SlideShare une entreprise Scribd logo
1  sur  22
1
Players: 2-5
Ages: 12+
Table of Contents
Cover…………………………………………………………………………..Pg. 1
Story………………………………………………………………………...…Pg. 2
Game Overview………………………………..…………………...…….Pg. 3
Game Components……………………………....………….……….….Pg. 4
Reading the Cards………………………………....………………….....Pg. 5
Attack Cards……………………………………….…………………..…...Pg. 6
Defense Cards…………………………………….……………………..…Pg. 7
Movement Cards…………………………………..……………...……....Pg. 8
Player Tokens…………………………………………………….….….….Pg. 9
Game Setup………………………………………………………..….…..…Pg. 11
Player Setup……………………………….………..….……......Pg. 12
Turn Order………………………………………………......……Pg. 13
Board Setup……………………………….…………….......…..Pg. 14
Game Play………………………………………………………………….....Pg. 15
Turn Sequence……….……………………………….....………Pg. 15
Start Phase………………………………………………….....…Pg. 15
Use Card…………………………………………………....….….Pg. 15
Roll Dice…………………………………………………...……...Pg. 15
Buy Card……………………………………………….…...….….Pg. 15
Movement Phase……….……………………………....……...Pg. 15
Battle Phase…………….…………………………….…...……..Pg. 16
End Turn………………………………………………..…....…....Pg.16
General Rules……………………………………………………..…..…….Pg.17
Hacker Win Condition………………………………………………….Pg.18
Card Rules……………………………………………………….………..….Pg.19
Hacker Rules……………………………………………………………..…Pg.20
Virus Rules…………….…………………………………….…….…...……Pg.21
Credits…………………………..………………………….…………....……Pg.22
Story:
In today’s world, cyber security has gotten extremely weak and
has became vulnerable to attack. Hackers everywhere are
taking advantage of this and they need to be stopped. Hackers
on both sides of the moral coin are fighting for control of the
expansive virtual space that links nations. As a result of this
countries have built teams of extremely talented hackers to
defend and keep order in our virtual world. Hackers will take
take their place in the Great Hacking Wars inside the Omni-
present World Wide Web.
The battle started with a hacker that went rogue and released
an aggressive and crippling virus that is set on an unstoppable
warpath to annihilate the internet as we know it. A group of
hackers will have to band together, use their skills, and break
some rules in order to save the cyber world from destruction.
Virus: Originally a common computer virus that continued to
evolve and eventually gained sentience, and has thus become a
malignant program that is bent on consuming all of the
internet as we know it.
Hackers: Are a team of highly skilled individuals who were
brought together to defend against a world wide virus that is
on a path to destroy the cyber world.
2
Introduction
The Great Hacking Wars is a turn based competitive game in which a group of hackers are making an attempt to stop a rogue hacker
that has released an aggressive and crippling virus and is set on an unstoppable warpath to annihilate the Internet, as we know it.
Attack the virus core
The hackers number one goal should be to breach the firewall and take out the virus core, they can accomplish this by having at least
three colors in the mainframe.
Avoid the Virus
A players secondary goal should be to avoid the virus player at all costs, if the virus catches up to you you may end up losing your pawn
do to loss of combat. Players can prepare for a virus attack by having already bought cards for combat, before the virus catches them.
Game Overview
3
● 1 Game Board with Square denoted movement
spaces (22x25)
● 4 Red, blue, green, or white glass counters to
represent Hacker 1
● 4 Red, blue, green, or white glass counters to
represent Hacker 2
● 4 Red, blue, green, or white glass counters to
represent Hacker 3
● 4 Red, blue, green, or white glass counters to
represent Hacker 4
● 4 Black glass counters to represent the Virus
● 4 x D6 and 1 x D8
● Rule Book
● 16 purple paper markers
● 16 blue paper markers
Game components
● 62 cards
o 11 attack cards
o 17 defense cards
o 34 movement cards
4
Roll #(s) to buy card:
- Each card has one or more numbers that the player can possibly
roll in order to purchase the card of their choice.
Modifying Descriptions:
- The modifiers vary from card-to-card, some have more than one
effect, and being able to use them depends on how many of that
player’s pawns are in the mainframe.
Modifier types
Movement
- The card depicted to the right is a Movement Modifying
card. Movement Modifiers allow the player to either
speed themselfs up or slow down the virus.
Attack
- Attack Modifiers allow the players to enhance their
combat abilities in ways such as adding 3 to each roll.
Defense
- Defense Modifiers allow players to be prepared for virus
attacks. In ways such as, allowing a player to move
unharmed (virus can not attack) for up to four turns.
Reading The Card’s
5
Attack Cards
6
