 5 program running, you may only use one of them to resist Matrix Damage (we suggest the one with the higher rating).
Technomancers use complex forms rather than programs. However, the complex forms they use do the same things that programs do, even though they do not work the same way.
The following list describes most of the programs available in Shadowrun. The skill that is most commonly used with each program is listed in parentheses with the program name.
-
通用程序
通用程序是合法的,广泛存在于整个矩阵中。
COMMON USE PROGRAMS
Common use programs are widespread and legal throughout the Matrix.
分析(计算机)
分析程序通过发出查询请求、分析系统资源、执行注册表查询等方式收集矩阵中的图标和节点的数据。使用分析程序进行矩阵侦察 (p. 228)。在一个节点中运行的分析程序也有助于检测黑客的企图 (第235页)。
ANALYZE (COMPUTER)
Analyze programs gather data about icons and nodes in the Matrix by issuing queries, analyzing system resources, performing registry lookups, and so on. Use Analyze for Matrix Perception (p. 228). An Analyze program running in a node also helps detect hacking attempts (p. 235).
浏览(数据搜索)
浏览程序是专门的搜索程序,有助于追踪特定节点或整个矩阵中的信息。使用浏览程序进行数据搜索动作(第230页)。
BROWSE (DATA SEARCH)
Browse programs are specialized search routines that help track down information on a particular node or in the Matrix at large. Use Browse programs for Data Search actions (p. 230).
指令(多种技能)
指令程序为用户提供了一个模块化和可定制的用于各种设备的控制界面。这使得用户可以通过矩阵控制一个设备(第245页),无论是监控摄像头、无人机,还是任何其他具有矩阵功能的设备。
COMMAND (VARIES)
Command programs give the user a modular and customizable control interface for various devices. This allows the user to control a device through the Matrix (p. 245), whether it be a surveillance camera, a drone, or any other Matrix-capable device.
编辑(计算机)
编辑程序是一个综合的文字处理器、图形设计工具和视频/动画编辑器。你可以用它来创建和改变任何媒体类型的文件:文本、图形、视频、全息影像、拟感等。编辑程序在企业界被普遍使用,但黑客们则是为了他们自己的颠覆性目的而使用它。将编辑程序与编辑动作一起使用(第230页)。
EDIT (COMPUTER)
Edit is a combination word processor, graphic design tool, and video/ animation editor. You can use it to create and alter files of any media type: text, graphics, video, trideo, simsense, etc. Edit sees common usage in the corporate world, but hackers use it for their own subversive ends. Use Edit with the Edit action (p. 230).
加密(电子战)
加密程序使用各种加密方案和密码来保护文件、节点和通讯的安全。被加密的项目可以通过正确的密码来解密,否则它就只是一堆乱码。使用加密程序进行加密动作(第229页)。
ENCRYPT (ELECTRONIC WARFARE)
Encrypt programs utilize various cryptographic schemes and ciphers to secure files, nodes, and communications. Encrypted items can be decrypted with the proper passcode, otherwise they are gibberish. Use Encrypt programs for the Encrypt action (p. 229).
现实过滤器(响应能力)
现实过滤器程序通过尝试解释节点的算法,将节点的VR塑模转化为你选择的隐喻。当你第一次运行这个程序或在它运行时进入一个节点,使用你的现实过滤器+响应能力和节点的系统等级+响应能力做一个对抗检定。如果现实过滤器获胜,你预设的范式就会覆盖节点的信号,在该节点中你会得到+1的响应能力奖励。如果节点赢了,或者结果是平局,它的隐喻就会压倒现实过滤器,以至于你在该节点中遭受-1响应能力的惩罚。
REALITY FILTER (RESPONSE)
A Reality Filter program translates a node’s VR sculpting into a metaphor of your choice by attempting to interpret the node’s algorithms. When you first run this program or enter a node while it is running, make an Opposed Test between your Reality Filter + Response and the node’s System + Response. If the filter wins, your preprogrammed paradigm overrides the node’s signals and you receive a +1 Response bonus while in that node. If the node wins, or a tie results, its metaphor overwhelms the filter enough that you suffer –1 Response while in the node.
