Difference between revisions of "1337h4x CCG set"
From Dvorak - A Blank-Card Game
Jump to navigationJump to search
Line 13: | Line 13: | ||
<br clear=all> | <br clear=all> | ||
=== | === Hacks === | ||
Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way. | Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way. | ||
{{card | {{card | ||
|title= | |title=Buffer Overflow | ||
|type=Hack | |type=Hack | ||
|bgcolor=c00 | |bgcolor=c00 | ||
|text= | |text=Opponent must discard his or her hand and draw five new cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=XSS Attack | ||
|type=Hack | |type=Hack | ||
|bgcolor=c00 | |bgcolor=c00 | ||
|text= | |text=Disable one Defense card installed on your an opponent's HTTP server until the end of this turn. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=SQL Injection | ||
|type=Hack | |type=Hack | ||
|bgcolor=c00 | |bgcolor=c00 | ||
|text= | |text=Disable one Defense card installed on an opponent's SQL server until the end of this turn. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=Remove File Inclusion | ||
|type=Hack | |type=Hack | ||
|bgcolor=c00 | |bgcolor=c00 | ||
|text= | |text=Disable one Defense card installed on an opponent's PHP-enabled HTTP server until the end of this turn. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=DDoS Attack | ||
|type=Hack | |type=Hack | ||
|bgcolor=c00 | |bgcolor=c00 | ||
|text= | |text=--- | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=DDoS: '''D'''istributed '''D'''enial-'''o'''f-'''S'''ervice | |||
}} | }} | ||
<br clear=all> | <br clear=all> | ||
=== | === Viruses === | ||
{{card | {{card | ||
|title=Worm | |title=Worm | ||
Line 104: | Line 65: | ||
|text=Discard any card with a level equal to or less than the level of this card. | |text=Discard any card with a level equal to or less than the level of this card. | ||
|cornervalue=1 | |cornervalue=1 | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
<br clear=all> | <br clear=all> | ||
=== | === Applications === | ||
{{card | {{card | ||
|title=Virus Scan | |title=Virus Scan | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text=Destroy all active Virus cards on user's side of the table with levels equal to or less than the level of this card. | |text=Destroy all active Virus cards on user's side of the table with levels equal to or less than the level of this card. | ||
|cornervalue=1 | |cornervalue=1 | ||
Line 166: | Line 79: | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=FTP Client | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Move up to two cards from an opponent's FTP server to your side of the table. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=Bruteforcer | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text=Destroy | |text=Destroy one "Password Protection" card on your opponent's side of the table. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=Ping | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Flip over all of your opponent's Resource cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=XCOPY | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Move one of your opponent's Resource cards to your side of the table. Leave all non-Defense cards installed on it (discard any installed Defense cards). | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=Port Scanner | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Flip over all installed Defense cards for one of your opponent's Resource cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=File Shredder | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Remove and card on your side of the table or hand from gameplay for the rest of the round. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=BLOB Encryptor | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Remove all attribute tokens from a card, and apply a "BLOB" token to it. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=BLOB: '''B'''inary '''L'''ong '''OB'''ject | |||
}} | }} | ||
{{card | {{card | ||
|title= | |title=PHP | ||
|type= | |type=Application | ||
|bgcolor= | |bgcolor=00c | ||
|text= | |text=Allows for PHP scripts to be run on an HTTP server or hard drive. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext='''P'''HP: '''H'''ypertext '''P'''reprocessor | |||
}} | }} | ||
<br clear=all> | |||
=== Resource === | |||
{{card | {{card | ||
|title= | |title=SQL Server | ||
|type= | |type=Resource | ||
|bgcolor= | |bgcolor=0cc | ||
|text= | |text=Can store up to four BLOB-encrypted cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=SQL: '''S'''erver '''Q'''uery '''L'''anguage | |||
}} | }} | ||
{{card | {{card | ||
|title= | |title=HTTP Server | ||
|type= | |type=Resource | ||
|bgcolor= | |bgcolor=0cc | ||
|text= | |text=Can store up to four cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=HTTP: '''H'''yper'''T'''ext '''T'''ransfer '''P'''rotocol | |||
}} | }} | ||
{{card | {{card | ||
|title= | |title=FTP Server | ||
|type= | |type=Resource | ||
|bgcolor= | |bgcolor=0cc | ||
|text= | |text=Can store up to four cards. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=FTP: '''F'''ile '''T'''ransfer '''P'''rotocol | |||
}} | }} | ||
{{card | {{card | ||
|title=Quarantine | |title=Quarantine | ||
