Difference between revisions of "1337h4x CCG set"

From Dvorak - A Blank-Card Game
Jump to navigationJump to search
Line 2: Line 2:
|designer=Adam
|designer=Adam
|date=5-19-2007
|date=5-19-2007
|players=2+
|players=2
|status=CCG set
|status=CCG set
}}
}}
Line 217: Line 217:
}}
}}


<br clear=all>
=== Plug-Ins ===
Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced words at the beginning of each card denotes which card(s) it affects.
{{card
|title=REFLECT.DLL
|type=Plug-In
|bgcolor=ccc
|text='''Defense Cards''' -
|cornervalue=-
|creator=Adam
}}
{{card
|title=BZIP2.DLL
|type=Plug-In
|bgcolor=ccc
|text='''Resource Cards''' -
|cornervalue=-
|creator=Adam
}}
{{card
|title=UPLOAD.DLL
|type=Plug-In
|bgcolor=ccc
|text='''"FTP.EXE"''' -
|cornervalue=-
|creator=Adam
}}


<br clear=all>
<br clear=all>
=== Resources ===
=== Resources ===
{{card
{{card
Line 292: Line 263:
|title=Hard Drive
|title=Hard Drive
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand.
|text=Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand.
|cornervalue=-
|cornervalue=-
Line 300: Line 271:
|title=RAM Stick
|title=RAM Stick
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=Extend your maximum hand size by one.
|text=Extend your maximum hand size by one.
|cornervalue=-
|cornervalue=-
Line 309: Line 280:
|title=Hardware Firewall
|title=Hardware Firewall
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=Counts as an unhackable, v2.0 Network Defense card.
|text=Counts as an unhackable, v2.0 Network Defense card.
|cornervalue=-
|cornervalue=-
Line 317: Line 288:
|title=T1 Line
|title=T1 Line
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=
|text=
|cornervalue=-
|cornervalue=-
Line 325: Line 296:
|title=Router
|title=Router
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=Add +1 to all Network Defense checks.
|text=Add +1 to all Network Defense checks.
|cornervalue=-
|cornervalue=-
Line 333: Line 304:
|title=CD-ROM Drive
|title=CD-ROM Drive
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=
|text=
|cornervalue=-
|cornervalue=-
Line 341: Line 312:
|title=Tape Drive
|title=Tape Drive
|type=Hardware
|type=Hardware
|bgcolor=ccc
|bgcolor=666
|text=Move one Resource card (and all installed cards) out of play. Installed Virus cards lose their effect, and installed Application and Hack cards must aren't able to be used. You can use an Action during your turn to return everything into play.
|text=Move one Resource card (and all installed cards) out of play. Installed Virus cards lose their effect, and installed Application and Hack cards must aren't able to be used. You can use an Action during your turn to return everything into play.
|cornervalue=-
|cornervalue=-
Line 353: Line 324:
|title=Firewall
|title=Firewall
|type=Defense
|type=Defense
|bgcolor=00c
|bgcolor=cc0
|text=If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card.
|text=If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card.
|cornervalue=-
|cornervalue=-
Line 361: Line 332:
|title=Password Protection
|title=Password Protection
|type=Defense
|type=Defense
|bgcolor=00c
|bgcolor=cc0
|text=If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card. Search your deck and discard pile for a "Password" upon setting and place it underneath this card when setting.  
|text=If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card. Search your deck and discard pile for a "Password" upon setting and place it underneath this card when setting.  
|cornervalue=-
|cornervalue=-
Line 371: Line 342:
The following are all considered "extension" cards, or cards that aren't part of the core series but can be used as well.
The following are all considered "extension" cards, or cards that aren't part of the core series but can be used as well.


<br clear=all>
==== Plug-Ins ====
Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects.
{{card
|title=REFLECT.DLL
|type=Plug-In
|bgcolor=ccc
|text=''''Defense Cards'''' -
|cornervalue=-
|creator=Adam
}}
{{card
|title=BZIP2.DLL
|type=Plug-In
|bgcolor=ccc
|text=''''Resource Cards'''' -
|cornervalue=-
|creator=Adam
}}
{{card
|title=UPLOAD.DLL
|type=Plug-In
|bgcolor=ccc
|text=''''"FTP.EXE"'''' -
|cornervalue=-
|creator=Adam
}}
<br clear=all>
====CD-ROMs====
====CD-ROMs====
An CD-ROM card is used by "equipping" itself to an active "CD-ROM Drive" card. Only one CD-ROM card may be "equipped" to a "CD-ROM Drive" card at a time.
An CD-ROM card is used by "equipping" itself to an active "CD-ROM Drive" card. Only one CD-ROM card may be "equipped" to a "CD-ROM Drive" card at a time.
{{card
{{card
|title=
|title=Something (Disc 1 of 2)
|type=CD-ROM
|bgcolor=ccc
|text=
|cornervalue=-
|creator=Adam
}}
{{card
|title=Something (Disc 2 of 2)
|type=CD-ROM
|type=CD-ROM
|bgcolor=ccc
|bgcolor=ccc
Line 382: Line 390:
}}
}}


