Honeypot Raven | Burn 5: All damage done to you by Attacks this turn is cancelled. |
A Hydra Through The Trapdoor In The Firewall Raven | Burn 10: Destroy an opponent's Program. |
Basic Firewall Kevan | The first time your system is damaged, prevent that damage. |
0-Day Warez Kevan | When you install this Program, replace it with a copy of any other Program that was bid for this round. |
Trojan Whores Raven | If an opponent does damage to you, they become Infected. An Infected player takes 5 damage at the end of each subsequent turn. They may burn 5 to remove the Infection. |
Underwarez Raven | When you damage an opponent, you gain 5 Bits. |
Backdoor Trojan Kevan | Spend 10: If you successfully damage an opponent's system this turn, they become Hacked. Each turn, Hacked players must spend 10 (or all) Bits doing nothing - the player who hacked them may instead allocate those Bits as part of their own turn. |
Black Ice Kevan | Burn 10: If you are damaged this turn, you may destroy a Program on the damaging player's system. |
Spyware Accelerator Raven | You may spend an extra 20 Bits each turn, but your turn is revealed before your opponents' choices are made, if you choose to do so. |
Password Guesser Raven | Add fifty percent (rounded down) to any damage you cause by Attacking. |
Slime Virus Kevan | Burn 5: If you successfully damage an opponent's system this turn, their system becomes Slimed. Slimed systems can only spend half their Bits, each turn. |
Anti-Virus Kevan | Spend 10: Remove a Virus from your system. |
Black Virus Kevan | At the end of each round, lose 10 Bits. Whenever you successfully damage an opponent, give them a copy of Black Virus. |
Rapid Disconnect Kevan | Burn 5: After actions are revealed, you may choose to disconnect; you take no further part in that round. |
Data Siphon Kevan | At the end of each round, steal 5 Bits from each opponent you damaged during that round. |
Gammatech Firewall Kevan | Spend 15 and nominate a Program: That Program may not be used against you this round. |
Packet Sniffer Kevan | Bits are assigned and declared in two stages; those being spent by opponents to activate Programs, then the rest. |
Dust Virus Kevan | At the end of each round, destroy a Program you own (other than Dust Virus). Whenever you successfully damage an opponent, give them a copy of Dust Virus. |
Spyware Kevan | Choose a Program when you bid for this. Whoever wins that Program must declare their Bit Allocations to you before you make yours, each round. |
Auction Server Kevan | You may destroy any of your Programs to gain Bits equal to their Power Strength, at any time. |
Hex Editor Kevan | Spend 10: Double or halve any number on any Program you own. (May not be used more than once per round per Program.) |
Wingman Kevan | Wingman has 50 Bits and starts with a copy of the Program with the lowest Power Strength (other than himself). |
Open Source Kevan | When you win this Program, you may take free copies of any other Programs. For each Program you copy, its owner may take a copy of one of your Programs (other than Open Source). |
Pokerbot Kevan | Spend 10: Gain 15 Bits. Use once per round. |
Routetracer Kevan | Spend 20: Select a Program which has been used against you this turn. It may not be used against you again. |
Zombie Process Kevan | You may use any other Program in play as if it were your own. If you use a Program during the same round that its owner uses it, however, your use has no effect and you lose 5 Bits. |
Partitioned Hard Drive Ultimatum479 | When your System is fully hacked, you may immediately recover with no Programs and with Bits equal to 2 times this Program's Program Strength. |
Seed AI Ultimatum479 | Gain a number of Bits equal to the round number at the beginning of each round. When your total Bits exceed the sum of all other systems' Bits, you win. |
Network Throttler Kevan | The Program in play with the most characters in its description has no effect. |
Surge Protector Kevan | If the single largest Attack of the round targets you, it is reduced to zero. |
Keylogger Kevan | Spend 10: If you damage any Hackers this round, gain copies of all of their Programs (except Sidekicks) that you don't already have. |
Greed Anonymous | Flaw. (All players pay their bids for this, except for the lowest bidder(s), who must take it and cannot discard it.) Your opponents can secretly pay you Bits before the round (those Bits are burnt on their end and added to your maximum). You cannot Attack the hacker who paid you the most Bits for that Round. |
Read-Only Memory Zaratustra | At the end of the round, for any Bits you lost by reasons other than Burn, choose an equivalent quantity of Bits used on your actions that round. You regain the Bits as "ROM Bits" - each round, you must spend them in exactly those same actions, with the exact same targets. Only regular Bits can be lost by damage, burn and so on; as long as you only have ROM Bits, you are considered to be eliminated for game-winning purposes. |
rm -rf / Mystic Sailboat | Flaw. (All players pay their bids for this, except for the lowest bidder(s), who must take it and cannot discard it.) You lose. |