扫描(电子战)
扫描程序允许你定位无线网络。每个无线设备都有一个内置的扫描程序,等级为1,但想要更好的访问权控制的用户可以将其升级到一个更高级的工具。扫描程序用于侦测隐藏节点动作(第230页)。
SCAN (ELECTRONIC WARFARE)
Scan programs allow you to locate wireless networks. Every wireless device has a built-in Scan program at rating 1, but users who want better access control may upgrade to a superior utility. Scan is used for the Detect Hidden Node action (p. 230).
-
骇入程序
以下程序一般只被黑客和安保专家使用。在大多数司法管辖区,如果没有合适的许可,这些程序就是非法的。黑客使用这些程序来利用安保缺陷和攻击图标。IC程序使用它们来对付入侵者(第237页)。
HACKING PROGRAMS
The following programs are generally only used by hackers and security specialists. In most jurisdictions, these programs are illegal without proper licensing. Hackers use these programs to exploit security flaws and attack icons. IC programs use them against intruders (p. 237).
矩阵护甲(无)
矩阵护甲程序是软件冗余和自动备份系统,可以保护图标免受造成矩阵破坏的攻击(第237页)。
ARMOR (NONE)
Armor programs are software redundancy and automatic backup systems that protect icons from attacks that cause Matrix damage (p. 237).
攻击(矩阵战斗/骇入)
攻击程序是敌意代码的载体,它试图杀死进程,引入随机输入,创建程序故障,以及以其他方式试图崩溃一个图标或程序。它们被用于矩阵战斗(第236页)。
ATTACK (CYBERCOMBAT/HACKING)
Attack programs are hostile code carriers that attempt to kill processes, introduce random input, create program faults, and otherwise try to crash an icon or program. They are used in cybercombat (p. 236).
生物反馈过滤器(无)
生物反馈过滤器程序是监控拟感信号和过滤有害反馈的程序。黑客们使用生物反馈过滤器专门作为矩阵战斗中对黑锤头和断片程序的防御(第236页),以及对甩致休克的防御(第237页)。超链者有一个与生俱来的生物反馈过滤器的复合程式,等级等于他们的魅力,所以他们不能把它作为一个复合程式。
BIOFEEDBACK FILTER (NONE)
Biofeedback filters are software routines that monitor simsense signals and filter harmful feedback. Hackers specifically use biofeedback filters as a defense against Black Hammer and Blackout programs in cybercombat (p. 236) and against dumpshock (p. 237). Technomancers have an inherent Biofeedback Filter complex form equal to their Charisma, and so cannot take this as a complex form.
黑锤头(矩阵战斗)
黑锤头是一个黑IC程序,它对目标和他的通讯链之间的指令交互进行采样,并将危险的生物反馈反应注入目标的拟感界面。这些加强的信号会使目标的神经连接过载,进而使他失去知觉或因中风、心力衰竭、呼吸麻痹、动脉瘤或神经递质自体中毒而死亡--这些只是部分可能的影响。它与矩阵攻击动作一起使用(第231页)。
黑锤头是用来对付使用热模的全沉浸VR的黑客的武器,在矩阵战斗中造成物理伤害而不是矩阵伤害(第237页)。对付冷模的VR用户,它只造成眩晕伤害。它对程序、代理、IC、网精或AR用户没有影响。
BLACK HAMMER (CYBERCOMBAT)
Black Hammer is a black IC program that samples the command transactions between the target and his commlink and injects dangerous biofeedback responses into the target’s simsense interface. These aggravated signals may overload the target’s neural connections and in turn render him unconscious or cause death from stroke, heart failure, respiratory paralysis, aneurysm, or neurotransmitter autotoxicity—and those are just a few of the possible effects. It is used with the Matrix Attack action (p. 231).
