Professional Documents
Culture Documents
Happy99 PVP Demo
Happy99 PVP Demo
Not really, no
THANK YOU!
Charlotte Laskowski
P.P.S. FOLLOW THE KICKSTARTER IF YOU HAD FUN
https://www.kickstarter.com/projects/basilisika/happy99-0
2:00AM
SO_YOU_WANT_TO_BE_A_HACKER.txt
HEADER.txt
alt.hell.bound.flame.flame.flame
If you’ve
Mauris got
vitaea landline
mauris sit
andamet
a computer
est rhoncus
that isn’t
lao- On 7/27/1996 2:28 PM, Mouse M. wrote:
totally
reet.garbage,
Curabiturwell, you > On 7/27/1996 2:27 PM, x_star_x wrote:
facili-
cansis,
hack.urna
I mean,
vel egestas
come on >> Do you really think they’re just picking people
dude,
vulputate,
it’s nottellus purus >> off the street? You can’t be serious
that hard.
You’re
accumsan
already
ante,
on it.
quisKick >>
yourfacilisis
kid sisterduioff
nislthea I’d tell you to read the rules but I assume you did
phone
nunc.
already and get because you managed to break all of them. First off,
online. Clock is ticking.
Nulla vestibulum elei-
Table
fendofnulla.
Contents
Suspendisse
I. SO_YOU_WANT_TO_BE_A_HACKER———————————-1
potenti. Aliquam turpis nisi, venenatis non, accumsan nec, imperdiet
1.
laoreet,
Building
lacus.
A NewInComputer——————-—————2
purus est, mattis eget, imperdiet nec, fermentum
2.
congue,
Using tortor.
Your NewAenean
Computer——————————–-5
ut nibh. Nullam hendrerit viverra dolor. Vesti-
2a.
bulumHacking
fringilla,
a System
lectus
in HAPPY99———————7
id viverra malesuada, enim mi adipiscing ligu-
3.
la,Example———————————————————————————12
et bibendum lacus lectus id sem. Cras risus turpis, varius ac, feu-
giat id, faucibus vitae, massa. Nunc gravida nonummy felis. Etiam
suscipit, est sit amet suscipit sodales, est neque suscipit erat, nec
suscipit sem enim eget leo. In porttitor rutrum leo. Ut eget leo.
Nulla quis nibh. Proin ac pede vel ligula facilisis gravida. Phasellus
purus. Etiam sapien. Duis diam urna, iaculis ut, vehicula ac, varius
sit amet, mi. Donec id nisl. Aliquam erat volutpat. Integer fringilla.
Duis lobortis, quam non volutpat suscipit, magna sem consequat libero,
ac hendrerit urna ante id mi. Quisque commodo facilisis tellus. Integer
sodales lorem sed nisl. Morbi consectetuer mauris quis odio. Ut dolor
lorem, viverra vitae, viverra eu, euismod nec, enim. Lorem ipsum dolor
sit amet, consectetuer adipiscing elit.
BUILDING_A_NEW_COMPUTER.txt
SIMM => Small card plugged into your motherboard that contains random
access memory. Determines how many programs and scripts you can run at
the same time. Comes in a straight line, and each rank comes as one
square: the total number of SIMM ranks determines the total rank and
number of programs that can be operating at once.
CPU => The rating of your CPU is the number of actions you can take on
your turn, but their effectiveness is based on the SIMM rating. Form a
square shape. Each rank takes one square and grants an extra action.
2:02AM
BUILDING_A_NEW_COMPUTER.txt
EXTRAZ => A killer keyboard, the loudest speakers this side of Edge
City, or a floppy disk reader loaded up with an extra script – these are
just some the extras you can plug into your mobo to streamline your
hacking, explained on page XX.
OS => There are two types of OSes, one with a GUI (graphical user inter-
face) which makes it easier to do basic tasks, and one without, which
frees up resources. More on page XX.
NIC => Network interface controller, aka the thing that gets you on the
Net. This controls how fast you can upload your own scripts: when exe-
cuting scripts, you execute 2 actions per rank of your NIC.
MOTHERBOARD (MOBO)
PlatinumX => “We get the job done.” The most popular and basic mobo.
Moderate space. It uses a specialized overclocking system to boost its
own power.
**If equipped with 2 or more SIMMs of the same rank, the CPU runs as if
one rank higher, up to rank V.**
MiniMax => “Is that a rocket in your pocket?” Pocket-sized and power-
ful. Streamlined for specialized tasks (and hacking).
**If Program ranks meet SIMM rank exactly, the Program runs as if one
rank higher.**
BUILDING_A_NEW_COMPUTER.txt
EXTRAZ
Your motherboard also has slots for plugging in the extra partz you
need to crack the systems of your enemies, at the cost of using up more
space you could’ve plugged in an extra SIMM to.
