Difference between revisions of "1337h4x CCG set"
(22 intermediate revisions by 3 users not shown) | |||
Line 2: | Line 2: | ||
|designer=Adam | |designer=Adam | ||
|date=5-19-2007 | |date=5-19-2007 | ||
|players=2 | |players=2 | ||
|status=CCG set | |status=CCG set | ||
}} | }} | ||
== Overview == | |||
1337h4x (pronounced "LEET-HACKS") is a card game designed after computer hacking and security. Of course, being a Dvorak game, it's fairly unrealistic and inaccurate, but it's still pretty...well, 1337. It's really more of a fun little diversion for hackers, programmers, and other computer-minded people who'll get a chuckle out of playing an "XSS Attack" or "DDoS Attack" card. (If you don't know what either of those mean, then this game is probably not for you.) | |||
It's technically a CCG, but since a.) you can just print out all the good cards and b.) nobody sells them anyways, you can just print out and build a deck to play with. "Rarity" isn't really a factor in 1337h4x cards. | |||
== Rules == | == Rules == | ||
Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. | Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. Defense cards are placed in front of Resource cards to protect them, and Hack cards can destroy Defense cars. Application cards can do a variety of things, and Hardware cards modify your abilities. These rules suck and are obscure, but bear with me, I'm working on them. Please don't add any cards until I get the main rules and such filled out. You're welcome to suggest cards on the Talk Page or even just voice your praise or dissent there, if you'd like. | ||
<br clear=all> | <br clear=all> | ||
Line 13: | Line 18: | ||
<br clear=all> | <br clear=all> | ||
=== | === Hacks === | ||
Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way. '''Hack cards are discarded upon use unless otherwise noted.''' | |||
{{card | {{card | ||
|title= | |title=Buffer Overflow | ||
|type=Hack | |type=Hack | ||
|bgcolor=c00 | |bgcolor=c00 | ||
|text= | |text=Opponent must discard his or her hand and draw five new cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | |||
{{card | |||
|title=XSS Attack | |||
|type=Hack | |||
|bgcolor=c00 | |||
|text=Disable one Defense card installed on your an opponent's HTTP server until the end of this turn. | |||
|cornervalue=- | |||
|flavortext=XSS: Cross-Site Scripting | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=SQL Injection | |||
|type=Hack | |||
|bgcolor=c00 | |||
|text=Disable one Defense card installed on an opponent's SQL server until the end of this turn. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=Remove File Inclusion | |||
|type=Hack | |||
|bgcolor=c00 | |||
|text=Disable one Defense card installed on an opponent's PHP-enabled HTTP server until the end of this turn. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=DDoS Attack | |||
|type=Hack | |||
|bgcolor=c00 | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=DDoS: '''D'''istributed '''D'''enial-'''o'''f-'''S'''ervice | |||
}} | |||
{{card | |||
|title=BSOD | |||
|type=Hack | |||
|bgcolor=c00 | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=BSOD: '''B'''lue '''S'''creen '''O'''f '''D'''eath | |||
}} | }} | ||
<br clear=all> | <br clear=all> | ||
=== | |||
=== Malware === | |||
{{card | {{card | ||
|title=Worm | |title=Worm | ||
|type= | |type=Malware | ||
|bgcolor=000 | |bgcolor=000 | ||
|text=Discard any card with a level equal to or less than the level of this card. | |text=Discard any card with a level equal to or less than the level of this card. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |||
}} | |||
{{card | |||
|title=Spyware | |||
|type=Malware | |||
|bgcolor=000 | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
<br clear=all> | <br clear=all> | ||
=== | === Applications === | ||
{{card | |||
|title=ANTIVIRUS.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Discard all active Virus cards on your side of the table with levels equal to or less than the level of this card. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=FTP.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Move up to two cards from an opponent's FTP server to your side of the table. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=FTP: '''F'''ile '''T'''ransfer '''P'''rotocol | |||
}} | |||
{{card | |||
|title=BRUTUS.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Discard one "Password Protection" card on your opponent's side of the table. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=PING.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Flip over all of your opponent's Resource cards. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=XCOPY.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Move one of your opponent's Resource cards to your side of the table. Leave all non-Defense cards installed on it (discard any installed Defense cards). | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=PORTSCAN.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Flip over all installed Defense cards for one of your opponent's Resource cards. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=FILESHRED.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Remove any card on your side of the table or hand from gameplay for the rest of the round. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=ENBLOB.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Remove all attribute tokens from a card, and apply a "BLOB" token to it. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=BLOB: '''B'''inary '''L'''ong '''OB'''ject | |||