Black Hammer is intended as a weapon against hackers in full VR using hot sim, causing Physical damage rather than Matrix damage in cybercombat (p. 237). Against cold sim VR users, it only inflicts Stun damage. It has no effect on programs, agents, IC, sprites, or AR users.
断片(矩阵战斗)
断片是黑IC程序,是黑锤头的非致命版本。它对热模和冷模的VR用户都会造成眩晕伤害。与黑锤头一样,它与矩阵攻击动作一起使用(第231页),对程序、代理、IC、网精或AR用户没有影响。断片的伤害不会溢出到物理CM中。
BLACKOUT (CYBERCOMBAT)
Blackout is black IC program that is a non-lethal version of Black Hammer. It causes Stun damage to both hot sim and cold sim VR users. Like Black Hammer, it is used with the Matrix Attack action (p. 231) and has no effect on programs, agents, IC, sprites, or AR users. Damage from Blackout does not overflow into the Physical Condition Monitor.
数据炸弹(无)
数据炸弹程序在文件或节点中创建了一种特殊形式的反应式可执行文件,这种文件也称为数据炸弹。数据炸弹被附加到一个特定的文件或节点上,并被设置为在有人未经授权访问该文件或节点时激活。当被触发时,数据炸弹“爆炸”,并试图使访问该文件或节点的图标崩溃。如果所有者选择,数据炸弹也可以被指示擦除文件或崩溃节点。数据炸弹是通过设置数据炸弹动作(第231页)设置的。
一个特定的文件或设备只能附加一个数据炸弹。你可以通过成功的矩阵侦察检定发现一个数据炸弹。
你可以通过输入正确的密码来拆除一个数据炸弹。如果没有密码,你只能通过成功的拆除数据炸弹动作来拆除一个被探测到的数据炸弹(第231页)。当它“引爆”时,数据炸弹会造成一定数量的矩阵伤害,相当于(等级×1D6),然后数据炸弹被拆除。
DATA BOMB (NONE)
Data Bomb programs create a specialized form of reactive executable in a file or node, called a data bomb (note the difference in capitalization: Data Bomb is the program, whereas a data bomb is the executable set by the program). A data bomb is attached to a specific file or node and set to activate if someone accesses the file or node without authorization. When triggered, a data bomb "explodes" and attempts to crash the icon that accessed the file or node. Data bombs may also be instructed to erase the file or crash the node, if the owner chooses. Data bombs are set with the Set Data Bomb action (p. 231).
Only one data bomb may be attached to a particular file or device. You can detect a data bomb with a successful Matrix Perception Test.
You can defuse a data bomb simply by entering the correct passcode. Without the passcode, you can only disable a detected data bomb with a successful Disarm Data Bomb action (p. 231). When it “detonates,” a data bomb inflicts a number of boxes of Matrix damage equal to (rating x 1D6), then the data bomb is deleted.
解密(电子战)
解密程序被设计用来进行一些破坏密码的攻击--从模式分析到粗暴的字典攻击到复杂的数学技巧,以闯入一个加密的系统或服务。使用解密程序进行启动加密分析动作(第230页)。
DECRYPT (ELECTRONIC WARFARE)
Decrypt programs are designed to conduct a number of cipher-busting attacks—from pattern analysis to brute-force dictionary assaults to sophisticated mathematical tricks—to break into an encrypted system or service. Use Decrypt programs for Initiate Cryptanalysis actions (p. 230).
拆除(骇入)
拆除程序的唯一用途是使保护文件或设备的数据炸弹失效。它与拆除数据炸弹的动作一起使用(第230页)。
DEFUSE (HACKING)
The sole purpose of the Defuse program is to deactivate data bombs that are protecting files or devices. It is used with the Disarm Data Bomb action (p. 230).