<br clear=all>
====PHP Scripts====
====PHP Scripts====
PHP Script cards require an active "PHP.EXE" on a "Hard Drive" or "HTTP Server." Unlike CD-ROM cards, PHP Script cards don't require any "equipping;" they instead need to be installed onto the same server as "PHP.EXE" in order to be used.
PHP Script cards require an active "PHP.EXE" on a "Hard Drive" or "HTTP Server." Unlike CD-ROM cards, PHP Script cards don't require any "equipping;" they instead need to be installed onto the same Resource card as "PHP.EXE" in order to be used.
{{card
{{card
|title=
|title=C99.PHP
|type=PHP Script
|type=PHP Script
|bgcolor=ccc
|bgcolor=ccc
Line 393: Line 402:
}}
}}


<br clear=all>
====Perl Scripts====
====Perl Scripts====
Perl scripts behave just like PHP scripts, but require "PERL.EXE" instead of "PHP.EXE."
Perl scripts behave just like PHP scripts, but require "PERL.EXE" instead of "PHP.EXE."
{{card
{{card
|title=
|title=SAMPLE.PL
|type=Perl Script
|type=Perl Script
|bgcolor=ccc
|bgcolor=ccc

Revision as of 22:43, 25 May 2007

1337h4x CCG set
Designer Adam
Date 5-19-2007
Players 2
This is a CCG set, a set of cards which can be used to construct personalised decks, in the style of a collectable card game.
To play Dvorak: Draw five cards each and leave the rest as a draw pile. On your turn, draw a card from the draw pile and play one Thing and/or one Action. (See the full rules.)
Cards.gif Print this deck

Telnet.gif Generate MUSHcode
Cards.gif Generate Lackey export
Mtgcard.gif Generate Apprentice CSV

Padlock.gif
This deck is locked. Further cards should not be added - leave feedback on the talk page.

Overview

1337h4x (pronounced "LEET-HACKS") is a card game designed after computer hacking and security. Of course, being a Dvorak game, it's fairly unrealistic and inaccurate, but it's still pretty...well, 1337. It's really more of a fun little diversion for hackers, programmers, and other computer-minded people who'll get a chuckle out of playing an "XSS Attack" or "DDoS Attack" card. (If you don't know what either of those mean, then this game is probably not for you.)

It's technically a CCG, but since a.) you can just print out all the good cards and b.) nobody sells them anyways, you can just print out and build a deck to play with. "Rarity" isn't really a factor in 1337h4x cards.

Rules

Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. Defense cards are placed in front of Resource cards to protect them, and Hack cards can destroy Defense cars. Application cards can do a variety of things, and Hardware cards modify your abilities. These rules suck and are obscure, but bear with me, I'm working on them. Please don't add any cards until I get the main rules and such filled out. You're welcome to suggest cards on the Talk Page or even just voice your praise or dissent there, if you'd like.


Card list

The following is a list of all of the cards in 1337h4x.


Hacks

Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way. Hack cards are discarded upon use unless otherwise noted.

-
Buffer Overflow
Hack
Opponent must discard his or her hand and draw five new cards.
Card by Adam
-
XSS Attack
Hack
Disable one Defense card installed on your an opponent's HTTP server until the end of this turn.
Card by Adam
-
SQL Injection
Hack
Disable one Defense card installed on an opponent's SQL server until the end of this turn.
Card by Adam
-
Remove File Inclusion
Hack
Disable one Defense card installed on an opponent's PHP-enabled HTTP server until the end of this turn.
Card by Adam
-
DDoS Attack
Hack
DDoS: Distributed Denial-of-Service
Card by Adam
-
BSOD
Hack
BSOD: Blue Screen Of Death
Card by Adam


Malware

-
Worm
Malware
Discard any card with a level equal to or less than the level of this card.
Card by Adam
-
Spyware
Malware
Card by Adam