}} | |||
{{card | |||
|title=DEBLOB.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Remove the "BLOB" token from a card. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=BLOB: '''B'''inary '''L'''ong '''OB'''ject | |||
}} | |||
{{card | |||
|title=PHP.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Allows for PHP scripts to be run on an HTTP server or hard drive. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext='''P'''HP: '''H'''ypertext '''P'''reprocessor | |||
}} | |||
{{card | |||
|title=PERL.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Allows for Perl scripts to be run on an HTTP server or hard drive. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=Perl: '''P'''athologically '''E'''clectic '''R'''ubbish '''L'''ister | |||
}} | |||
{{card | |||
|title=SYSRESTORE.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=UNDELETE.EXE | |||
|type=Application | |||
|bgcolor=00c | |||
|text=Move one card of your choice from the Discard Pile on your side of the table to your hand. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | {{card | ||
|title= | |title=FORMAT.EXE | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Remove all cards in the Discard Pile on your side of the table from play. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=BITTORRENT.EXE | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Discard one card and draw two more. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
Line 55: | Line 221: | ||
<br clear=all> | <br clear=all> | ||
=== | === Resources === | ||
{{card | {{card | ||
|title= | |title=SQL Server | ||
|type=Resource | |type=Resource | ||
|bgcolor= | |bgcolor=0cc | ||
|text= | |text=Can store up to four BLOB-encrypted cards. | ||
|cornervalue=1 | |cornervalue=- | ||
|creator=Adam | |||
|flavortext=SQL: '''S'''erver '''Q'''uery '''L'''anguage | |||
}} | |||
{{card | |||
|title=HTTP Server | |||
|type=Resource | |||
|bgcolor=0cc | |||
|text=Can store up to four cards. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=HTTP: '''H'''yper'''T'''ext '''T'''ransfer '''P'''rotocol | |||
}} | |||
{{card | |||
|title=FTP Server | |||
|type=Resource | |||
|bgcolor=0cc | |||
|text=Can store up to four cards. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=FTP: '''F'''ile '''T'''ransfer '''P'''rotocol | |||
}} | |||
{{card | |||
|title=Quarantine | |||
|type=Resource | |||
|bgcolor=0cc | |||
|text=Can store up to eight Virus cards. All viruses stored here are latent until moved to the other side of the table. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=HTTP: '''H'''yper'''T'''ext '''T'''ransfer '''P'''rotocol | |||
}} | |||
<br clear=all> | |||
=== Hardware === | |||
Hardware cards are played and then left on the field. Rarely can they be destroyed. A player can only have two Hardware cards active at once; active cards must be discarded for a new one to take its place. | |||
{{card | |||
|title=Hard Drive | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text=Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=RAM Stick | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text=Extend your maximum hand size by one. | |||
|cornervalue=- | |||
|creator=Adam | |||
|flavortext=RAM: '''R'''andom '''A'''ccess '''M'''emory | |||
}} | |||
{{card | |||
|title=Hardware Firewall | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text=Counts as an unhackable, v2.0 Network Defense card. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=T1 Line | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=Router | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text=Add +1 to all Network Defense checks. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=CD-ROM Drive | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=Tape Drive | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text=Move one Resource card (and all installed cards) out of play. Installed Virus cards lose their effect, and installed Application and Hack cards must aren't able to be used. You can use an Action during your turn to return everything into play. | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=USB Flash Drive | |||
|type=Hardware | |||
|bgcolor=666 | |||
|text= | |||
|cornervalue=- | |||
|creator=Adam | |creator=Adam | ||
|flavortext=RAM: '''U'''niversal '''S'''erial '''B'''us | |||
}} | }} | ||
<br clear=all> | <br clear=all> | ||
=== Defense === | === Defense === | ||
These are the cards designed to keep your precious resources from being "teh h4xed." | |||
{{card | {{card | ||
|title=Firewall | |title=Firewall | ||
|type=Defense | |type=Defense | ||
|bgcolor= | |bgcolor=cc0 | ||
|text= | |text=If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=Password Protection | ||
|type=Defense | |type=Defense | ||
|bgcolor= | |bgcolor=cc0 | ||
|text= | |text=If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card. Search your deck and discard pile for a "Password" upon setting and place it underneath this card when setting. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |||
}} | |||
<br clear=all> | |||
=== Extensions === | |||
The following are all considered "extension" cards, or cards that aren't part of the core series but can be used as well. | |||