ECCM(无)
电子对抗对措(ECCM)程序过滤掉试图破坏无线连接的干扰信号。ECCM程序在防御干扰时,会将其等级添加到其运行的设备的信号强度中(见第246页)。
ECCM (NONE)
Electronic counter-countermeasures (ECCM) filter out jamming signals that attempt to disrupt a wireless connection. An ECCM program adds its rating to the Signal rating of the device on which it is running when defending against jamming (see p. 246).
利用漏洞(骇入)
利用漏洞程序是不断发展的黑客工具,专门设计来利用安保缺陷和弱点,以便使黑客能够获得对节点或程序未经授权的访问权。利用漏洞程序可与即时入侵(第230页)、探查目标(第236页)的弱点以及崩溃节点和程序破坏(第230页)一起使用。
EXPLOIT (HACKING)
Exploit programs are constantly evolving hacker tools specifically designed to take advantage of security flaws and weaknesses so that a hacker can gain unauthorized access to a node or program. Exploit programs are used with the Hack on the Fly action (p. 230), Probing the Target for weaknesses (p. 236), and Crashing Nodes and Programs (p. 230).
医疗(计算机)
使用医疗程序来修复对图标造成的矩阵伤害。尽管合法用户有时会使用医疗程序来修复损坏的文件、不正常的程序和其他错误,但黑客则更多使用医疗程序来在一场矩阵战斗后保持运作。一些IC程序携带医疗程序来修复自己。使用医疗程序进行修复图标的动作(第231页)。
虽然这个程序不能帮助超链者,但他们可以使用医疗复合程式来修复其他图标,如化身、代理或网精。
MEDIC (COMPUTER)
Use Medic to repair Matrix damage inflicted on icons. Though legitimate users sometimes use Medic to fix corrupted files, misbehaving programs, and other errors, hackers use Medic to keep functioning after a bout of cybercombat. Some IC programs carry Medic programs to repair themselves. Use Medic for the Repair Icon action (p. 231).
While this program cannot help technomancers, they may use the Medic complex form to repair other icons, such as personas, agents, or sprites.
嗅探(电子战/骇入)
嗅探程序收集数据流量和无线信号并捕获信息。嗅探程序是矩阵的终极间谍工具,用于拦截流量(第230页)和捕获无线信号(第229页)的动作。
SNIFFER (ELECTRONIC WARFARE/HACKING)
Sniffer programs gather data traffic and wireless signals and capture the information. Sniffer programs are the ultimate Matrix spying utility, used for the Intercept Traffic (p. 230) and Intercept Wireless Signals (p. 229) actions.
欺骗(骇入)
你可以使用欺骗程序来生成虚假的访问ID,伪造误导性的数据包,目的是混淆跟踪程序。在重定向跟踪动作(第231页)或伪造指令动作(第232页)中使用欺骗程序。
SPOOF (HACKING)
You can use Spoof programs to generate false access IDs and forge misleading data packets with the intent of confusing Track programs. Use Spoof for the Redirect Trace action (p. 231) or the Spoof Command action (p. 232).
隐匿(骇入)
隐匿程序是一个智能的骇入程序,它试图将黑客从其他系统进程中隐藏起来。虽然它不能使一个图标完全不被发现,但它通过混淆黑客的活动、清除系统痕迹和模仿授权流量,使黑客看起来是无害的。虽然它不用于任何动作,但当黑客闯入系统时,隐匿程序可以使他不被防火墙发现(第227页),同时也不被矩阵侦察检定(第228页)和追踪用户的尝试(第232页)抓到。
STEALTH (HACKING)
Stealth is a clever hacker program that attempts to hide the hacker from other system processes. While it cannot make an icon completely undetectable, it makes the hacker seem innocuous by obfuscating his activities, erasing system tracks, and mimicking authorized traffic. While it is not used for any action, Stealth hides the hacker from detection by the Firewall as he breaks into a system (p. 227), as well as from Matrix Perception tests (p. 228) and Trace User attempts (p. 232).