Defense cards
7
Defense cards Cont...
8
Movement cards
9
Movement cards Cont...
10
Player Tokens
Virus Pawn
Hackers Pawn(s)
11
Board Setup
- Four hacker pawns are placed on the board, one at each of the four outer corner spaces.
- Remaining pawns go in the idle pawn(s) zone correlating to their chosen color.
- Two virus pawns are placed on the board, one at each of the closest purple lane spaces near the center.
- The Memory Bank cards are shuffled and the deck is placed face down on the ‘Draw Deck’ space.
- One Memory Bank card is drawn from the Draw Deck for each of the five Memory Bank spaces and placed face-up in the empty
Memory Bank spaces. (Card One - Card Five)
Player Setup
- This game is played with 2 to 5 players.
- There are always four hackers on the board. If the hacker team is one player short, then the other players determine which
hacker team player will control the additional hacker. Two hacker players means each controls two hackers. If there is only one
hacker player, he controls all four of the hackers.
- Players start the game by first rolling 1D6 to determine the turn order. The lowest roll becomes the virus and the highest roll
goes first for the hackers. The hacker turns proceed in clockwise order around the board after that.
Turn Order
First Hacker > Second Hacker > Virus > Virus >Third Hacker > Fourth Hacker > Virus > Virus > Back to the First Hacker
Game Setup
12
Choosing Hacker or Virus/Order:
- First players must do an initial roll to determine who will be the virus, the winner is determined by which player had the lowest
roll.
- After the virus has been established the remaining players will roll dice to determine color. The highest roll will select desired
color.
- Second highest roll chooses from the three remaining colors.
- Third highest roll selects from the last two remaining colors.
- And the fourth Hacker is the last remaining color on the board.
Memory bank
- The cards are shuffled at the start of the game and placed in a single deck, face-down in the appropriate space as the ‘draw
deck’.
- A card is pulled from the draw deck and placed face-up in an empty memory bank space until all five memory bank spaces have
cards in them. The Memory Bank spaces should never be empty.
- One card should always be in each of the five card slots at all times.
- Remaining cards in the shuffled deck should stay at the top right-hand corner of the board in the draw card deck
- Upon using a card the player should place it in the bottom right-hand corner labeled discard pile
Game Setup Cont...
13
The Game Board Explained
14
Use Card
At this time the player may choose to use a card, or any number of
cards they own before they begin to roll their dice.
Roll Dice
The player then rolls their perspective dice, a D6 for the Hackers
and a D8 for the Virus, to move on to the next phase.
Buy Card
The player can choose to buy a card if the card has the same
number on the card’s description as the number they rolled mon
the dice. However, doing so will then end the player’s turn.
Movement phase
This phase allows the players to move each of their pawns around
the board.
● Players can only move one pawn per action.
● The pawn of their choice must be moved the spaces
specified by the number they have rolled.
● If player’s pawn is moved onto a space that is occupied by
the opposing faction, or adjacent to it, the Battle Phase
initiates.
Turn Sequence
● Start Phase
● Use Card (if Applicable)
● Roll dice
● Buy Card (if player chooses) or Movement Phase
● Battle phase (if applicable)
● End Turn
Start Phase
The start phase marks the beginning of each player’s turn.
This phase is mainly used by the player to scan the board
and take into account the current situation in order to help
build on their strategy.
Gameplay
15
Battle Phase
When one hacker pawn and one virus pawn have landed on the same space or on spaces directly adjacent to each other they enter into
a Battle Phase.
When the Battle Phase commences:
● Each player decides if they want to play cards from their hand (if applicable).
○ The player can decide to play zero cards or up to as many as every card in their hand.
● Next, the virus and the hacker will both roll a D6 four consecutive times, combining the rolls for one sum total.
● When all rolls are completed, card modifier effects are taken into account to adjust the roll scores.
● After all of the adjustments are accounted for, the player with the higher modified score is the winner of the Combat Phase.
○ If the virus is the winner they assimilate that hacker’s pawn for themselves; a Purple marker is placed under converted
pawn to indicate this.
○ If the hacker is the winner the virus piece is stunned for one turn, this is indicated with a Blue marker that is placed