<br clear=all> | |||
==== Plug-Ins ==== | |||
Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects. | |||
{{card | |||
|title=REFLECT.DLL | |||
|type=Plug-In | |||
|bgcolor=ccc | |||
|text='''Defense Cards''' - | |||
|cornervalue=- | |||
|creator=Adam | |||
}} | |||
{{card | |||
|title=BZIP2.DLL | |||
|type=Plug-In | |||
|bgcolor=ccc | |||
|text='''Resource Cards''' - | |||
|cornervalue=- | |||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=UPLOAD.DLL | ||
|type= | |type=Plug-In | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text='''"FTP.EXE"''' - | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
<br clear=all> | |||
====CD-ROMs==== | |||
An CD-ROM card is used by "equipping" itself to an active "CD-ROM Drive" card. Only one CD-ROM card may be "equipped" to a "CD-ROM Drive" card at a time. | |||
{{card | {{card | ||
|title= | |title=Something (Disc 1 of 2) | ||
|type= | |type=CD-ROM | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text= | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=Something (Disc 2 of 2) | ||
|type= | |type=CD-ROM | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text= | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
<br clear=all> | |||
====PHP Scripts==== | |||
PHP Script cards require an active "PHP.EXE" on a "Hard Drive" or "HTTP Server." Unlike CD-ROM cards, PHP Script cards don't require any "equipping;" they instead need to be installed onto the same Resource card as "PHP.EXE" in order to be used. | |||
{{card | {{card | ||
|title= | |title=C99.PHP | ||
|type= | |type=PHP Script | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text= | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
<br clear=all> | |||
====Perl Scripts==== | |||
Perl scripts behave just like PHP scripts, but require "PERL.EXE" instead of "PHP.EXE." | |||
{{card | {{card | ||
|title= | |title=SAMPLE.PL | ||
|type= | |type=Perl Script | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text= | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} |
Latest revision as of 17:54, 21 September 2010
1337h4x CCG set | |
---|---|
Designer | Adam |
Date | 5-19-2007 |
Players | 2 |
This is a CCG set, a set of cards which can be used to construct personalised decks, in the style of a collectable card game. | |
To play Dvorak: Draw five cards each and leave the rest as a draw pile. On your turn, draw a card from the draw pile and play one Thing and/or one Action. (See the full rules.) | |
Print this deck Generate MUSHcode | |
This deck is locked. Further cards should not be added - leave feedback on the talk page. |
Overview
1337h4x (pronounced "LEET-HACKS") is a card game designed after computer hacking and security. Of course, being a Dvorak game, it's fairly unrealistic and inaccurate, but it's still pretty...well, 1337. It's really more of a fun little diversion for hackers, programmers, and other computer-minded people who'll get a chuckle out of playing an "XSS Attack" or "DDoS Attack" card. (If you don't know what either of those mean, then this game is probably not for you.)
It's technically a CCG, but since a.) you can just print out all the good cards and b.) nobody sells them anyways, you can just print out and build a deck to play with. "Rarity" isn't really a factor in 1337h4x cards.
Rules
Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. Defense cards are placed in front of Resource cards to protect them, and Hack cards can destroy Defense cars. Application cards can do a variety of things, and Hardware cards modify your abilities. These rules suck and are obscure, but bear with me, I'm working on them. Please don't add any cards until I get the main rules and such filled out. You're welcome to suggest cards on the Talk Page or even just voice your praise or dissent there, if you'd like.
Card list
The following is a list of all of the cards in 1337h4x.
Hacks
Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way. Hack cards are discarded upon use unless otherwise noted.
XSS: Cross-Site Scripting
Malware
Applications
FTP: File Transfer Protocol
BLOB: Binary Long OBject
BLOB: Binary Long OBject
PHP: Hypertext Preprocessor
Perl: Pathologically Eclectic Rubbish Lister
Resources
SQL: Server Query Language
HTTP: HyperText Transfer Protocol
FTP: File Transfer Protocol
HTTP: HyperText Transfer Protocol
Hardware
Hardware cards are played and then left on the field. Rarely can they be destroyed. A player can only have two Hardware cards active at once; active cards must be discarded for a new one to take its place.
RAM: Random Access Memory
Defense
These are the cards designed to keep your precious resources from being "teh h4xed."
Extensions
The following are all considered "extension" cards, or cards that aren't part of the core series but can be used as well.
Plug-Ins
Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects.
CD-ROMs
An CD-ROM card is used by "equipping" itself to an active "CD-ROM Drive" card. Only one CD-ROM card may be "equipped" to a "CD-ROM Drive" card at a time.
PHP Scripts
PHP Script cards require an active "PHP.EXE" on a "Hard Drive" or "HTTP Server." Unlike CD-ROM cards, PHP Script cards don't require any "equipping;" they instead need to be installed onto the same Resource card as "PHP.EXE" in order to be used.
Perl Scripts
Perl scripts behave just like PHP scripts, but require "PERL.EXE" instead of "PHP.EXE."