追踪(计算机)
追踪程序系统地分析用户的连接,跟踪数据踪迹,回到其源节点。追踪程序通常被IC使用,目的是识别/定位黑客或发起反击,但它也被用来监视自动出租车和紧急服务电话。追踪程序用于追踪用户的动作(第232页)。
TRACK (COMPUTER)
Track programs systematically analyze a user’s connection and follow the datatrail back to the originating node. Track is commonly used as an intrusion countermeasure with the intent of identifying/locating a hacker or launching a counterattack, but it is also used to keep tabs on automated taxis and emergency service calls. Track is used for the Trace User action (p. 232).
-
代理和IC
代理是能够使用其他程序的半自主程序。矩阵用户使用代理作为助手或搜索机器人,而黑客也使用它们作为黑客的助手、诱饵、看门狗,甚至是武器平台。代理在矩阵中独立于用户运行,是矩阵版的无人机。他们有一定程度的自主能力,可以理解复杂的指令。
代理有一个自驾属性,就像无人机一样(第244页),它决定了代理的“聪明”程度。自驾程序作为代理的大脑解释指令。自驾属性是代理的系统等级,也是其计算机、矩阵战斗、数据搜索和骇入技能等级。代理也有自己的内置防火墙属性,等于他们的自驾属性等级。代理使用他们正在运行的节点的响应能力属性;这意味着独立运行的代理的属性可能在它从一个节点移动到另一个节点时有所不同。
AGENTS AND IC
Agents are semi-autonomous programs capable of using other programs. Matrix users employ agents as assistants or search-bots, while hackers also use them as hacking aides, decoys, watchdogs, or even weapons platforms. Agents run independently of the user in the Matrix, the Matrix version of drones. They are capable of a degree of autonomy and can comprehend complex orders.
Agents have a Pilot attribute, much like drones (p. 244), that determines just how "smart" the agent is. Pilot acts as the agent’s brain, interpreting orders. The Pilot attribute acts as the agent’s System rating, as well as its Computer, Cybercombat, Data Search, and Hacking skill ratings. Agents also have their own built-in Firewall attribute, equal to their Pilot rating. Agents use the Response attribute of the node on which they are running; this means that the attributes of an agent operating independently may vary as it moves from node to node.
使用代理
代理可以像其他程序一样被加载和运行,使用一个复杂动作来运行代理。代理是一个正在运行的程序,并计入一个节点的处理器限制中。如果你在你化身所在的同一节点中运行代理(通常是你的通讯链),它可以在你访问的任何节点中协助你。你必须有一个拥有在节点上运行程序权限的账户(通常是安保或管理员)。
如果得到指示,代理也可以独立访问其他节点。他们必须通过使用你的账户或通过骇入获得自己的账户来访问节点。当独立运行时,一个代理有自己的图标。代理不能像化身程序那样在多个节点中拥有图标。
装载到你化身的代理程序使用你的访问ID。对代理程序的追踪会追溯到你自己的源节点。
独立于你化身的代理(或IC),无论是在你的通讯链上还是在其他设备上,都使用他们自己的硬编码访问ID来向其他节点识别自己。这个访问ID在一个给定的代理的所有副本中都是相同的,除非使用软件+逻辑(等级×3,1周)的延续检定给它打补丁。代理不具备软件技能,不能自我修补/编程。
要让你的代理在矩阵中独立运行,你必须在与你化身分离的节点上运行它(有合适的访问账户),或者在你自己的节点上运行它,然后把它发送到其他节点上。即使你的化身脱机,代理也将继续在矩阵中运行。
在你的节点上的代理将计入你的设备的处理器限制,但不计入你的订阅限制。独立运行的代理计入你的订阅限制,但不计入你的处理器限制。
向代理发布指令的准则与向无人机发布指令的准则相同(第244页)。
USING AGENTS
Agents can be loaded and run like other programs, using a Complex Action to run the agent. The agent is a running program and counts against a node’s processor limit. If you run the agent in the same node in which your persona resides (usually your commlink), it can assist you in any nodes you access. You must have an account with permission to run programs on the node (usually security or admin).