underneath the piece. The hacker is able to roll one additional time to move the pawn again.
End Turn
Marks the end of each players turn. It is initiated by the player either moving their pawn and finishing their actions, or by the player
buying a card.
Gameplay Cont...
16
- Hackers start out moving throughout the outer lane.
- Hackers have to land on the slider with their color in order to move to the inner land.
- Hackers must be on one of the colored corner spaces in the inner lane in order to attempt to attack the virus’s mainframe
firewall.
- The virus pawns will start out on the edge of the firewall and move throughout the inner lane.
- Virus has to land on the top or bottom slider square to get out of the inner lane, but can use any color slider square to switch
back into the inner lane.
- Hacker must land on the slider square with their color to move from or to the outer and inner lanes.
- There are three numbers on each corner of the Mainframe firewall that correspond to each corner of the inner lane. A hacker
must successfully roll one of those numbers OR use an SQL Injection card to move into the Mainframe to down the Virus Core.
Win Conditions:
- VIRUS TEAM WINS IF: All of the hackers have no pawns on the board the virus wins the game.
General rules
17
Hacker Win Condition
18
- Players can hold up to 5 cards maximum.
- Each card has numbers in the top-right; these are what the player must roll in order to be able to ‘purchase’ the
card with their turn’s roll.
- In the event the draw deck is empty, the discard deck is shuffled and re-added to the draw deck space.
- A player’s current cards are laid down at their sitting place, face-up and visible to all.
- Cards to be played in a turn must be played before the roll is cast.
- Likewise, in a combat phase, a card to be used during combat must be played before the roll is cast.
- Cards that last for a full turn (such as Code Ninjas) are set aside until the full turn is played, then discarded.
- Cards that are played are removed from a player’s hand and placed into a discard deck.
Card rules
19
- Hacker players use one six-sided die [1 D6] for their actions.
- Each hacker has a single action per round UNLESS one of the hacker’s pawns entered combat with a virus pawn on her turn and
won in this case the hacker should reroll.
- A hacker’s starting place shows which color he is - this determines where additional pawns start, which spaces he can use to
change lanes.
- When a hacker rolls the dice, they can choose to buy a card with their roll (if possible) OR move a pawn.
- If a 1 or a 6 is rolled, the hacker also has the option to bring in an additional pawn as their turn’s action, up to a total of 3
times (4 pawns maximum).
- Pawns that are brought into the game in this fashion start in one of the 3 spaces in the corner that matches the hacker’s
starting color.
- Hackers do NOT enter combat when their pawn lands on another hacker’s pawn unless it has been assimilated by the virus.
- If a hacker has no in-play pawns because their pieces were assimilated, they can still roll to try and bring in another pawn
UNLESS they has already reached their 4-pawn limit.
- If a player has reached their pawn limit and has no in-play pawns under their control, they are only able to use or
purchase a card. This hacker has been locked out of the system until another hacker can free one of their pawns from
the virus’s control or they buy a card that takes the pawn back from the virus.
Hacker Rules
20
- The virus player uses one eight-sided die [1 D8] for their actions.
- The virus player will start out with two pawns and will have two actions total per turn.
- Each virus pawn will be placed on opposite sides of the outer firewall on their labeled start positions. (Purple
squares with grey circles)
- Once the virus converts hacker pawn or uses a drawn card to acquire another pawn the virus player will have that
pawn until it is defeated by a hacker or a card is used by a hacker to convert it back from the viruses control.
- If the virus is successful in beating the hacker the virus gains another pawn.
- But if the hacker wins then the virus’s pawn is stunned for one turn; this is indicated by a blue marker that is
placed underneath that virus pawn.
- The virus then has one less action next turn.
Virus Rules
21
Producer: Jonathan Montgomery
Story: Shawn Neal
Mechanics Designer: Lauren Holden,Anthony Cravatta, Jonathan Montgomery,
Shawn Neal, Brian Pisarczyk
Artist: Brian Pisarczyk, Jonathan Montgomery
Editor: Anthony Cravatta
Testing: Anthony Cravatta, Lauren Holden, Jonathan Montgomery, Shawn Neal,
Brian Pisarczyk
Credits
22