Applications

-
ANTIVIRUS.EXE
Application
Discard all active Virus cards on user's side of the table with levels equal to or less than the level of this card.
Card by Adam
-
FTP.EXE
Application
Move up to two cards from an opponent's FTP server to your side of the table.
FTP: File Transfer Protocol
Card by Adam
-
BRUTUS.EXE
Application
Discard one "Password Protection" card on your opponent's side of the table.
Card by Adam
-
PING.EXE
Application
Flip over all of your opponent's Resource cards.
Card by Adam
-
XCOPY.EXE
Application
Move one of your opponent's Resource cards to your side of the table. Leave all non-Defense cards installed on it (discard any installed Defense cards).
Card by Adam
-
PORTSCAN.EXE
Application
Flip over all installed Defense cards for one of your opponent's Resource cards.
Card by Adam
-
FILESHRED.EXE
Application
Remove and card on your side of the table or hand from gameplay for the rest of the round.
Card by Adam
-
ENBLOB.EXE
Application
Remove all attribute tokens from a card, and apply a "BLOB" token to it.
BLOB: Binary Long OBject
Card by Adam
-
DEBLOB.EXE
Application
BLOB: Binary Long OBject
Card by Adam
-
PHP.EXE
Application
Allows for PHP scripts to be run on an HTTP server or hard drive.
PHP: Hypertext Preprocessor
Card by Adam
-
PERL.EXE
Application
Allows for Perl scripts to be run on an HTTP server or hard drive.
Perl: Pathologically Eclectic Rubbish Lister
Card by Adam
-
SYSRESTORE.EXE
Application
Card by Adam
-
UNDELETE.EXE
Application
Card by Adam
-
FORMAT.EXE
Application
Card by Adam
-
BITTORRENT.EXE
Application
Discard one card and draw two more.
Card by Adam



Resources

-
SQL Server
Resource
Can store up to four BLOB-encrypted cards.
SQL: Server Query Language
Card by Adam
-
HTTP Server
Resource
Can store up to four cards.
HTTP: HyperText Transfer Protocol
Card by Adam
-
FTP Server
Resource
Can store up to four cards.
FTP: File Transfer Protocol
Card by Adam
-
Quarantine
Resource
Can store up to eight Virus cards. All viruses stored here are latent until moved to the other side of the table.
HTTP: HyperText Transfer Protocol
Card by Adam


Hardware

Hardware cards are played and then left on the field. Rarely can they be destroyed. A player can only have two Hardware cards active at once; active cards must be discarded for a new one to take its place.

-
Hard Drive
Hardware
Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand.
Card by Adam
-
RAM Stick
Hardware
Extend your maximum hand size by one.
RAM: Random Access Memory
Card by Adam
-
Hardware Firewall
Hardware
Counts as an unhackable, v2.0 Network Defense card.
Card by Adam
-
T1 Line
Hardware
Card by Adam
-
Router
Hardware
Add +1 to all Network Defense checks.
Card by Adam
-
CD-ROM Drive
Hardware
Card by Adam
-
Tape Drive
Hardware
Move one Resource card (and all installed cards) out of play. Installed Virus cards lose their effect, and installed Application and Hack cards must aren't able to be used. You can use an Action during your turn to return everything into play.
Card by Adam


Defense

These are the cards designed to keep your precious resources from being "teh h4xed."

-
Firewall
Defense
If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card.
Card by Adam
-
Password Protection
Defense
If the attacking card's level is equal to or less than the level of this card, discard it. Otherwise, discard this card. Search your deck and discard pile for a "Password" upon setting and place it underneath this card when setting.
Card by Adam


Extensions

The following are all considered "extension" cards, or cards that aren't part of the core series but can be used as well.


Plug-Ins

Plug-In cards are used to enhance the functionality of a card (except Hardware). The boldfaced, italicized words at the beginning of each card denotes which card(s) it affects.

-
REFLECT.DLL
Plug-In
'Defense Cards' -
Card by Adam
-
BZIP2.DLL
Plug-In
'Resource Cards' -
Card by Adam
-
UPLOAD.DLL
Plug-In
'"FTP.EXE"' -
Card by Adam


CD-ROMs

An CD-ROM card is used by "equipping" itself to an active "CD-ROM Drive" card. Only one CD-ROM card may be "equipped" to a "CD-ROM Drive" card at a time.

-
Something (Disc 1 of 2)
CD-ROM
Card by Adam
-
Something (Disc 2 of 2)
CD-ROM
Card by Adam


PHP Scripts

PHP Script cards require an active "PHP.EXE" on a "Hard Drive" or "HTTP Server." Unlike CD-ROM cards, PHP Script cards don't require any "equipping;" they instead need to be installed onto the same Resource card as "PHP.EXE" in order to be used.

-
C99.PHP
PHP Script
Card by Adam


Perl Scripts

Perl scripts behave just like PHP scripts, but require "PERL.EXE" instead of "PHP.EXE."

-
SAMPLE.PL
Perl Script
Card by Adam