Hacking the Matrix
Your team of Cyber Knights may include characters skilled in Hacking the global Matrix.
Hacking the global Matrix requires an understanding of the basic iconography of the virtual world.
|Hack Network Firewall|
The first step of a Matrix hack is to override the network firewall.
|Hack Access Layer|
The second step of a Matrix hack is to override the host's access protection layer.
|Hack System OS|
Once the access protection layer has been hacked, the System OS can be taken over.
|Hack Network Stack|
With control of the System OS a hacker can control and redirect the System's connections to the Matrix and other Hosts. The Network Stack can be accessed multiple times to redirect the connection between a group of Hosts.
|Connect to Host|
A hacker can use the Network Stack to move between Hosts. Once the Network Stack has been pointed at a valid Host, the Connect icon will appear.
|Disconnect from Host|
At any point during Matrix access, the user can disconnect. Hackers will try to disconnect without leaving behind a physical location or data trail.
Search through the System's folders and files looking for valuable data that could be sold on the open market.
Retrieve selected data segments from the System.
Before hacking the System OS, a Hacker can launch a Decopy application to confuse Track and Trace threads.
Your team of Cyber Knights gains experience (XP) while navigating the NBZ, dodging the law, completing contracts, hacking the Global Matrix, and fighting for their survival. Experience will train your gun hand, sharpen your reflexes, harden your body, sharpen your mind, and hone your skills. Experience is the currency of character advancement.