Contenu connexe

Tendances

Exposé biad game-theory
Exposé biad game-theoryExposé biad game-theory
Exposé biad game-theoryMalak Souf
 
Social Media Game Concept - Hearts ( as visible in Windows games arena)
Social Media Game Concept - Hearts ( as visible in Windows games arena)Social Media Game Concept - Hearts ( as visible in Windows games arena)
Social Media Game Concept - Hearts ( as visible in Windows games arena)Ankit Gupta
 
Game design document - BadBug Studio - Xbox Game
Game design document - BadBug Studio - Xbox GameGame design document - BadBug Studio - Xbox Game
Game design document - BadBug Studio - Xbox GameUTC Fire & Security
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network securityRahmaSallam
 
Game theory
Game theoryGame theory
Game theorygtush24
 
Game theory project
Game theory projectGame theory project
Game theory projectAagam Shah
 
Learning to Play Complex Games
Learning to Play Complex GamesLearning to Play Complex Games
Learning to Play Complex Gamesbutest
 
Artificial intelligence games
Artificial intelligence gamesArtificial intelligence games
Artificial intelligence gamesSujithmlamthadam
 
An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game TheoryPaul Trafford
 
Fault treepoker 2010-07-08_release
Fault treepoker 2010-07-08_releaseFault treepoker 2010-07-08_release
Fault treepoker 2010-07-08_releaseWilliam L. McGill
 

Tendances (20)

Battle Cards
Battle CardsBattle Cards
Battle Cards
 
GT Presentation
GT PresentationGT Presentation
GT Presentation
 
Exposé biad game-theory
Exposé biad game-theoryExposé biad game-theory
Exposé biad game-theory
 
cod
codcod
cod
 
Social Media Game Concept - Hearts ( as visible in Windows games arena)
Social Media Game Concept - Hearts ( as visible in Windows games arena)Social Media Game Concept - Hearts ( as visible in Windows games arena)
Social Media Game Concept - Hearts ( as visible in Windows games arena)
 
Proposal
ProposalProposal
Proposal
 
Adversarial search
Adversarial search Adversarial search
Adversarial search
 
Game design document - BadBug Studio - Xbox Game
Game design document - BadBug Studio - Xbox GameGame design document - BadBug Studio - Xbox Game
Game design document - BadBug Studio - Xbox Game
 
Game Theory
Game TheoryGame Theory
Game Theory
 
Game balance part 2
Game balance part 2Game balance part 2
Game balance part 2
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network security
 
Game theory
Game theoryGame theory
Game theory
 
Game theory project
Game theory projectGame theory project
Game theory project
 
Learning to Play Complex Games
Learning to Play Complex GamesLearning to Play Complex Games
Learning to Play Complex Games
 