FLOPPY DISK => A floppy disk reader plugged into your computer means
you can write two scripts at once, choosing which script to write to
when you take that action, and which script to use when you want to
unleash it. [2X3]
DVORAK KEYBOARD => You’re on that DVORAK keyboard game and you can type
faster than your peers on QWERTY boards. You can add an action to a
script at the end of the turn without using another action. [3X2]
LOUD SPEAKERS => You’ve got your hacking jams and your sunglasses on in
the dark room and now you hack just a little cooler. You choose the
music playing while you’re hacking each other, and you get +1 to your
MALWARE rolls. [2X4]
2:04AM
USING_YOUR_NEW_COMPUTER.txt
The rest of the computer’s grid (squares 0-5, A-F) is made up of your
programs. These can fill up your grid, but the more running programs,
the easier it is for one to become a vulnerability.
OS => This decides how you interface with your PC, and has specialized
access to the programs you use or how you use them.
GUI are easy but require 1 rank of your total SIMMs to run. The benefits
of this are multi-tasking. **You can add an action to a script at the
end of the turn without using another action.**
Terminals (text interfaces) are more advanced and don't require extra
resources. **You can run one more Program (background_process, malware,
or protection) than the limit of your SIMMs.**
FILE_SYSTEM => The file system is a 2x2 section on your programs grid
that stores on of your confidential files that the opponent(s) are try-
ing to hack into and remove from your system. You need at least one
file_system on your computer, but the more that you have, the harder it
is to find the confidential files.
HACKING_A_SYSTEM_IN_HAPPY99.txt
HEADER.txt
The HAPPY99 Demo is a two or more player PVP game that uses opposed 2d6
rolls modified by your parts or programs. Each player builds their com-
puter, loads it up with desired programs and firewall configuration,
and then selects three secret locations in their filesystem and parts
as "confidential files” or “confs” for short. After these initial
preparations, the hacking begins.
Players keep their grids hidden from each other and only reveal infor-
mation as needed. Commands (page xx) are used to explore and gather
information about opposing systems until a player is ready to strike.
Good luck!
2:06AM
USING_YOUR_NEW_COMPUTER.txt
COMMANDS
A command does not require system resources to use, and always takes
one action. They are used to learn about the opponent’s system, from
the configuration and ranking of parts, to the location of the fire-
wall. Important in making targeted strikes rather than wasting your
resources hacking haphazardly.
decrypt => Used to crack the encryption on desired parts. The rank of
this command is equivalent to the number of actions spent to decrypt.
Roll 2d6+DECRYPT vs the opponent’s 2d6+ENCRYPT. For each action spent
decrypting, you lose that action later in the turn.
df => Reveals what programs are located directly next to and touching
the chosen square. This does not reveal what is on the chosen square.
If the program or square is covered by Firewall or another background_
process, it only reveals that it is covered by Firewall (even if cov-
ered by another background_process.)
USING_YOUR_NEW_COMPUTER.txt
stat => Reveals information about the chosen unencrypted square. 1st
use: What is on the square & if it’s covered by a firewall
2nd use, if program: Rank of program
2nd use, if filesystem: Confidental file or not on that square
2nd use, if background_process: Type of background_process/firewall
2:08AM
USING_YOUR_NEW_COMPUTER.txt
PROGRAMS
Programs are divided into three categories: MALWARE, BACKGROUND_PRO-
CESS, and PROTECTION. Malware is used offensively, and protection pro-
grams are used defensively. Each program takes up as many squares as
its rank in any configuration, and costs its rank in SIMM capacity to
run. Currently running programs are switched as an action.
BACKGROUND_PROCESS
FIREWALL => Firewalls are placed on the grid in any number and any con-
figuration, and protect squares surrounding them on the top, bottom,
and sides. When a program is to be unleashed on the square protected by
the firewall, it is diverted to the firewall first.
MALWARE
Malware (Malicious Software) is any program, software, or script used
offensively to damage a system.
2:10AM
USING_YOUR_NEW_COMPUTER.txt
PROTECTION
Protection software, anti-malware, anti-virus – meant to protect your
system from malicious actors.
MALWARE_CHOMP => Add the rating of this program to any roll used to
remove malware from your system.
SCRIPTING_BASICS
You don’t always have to use pre-made programs when you want to hack
someone, script kiddie. Instead of taking a regular action, you can
instead use your action to secretly record a command in a script. If
your opponent has a keylogger, you’ll have to tell them what steps you
record, but not before it is added or after it is removed. To enact a
script, you use your entire turn, and all of the recorded actions are
taken at once up to the limit of your NIC in the sequence they were
recorded. This can be more or less actions than you’d normally be able
to take in a turn. Any remaining actions on your script will be taken at
the beginning of your next turn, and you may take your action normally
after they have resolved. Each script can only be used once.
2:12AM