Difference between revisions of "1337h4x CCG set"
Line 106: | Line 106: | ||
|cornervalue=- | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=FTP: '''F'''ile '''T'''ransfer '''P'''rotocol | |||
}} | }} | ||
{{card | {{card | ||
Line 181: | Line 182: | ||
|cornervalue=- | |cornervalue=- | ||
|creator=Adam | |creator=Adam | ||
|flavortext=Perl: '''P'''athologically '''E'''clectic '''R'''ubbish '''L'''ister | |||
}} | }} | ||
{{card | {{card | ||
Line 208: | Line 210: | ||
<br clear=all> | <br clear=all> | ||
=== Plug-Ins === | === Plug-Ins === | ||
Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects. | Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects. |
Revision as of 22:05, 25 May 2007
1337h4x CCG set | |
---|---|
Designer | Adam |
Date | 5-19-2007 |
Players | 2+ |
This is a CCG set, a set of cards which can be used to construct personalised decks, in the style of a collectable card game. | |
To play Dvorak: Draw five cards each and leave the rest as a draw pile. On your turn, draw a card from the draw pile and play one Thing and/or one Action. (See the full rules.) | |
Print this deck Generate MUSHcode | |
This deck is locked. Further cards should not be added - leave feedback on the talk page. |
Overview
1337h4x (pronounced "LEET-HACKS") is a card game designed after computer hacking and security. Of course, being a Dvorak game, it's fairly unrealistic and inaccurate, but it's still pretty...well, 1337. It's really more of a fun little diversion for hackers, programmers, and other computer-minded people who'll get a chuckle out of playing an "XSS Attack" or "DDoS Attack" card. (If you don't know what either of those mean, then this game is probably not for you.)
It's technically a CCG, but since a.) you can just print out all the good cards and b.) nobody sells them anyways, you can just print out and build a deck to play with. "Rarity" isn't really a factor in 1337h4x cards.
Rules
Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. Defense cards are placed in front of Resource cards to protect them, and Hack cards can destroy Defense cars. Application cards can do a variety of things, and Hardware cards modify your abilities. These rules suck and are obscure, but bear with me, I'm working on them. Please don't add any cards until I get the main rules and such filled out. You're welcome to suggest cards on the Talk Page or even just voice your praise or dissent there, if you'd like.
Card list
The following is a list of all of the cards in 1337h4x.
Hacks
Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way. Hack cards are discarded upon use unless otherwise noted.
Malware
Applications
FTP: File Transfer Protocol
BLOB: Binary Long OBject
PHP: Hypertext Preprocessor
Perl: Pathologically Eclectic Rubbish Lister
Plug-Ins
Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects.
Resources
SQL: Server Query Language
HTTP: HyperText Transfer Protocol
FTP: File Transfer Protocol
HTTP: HyperText Transfer Protocol
Hardware
Hardware cards are played and then left on the field. Rarely can they be destroyed. A player can only have two Hardware cards active at once; active cards must be discarded for a new one to take its place.
RAM: Random Access Memory
Defense
These are the cards designed to keep your precious resources from being "teh h4xed."