Sysadmin deck

From Dvorak - A Blank-Card Game
Revision as of 11:47, 1 February 2007 by Kevan (talk | contribs) (Adding deck.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search
Sysadmin
Designers pinkdaisy, Raven and X-G
Date 3rd August 2002
Players 2+
This is a playable deck - it's finished, tested and ready to play.
To play Dvorak: Draw five cards each and leave the rest as a draw pile. On your turn, draw a card from the draw pile and play one Thing and/or one Action. (See the full rules.)
Cards.gif Print this deck

Telnet.gif Generate MUSHcode
Cards.gif Generate Lackey export

Padlock.gif
This deck is locked. Further cards should not be added - leave feedback on the talk page.

Rival sysadmins fight to configure and maintain the most services, against the slings and arrows of virii, DOS attacks and the rest.

Special Rules

Endgame

After the deck has been cycled through twice, if any Player has more Services than all other Players, they are declared winner.

Card List

Web Server
Thing - Service
FTP Server
Thing - Service
POP3 Server
Thing - Service
SMTP Server
Thing - Service
Peer-to-Peer Network Hub
Thing - Service
Telnet Daemon
Thing - Service
SSH Daemon
Thing - Service
X Windows Server
Thing - Service
DNS Server
Thing - Service
IRC Daemon
Thing - Service
CVS Repository
Thing - Service
Action: Draw a card. If it is a Service, put it into play. Otherwise, discard it. Any other player may discard two cards immediately to destroy the new service.
Open Source
Thing - Service
When this Service comes into play, choose another Service controlled by another player. This card is considered a duplicate of that card for as long as it's in play.
Dual Processors
Thing - Hardware
Once per turn, you may use an Action instead of playing a Thing.
OC-192
Thing - Hardware
When this card comes into play, draw two cards.
Tape Backup System
Thing - Hardware
Action: Return one of your services that was destroyed since your last turn to your hand, if it is still in the discard pile. You cannot play a Thing in the same turn as you use this Action.
Cisco Router
Thing - Hardware
Whenever you use an Action from a Thing, toss a coin. On heads, the Action fails. Whenever another player uses an Action on a Service you control, toss a coin. On heads, the Action fails.
RAID Array
Thing - Hardware
Action: Put a Thing from your hand into play.
TCP Wrappers
Thing
Play onto a Service. A service with TCP Wrappers cannot be destroyed by an opponent.
Search Engine
Thing
Play onto a Web Server. Action: Draw a card.
Warez
Thing
Play onto an FTP or Web Server. Action: Draw a card.
Overclocked!
Thing
Play onto a Hardware card you control. At the beginning of your turn, flip two coins. If both come down tails, the hardware is destroyed. Action: Draw a card.
DoS Attack
Action
Destroy a Service.
DoS Attack
Action
Destroy a Service.
DoS Attack
Action
Destroy a Service.
Script Kiddies
Action
Discard two cards. Destroy a Service.
Unencrypted Passwords
Action
If a player controls Telnet Daemon, you take their next turn for them.
Signed up for Pr0n!
Action
Target player may choose to either skip their next turn, discard two cards at random, or destroy one of their services.
Remote Sprinkler Activation
Action
Discard your hand. Flip a coin for each hardware target player controls - on heads, destroy it.
Faulty Drivers
Action
Target Hardware card is rendered non-functional for the next two turns.
RIAA/MPAA
Action
If a player controls Peer-to-peer Network Hub, destroy that and one additional Service they control.
Palladium
Action
If a player controls Warez or Peer-to-peer Network Hub, destroy those and two additional Service they control. This may target more than one player simultaneously.
Brownout
Action
Target player skips their next turn. Until that player's next playable turn, no Actions may target them, their Services or their Hardware.
Virus
Action
Each player destroys one of their Services.
User-targetted Virus
Action
Each player tosses a coin - on heads, they must destroy one of their Services, chosen by whoever played the Virus.
Trojan Horse
Action
Look at an opponent's hand. You may play a card from their hand as if it were yours. Your opponent is considered the user of that card.
Chernobyl
Action
Target player discards two cards at random.
Network Restructuring
Action
Destroy one of your own Services. Draw 3 cards.
Kernel Recompile
Action
End this turn and skip your next turn. During this period, your Services and Hardware may not be targeted by Actions. At the beginning of the turn after that, draw three cards.
Caffeine Overdose
Action
Discard two cards. You can play another Action this turn, and this card doesn't use up an Action for purposes of using them.
Honeypot
Action
Play in response to one of your Services being destroyed - the current player's turn ends immediately, and they miss their next turn.
Redirecting Firewall Rules
Action
Play in response to an Action targetted against you or your Services. That action is redirected to the player of your choice.
Hidden Logs
Action
Play in response to an Action. That Action succeeds, but the user must destroy one of their own Services.