|type= | |type=Resource | ||
|bgcolor= | |bgcolor=0cc | ||
|text= | |text=Can store up to eight Virus cards. All viruses stored here are latent until moved to the other side of the table. | ||
|cornervalue=- | |||
|cornervalue= | |||
|creator=Adam | |creator=Adam | ||
|flavortext=HTTP: '''H'''yper'''T'''ext '''T'''ransfer '''P'''rotocol | |||
}} | }} | ||
<br clear=all> | <br clear=all> | ||
=== | === Hardware === | ||
{{card | {{card | ||
|title= | |title=Hard Drive | ||
|type= | |type=Hardware | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text=Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} | ||
{{card | {{card | ||
|title= | |title=RAM Stick | ||
|type= | |type=Hardware | ||
|bgcolor= | |bgcolor=ccc | ||
|text= | |text=Extends maximum hand size by one. | ||
|cornervalue= | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
}} | }} |
Revision as of 21:25, 22 May 2007
1337h4x CCG set | |
---|---|
Designer | Adam |
Date | 5-19-2007 |
Players | 2+ |
This is a CCG set, a set of cards which can be used to construct personalised decks, in the style of a collectable card game. | |
To play Dvorak: Draw five cards each and leave the rest as a draw pile. On your turn, draw a card from the draw pile and play one Thing and/or one Action. (See the full rules.) | |
Print this deck Generate MUSHcode | |
This deck is locked. Further cards should not be added - leave feedback on the talk page. |
Rules
Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. Defense cards are placed in front of Container cards to protect them, and Resource cards are attached to Container cards to get this protection. These rules suck and are obscure, but bear with me, I'm working on it. Please don't add any cards until I get the main rules and such filled out.
Card list
The following is a list of all of the cards in 1337h4x.
Hacks
Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way.
-
Buffer OverflowHack
Opponent must discard his or her hand and draw five new cards.
Card by Adam
-
XSS AttackHack
Disable one Defense card installed on your an opponent's HTTP server until the end of this turn.
Card by Adam
-
SQL InjectionHack
Disable one Defense card installed on an opponent's SQL server until the end of this turn.
Card by Adam
-
Remove File InclusionHack
Disable one Defense card installed on an opponent's PHP-enabled HTTP server until the end of this turn.
Card by Adam
-
DDoS AttackHack
---
DDoS: Distributed Denial-of-Service
DDoS: Distributed Denial-of-Service
Card by Adam
Viruses
1
WormVirus
Discard any card with a level equal to or less than the level of this card.
Card by Adam
Applications
1
Virus ScanApplication
Destroy all active Virus cards on user's side of the table with levels equal to or less than the level of this card.
Card by Adam
-
FTP ClientApplication
Move up to two cards from an opponent's FTP server to your side of the table.
Card by Adam
-
BruteforcerApplication
Destroy one "Password Protection" card on your opponent's side of the table.
Card by Adam
-
PingApplication
Flip over all of your opponent's Resource cards.
Card by Adam
-
XCOPYApplication
Move one of your opponent's Resource cards to your side of the table. Leave all non-Defense cards installed on it (discard any installed Defense cards).
Card by Adam
-
Port ScannerApplication
Flip over all installed Defense cards for one of your opponent's Resource cards.
Card by Adam
-
File ShredderApplication
Remove and card on your side of the table or hand from gameplay for the rest of the round.
Card by Adam
-
BLOB EncryptorApplication
Remove all attribute tokens from a card, and apply a "BLOB" token to it.
BLOB: Binary Long OBject
BLOB: Binary Long OBject
Card by Adam
-
PHPApplication
Allows for PHP scripts to be run on an HTTP server or hard drive.
PHP: Hypertext Preprocessor
PHP: Hypertext Preprocessor
Card by Adam
Resource
-
SQL ServerResource
Can store up to four BLOB-encrypted cards.
SQL: Server Query Language
SQL: Server Query Language
Card by Adam
-
HTTP ServerResource
Can store up to four cards.
HTTP: HyperText Transfer Protocol
HTTP: HyperText Transfer Protocol
Card by Adam
-
FTP ServerResource
Can store up to four cards.
FTP: File Transfer Protocol
FTP: File Transfer Protocol
Card by Adam
-
QuarantineResource
Can store up to eight Virus cards. All viruses stored here are latent until moved to the other side of the table.
HTTP: HyperText Transfer Protocol
HTTP: HyperText Transfer Protocol
Card by Adam
Hardware
-
Hard DriveHardware
Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand.
Card by Adam
-
RAM StickHardware
Extends maximum hand size by one.
Card by Adam
Defense
1
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
2
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
3
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
4
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
5
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
6
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
7
FirewallDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
7
Password ProtectionDefense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card. Search your deck and discard pile for a "Password" upon setting and place it underneath this card when setting.
Card by Adam