ConsoleDeck

From Dvorak - A Blank-Card Game
Revision as of 13:22, 8 April 2010 by Dcty2 (talk | contribs) (Created page with '{{Infobox | designer = Dcty2 | date = 8/04/2010 | players = 2+ | status = unfinished }} <br clear=all /> ==Viruses== {{card |title=Document Pursuiter |type=Virus |text=Destroy …')
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search
ConsoleDeck
Designer Dcty2
Date 8/04/2010
Players 2+
This deck has not been categorised.
To play Dvorak: Draw five cards each and leave the rest as a draw pile. On your turn, draw a card from the draw pile and play one Thing and/or one Action. (See the full rules.)
Cards.gif Print this deck

Telnet.gif Generate MUSHcode
Cards.gif Generate Lackey export

Padlock.gif
This deck is locked. Further cards should not be added - leave feedback on the talk page.


Viruses

Document Pursuiter
Virus
Destroy a File.
MSCROS
Virus
Flip a coin. If it lands heads, destroy 2 Files and play another Virus.
Fake Anti-Spyware Protection
Virus
Sacrifice a Virus to destroy 2 Files.
Connection Haywirer
Virus
Destroy an Internet Connection.
Three-Dot Fraud
Virus
Destroy an Internet Connection
Ambidextrous Killer
Virus
Destroy two Files and an Internet Connection.
Quick Prank 404
Virus
Destroy an Internet Connection temporarily. After 2 turns, it is revived.
Trojan Horse
Virus
Destroy a File.
Trojan Warrior on a Trojan Horse
Virus
Destroy two Files.
Trojan Warrior with a Trojan Sword on a Trojan Horse
Virus
Destroy three Files.
Devastative Unexpected Automatic Shutdown
Virus
Totally destroy all the cards on play.
Deliberate Computer Crasher
Virus
Totally destroy all your opponent's cards on play.


Documents

Microsoft Word Table
File
Microsoft Word Analysis Document
File
PowerPoint Presentation
File
Excel Macro-File
File
Excel To-be-printed Timetable
File
Microsoft Visio Flowchart
File
Microsoft Visio Flowchart
File
PNG File
File
JPG File
File
GIF File
File
BMP File
File
L-AME File
File
Unknown Passworded Document
File
Be immune to Viruses for 2 turns.


Internet Connections

Ethernet Connection
Internet Connection
2-Way Router Connection
Internet Connection
Play twice as much as allowed to play in one turn.
Offline Connection
Internet Connection
Be immune to Internet Connection-destroying Viruses for 2 turns.
Broadband Connection
Internet Connection
Play twice as much as allowed to play in one turn.
Dial-up Connection
Internet Connection
Be immune to Internet Connection-destroying Viruses for a turn, but play twice as less as allowed to play in one turn.
Wireless Connection
Internet Connection
Take an Internet Connection from your opponent's hand (or deck if none in his/her hand) and keep it for 2 turns. After that, put it back.
Secure Wireless Connection
Internet Connection
If you have a Password, take an Internet Connection from your opponent's hand (or deck if none in his/her hand) and keep it for 2 turns. After that, put it back.
Secure Wireless Connection
Internet Connection
If you have a Password, take an Internet Connection from your opponent's hand (or deck if none in his/her hand) and keep it for 2 turns. After that, put it back.


Passwords

Password
Password
Password
Password
Password
Password


Tracking Software

Cookie
Tracking Software
Steal a peek at one of your opponent's hand cards.
Chocolate Chip Cookie
Tracking Software
Steal a peek at 2 of your opponent's hand cards. Mmmm. Chomp chomp.
Chocolate Chip Cookie And A Cup of Chocolate
Tracking Software
Steal a peek at 2 of your opponent's hand cards. If one of them is a Virus, get an extra turn. Yum! Munch munch. Shlurp. Chomp chomp. Sip.
Nano-Cyberfly
Tracking Software
Steal a peek at one of your opponent's hand cards.
Nano-Cyberfly
Tracking Software
Steal a peek at one of your opponent's hand cards.
Nano-Cyberfly
Tracking Software
Steal a peek at one of your opponent's hand cards.
Unintended Cookie From A Gaming Website
Tracking Software
Steal a peek at one of your opponent's hand cards. In fact, just take the card.