Agents can also access other nodes independently, if instructed to do so. They must have access to the node either by using your account or by hacking their own. When operating independently, an agent has its own icon. Agents may not have icons in multiple nodes like persona programs can.
Agents loaded into your persona use your access ID. Traces on an agent program trace back to your own point of origin.
Agents (or IC) acting independently of your persona, whether on your commlink or on some other device, use their own hardcoded access ID to identify themselves to other nodes. This access ID is identical in all copies of a given agent unless it is patched with a Software + Logic (Rating x 3, 1 week) Extended Test. Agents do not possess a Software skill and are not able self-patch/program.
To have your agent operate in the Matrix independently, you must either run it on a separate node from your persona (with an appropriate access account) or run it on your own node and then send it to other nodes. The agent will continue to operate in the Matrix even if your persona goes offline.
An agent on your node counts against your device’s processor limit, but not your subscription limit. An agent operating independently counts toward your subscription limit, but not your processor limit.
The guidelines for issuing commands to agents are the same as those for issuing commands to drones (p. 244).
负载
你可以把你的程序的副本加载到你的代理中,这样它就可以自己运行和使用它们。如果一个代理是独立行动的,它所运行的任何程序都算在它所在的节点的处理器限制之内,因此也会影响其响应能力(第222页)。代理运行的任何程序都被限制到最高等于其自驾等级。
如果你的代理在你的节点中运行,你可以运行一个程序并指定给你的代理使用,反之亦然。
PAYLOAD
You may load copies of your programs into your agent so that it may run and use them on its own. If an agent is acting independently, any programs it runs count against the processor limit of the node it is in, and so may affect Response (p. 222). Any program run by an agent is limited by its Pilot rating.
If your agent is running in your node, you may run a program and designate it for your agent’s use and vice versa.
入侵对策程序(IC)
术语入侵对策程序(IC,读作“ice”)是指一种专门的代理程序,用于防御系统。就所有游戏目的而言,IC程序等同于代理程序,其功能也相同。IC程序通常装载一些更具攻击性的程序来对付入侵者,如攻击、黑锤头或断片,以及分析、矩阵护甲或追踪。IC很少加载太多的程序,因为它和它运行的程序都算在节点的处理器限制内。
一些节点会在警报被触发时启动IC程序,并指示它与入侵者交战。一旦启动,IC程序就会像独立运行的代理一样,彼此独立行动,独立于节点。每个IC程序都有自己的图标和主动性(代理、IC和网精主动性, 第236页)。
更积极主动的IC程序可能会加载额外的程序,如利用漏洞或隐匿,如果入侵者离开节点,它们可能会主动追击,甚至跟踪入侵者回到他的源节点并在那里攻击他。IC程序通常被加载他们可能需要访问任何连接的系统的任何必要的密码。有时,一个节点会有IC不断巡逻,随机地分析图标。
我们鼓励GM为他们的节点创建自己的IC。
INTRUSION COUNTERMEASURES (IC)
The term intrusion countermeasures (or IC, pronounced "ice") refers to a specialized type of agent program that is used to defend a system. For all game purposes, IC programs are equivalent to agents and function the same way. IC programs are typically loaded with some of the more offensive programs to employ against intruders, like Attack, Black Hammer, or Blackout, as well as Analyze, Armor, or Track. IC rarely has too many programs loaded, as it and its running programs all count toward the node’s processor limit.
Some nodes will launch an IC program when an alert is triggered and direct it to engage the intruder(s). Once launched, IC programs act independently of each other and the node, as with agents that are running independently. Each IC program has its own icon and Initiative (Agent, IC, and Sprite Initiative, p. 236).
More proactive IC programs may be loaded with additional utilities such as Exploit or Stealth, and may actively pursue intruders if they leave the node or even track the intruder back to his originating node and attack him there. IC programs are typically loaded with any necessary passcodes they may need to access any connected systems. Sometimes a node has IC patrolling in it, Analyzing icons at random.
