Overview
1337h4x (pronounced "LEET-HACKS") is a card game designed after computer hacking and security.
Rules
Rules'll come soon. Basically both players send hacks at each other in hopes of obtaining the other's resources. Defense cards are placed in front of Resource cards to protect them, and Hack cards can destroy Defense cars. Application cards can do a variety of things, and Hardware cards modify your abilities. These rules suck and are obscure, but bear with me, I'm working on them. Please don't add any cards until I get the main rules and such filled out. You're welcome to suggest cards on the Talk Page or even just voice your praise or dissent there, if you'd like.
Card list
The following is a list of all of the cards in 1337h4x.
Hacks
Hack cards are played in order to remove your opponent's Defense cards or to affect your opponent's Containers, hand or discard pile in some negative way.
Hack
Opponent must discard his or her hand and draw five new cards.
Card by Adam
Hack
Disable one Defense card installed on your an opponent's HTTP server until the end of this turn.
Card by Adam
Hack
Disable one Defense card installed on an opponent's SQL server until the end of this turn.
Card by Adam
Hack
Disable one Defense card installed on an opponent's PHP-enabled HTTP server until the end of this turn.
Card by Adam
Hack
---
DDoS: Distributed Denial-of-Service
Card by Adam
Viruses
Virus
Discard any card with a level equal to or less than the level of this card.
Card by Adam
Applications
Application
Destroy all active Virus cards on user's side of the table with levels equal to or less than the level of this card.
Card by Adam
Application
Move up to two cards from an opponent's FTP server to your side of the table.
Card by Adam
Application
Destroy one "Password Protection" card on your opponent's side of the table.
Card by Adam
Application
Flip over all of your opponent's Resource cards.
Card by Adam
Application
Move one of your opponent's Resource cards to your side of the table. Leave all non-Defense cards installed on it (discard any installed Defense cards).
Card by Adam
Application
Flip over all installed Defense cards for one of your opponent's Resource cards.
Card by Adam
Application
Remove and card on your side of the table or hand from gameplay for the rest of the round.
Card by Adam
Application
Remove all attribute tokens from a card, and apply a "BLOB" token to it.
BLOB: Binary Long OBject
Card by Adam
Application
Allows for PHP scripts to be run on an HTTP server or hard drive.
PHP: Hypertext Preprocessor
Card by Adam
Resource
Resource
Can store up to four BLOB-encrypted cards.
SQL: Server Query Language
Card by Adam
Resource
Can store up to four cards.
HTTP: HyperText Transfer Protocol
Card by Adam
Resource
Can store up to four cards.
FTP: File Transfer Protocol
Card by Adam
Resource
Can store up to eight Virus cards. All viruses stored here are latent until moved to the other side of the table.
HTTP: HyperText Transfer Protocol
Card by Adam
Hardware
Hardware cards are played and then left on the field. Rarely can they be destroyed. A player can only have two Hardware cards active at once; active cards must be discarded for a new one to take its place.
Hardware
Can store up to four cards. Application and Hack cards store here can be used from here without being transfered to your hand.
Card by Adam
Hardware
Extend your maximum hand size by one.
Card by Adam
Defense
Defense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card.
Card by Adam
Defense
If the attacking card's level is equal to or less than the level of this card, destroy it. Otherwise, destroy this card. Search your deck and discard pile for a "Password" upon setting and place it underneath this card when setting.
Card by Adam