Gamemasters are encouraged to create their own IC for their nodes.
代理和自驾的能力
代理可能有能力独立运作,但这并不意味着他们有和黑客角色一样的能力。事实上,虽然他们在很多方面都非常聪明,但代理拥有一些缺点,使他们不如泛人类。
指导自主型代理的自驾程序是一个令人难以置信的复杂软件,其逻辑和分析能力与任何泛人相当。然而,这并不意味着该代理具有与泛人同等的决策能力。他们不仅缺乏一生的经验作为判断的基础,他们还缺乏想象力、自发性,而且往往缺乏使他们能够充分理解情况的背景。例如,虽然代理可能明白某些与他人进行矩阵战斗的图标被认为是敌人,甚至可能掌握一些更精细的战术要点,但它不一定了解他们之间的个人关系或社会线索,因此不会意识到,例如,攻击一个图标可能会激怒另一个,或认识到一个图标正试图投降或转换立场,或理解一个图标只是在玩弄其对手,还没有放绝招。
当代理以某种方式与物理世界互动时(例如通过传感器、安保系统或无人机),上下文信息就更加缺乏了,因为代理的自驾是为矩阵活动编程的,而不是为与肉体空间互动而编程的。(无人机自驾就不是这样了,他们是为现实世界的活动而编程的,但专门为他们所处的无人机模型量身定做)。
代理和自驾的创造性思维能力也很有限。他们倾向于坚持自己的指令,根据编程的决策树做出严格的逻辑选择--这不一定是最好的行动方案。当面临意外的障碍或不符合他们程序的选择时,他们倾向于退缩和重组——这是一个比即兴创作更安全的选择。请注意,代理确实有“模糊逻辑”的程序,允许他们对不精确的概念和条件进行判断和行动,但基于概率概括地执行动作也有其缺点。当有疑问时,GM可以根据对应的难度阈值秘密地进行自驾+响应能力检定,以确定代理如何根据他们的指令对困难情况作出反应(见《发布指令》第245页)。
AGENT AND PILOT COMPETENCY
Agents may be capable of operating independently, but this does not mean that they are just as capable as hacker characters. In fact, while they are very smart in many ways, agents possess a number of drawbacks that make them inferior to metahumans.
The Pilot program that guides an autonomous agent is an incredibly so phisticated piece of software with logical and analytic capabilities on par with any metahuman. This does not mean, however, that the agent has decisionmaking capabilities equal to metahuman. Not only do they lack a lifetime of experience to base their judgments on, they lack imagination, spontaneity, and often the context that would enable them to fully understand a situation. For example, while the agent may understand that certain icons engaged in cybercombat with others are considered enemies, and might even grasp some of the finer tactical points, it would not necessarily understand the personal relationships or social cues between them, and so would not realize that, say, attacking one icon might enrage another, or recognize that one icon is attempting to surrender or switch sides, or comprehend that one icon is simply toying with its opposition and hasn’t unleashed the big guns yet.
Contextual information is even more lacking when the agent interacts with the physical world in some way (via sensor, security system, or drone, for example), as agent Pilots are programmed for Matrix activities, not for interfacing with meatspace. (This is less true of drone Pilots, which are programmed for real-world activity, but are specifically tailored for the drone model they occupy.)
Agents and Pilots are also limited in their capacity for creative thought. They tend to stick to their orders, making strictly logical choices according to programmed decision trees—which may not always be the best course of action. When faced with an unexpected obstacle or choices that don’t fit their programming, they tend to fall back and regroup—a safer choice over improvisation. Note that agents do have “fuzzy logic” routines that allow them to judge and act on imprecise concepts and conditions, but taking action based on generalized probabilities also has its drawbacks. When in doubt, gamemasters can secretly roll a Pilot + Response Test against an appropriate difficulty threshold to determine how agents respond to difficult situations based on their orders (see Issuing Commands, p. 245).