Game theory
Game theoryGame theory
Game theory
 
Artificial intelligence games
Artificial intelligence gamesArtificial intelligence games
Artificial intelligence games
 
An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game Theory
 
Manual
ManualManual
Manual
 
Fault treepoker 2010-07-08_release
Fault treepoker 2010-07-08_releaseFault treepoker 2010-07-08_release
Fault treepoker 2010-07-08_release
 
Blackjack
BlackjackBlackjack
Blackjack
 

En vedette

Baseball Player? or Porn Star??
Baseball Player?  or Porn Star??Baseball Player?  or Porn Star??
Baseball Player? or Porn Star??jrlexjr
 
HTML Tutorial: Chapter 3
HTML Tutorial: Chapter 3HTML Tutorial: Chapter 3
HTML Tutorial: Chapter 3michaeljm007
 
Xml tutorial
Xml tutorialXml tutorial
Xml tutorialseemadav1
 
Congo: The Quiet Crisis
Congo: The Quiet CrisisCongo: The Quiet Crisis
Congo: The Quiet Crisismichaeljm007
 
HTML Tutorial: Chapters 5 & 6
HTML Tutorial: Chapters 5 & 6HTML Tutorial: Chapters 5 & 6
HTML Tutorial: Chapters 5 & 6michaeljm007
 
WaterPartners International
WaterPartners InternationalWaterPartners International
WaterPartners Internationalmichaeljm007
 
Body building supplements
Body building supplementsBody building supplements
Body building supplementsLuffy115
 
HTML Tutorial: Chapters 1 & 2
HTML Tutorial: Chapters 1 & 2HTML Tutorial: Chapters 1 & 2
HTML Tutorial: Chapters 1 & 2michaeljm007
 
Bottled Water: Bad to the Last Drop
Bottled Water: Bad to the Last DropBottled Water: Bad to the Last Drop
Bottled Water: Bad to the Last Dropmichaeljm007
 
Latest Trends in Web Technologies
Latest Trends in Web TechnologiesLatest Trends in Web Technologies
Latest Trends in Web Technologiesbryanbibat
 
How UX Design Has Changed The World
How UX Design Has Changed The WorldHow UX Design Has Changed The World
How UX Design Has Changed The WorldBuiltByHQ
 
UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!Jayan Narayanan
 
Simple Steps to UX/UI Web Design
Simple Steps to UX/UI Web DesignSimple Steps to UX/UI Web Design
Simple Steps to UX/UI Web DesignKoombea
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeEfiong Etuk
 

En vedette (20)

Baseball Player? or Porn Star??
Baseball Player?  or Porn Star??Baseball Player?  or Porn Star??
Baseball Player? or Porn Star??
 
HTML Basics
HTML BasicsHTML Basics
HTML Basics
 
HTML Tutorial: Chapter 3
HTML Tutorial: Chapter 3HTML Tutorial: Chapter 3
HTML Tutorial: Chapter 3
 
Xml tutorial
Xml tutorialXml tutorial
Xml tutorial
 
Congo: The Quiet Crisis
Congo: The Quiet CrisisCongo: The Quiet Crisis
Congo: The Quiet Crisis
 
NetTantra Web Development Brochure
NetTantra Web Development BrochureNetTantra Web Development Brochure
NetTantra Web Development Brochure
 
HTML Tutorial: Chapters 5 & 6
HTML Tutorial: Chapters 5 & 6HTML Tutorial: Chapters 5 & 6
HTML Tutorial: Chapters 5 & 6
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 
WaterPartners International
WaterPartners InternationalWaterPartners International
WaterPartners International
 
Body building supplements
Body building supplementsBody building supplements
Body building supplements
 
HTML Tutorial: Chapters 1 & 2
HTML Tutorial: Chapters 1 & 2HTML Tutorial: Chapters 1 & 2
HTML Tutorial: Chapters 1 & 2
 
DevOps kungfu
DevOps kungfu DevOps kungfu
DevOps kungfu
 
Bottled Water: Bad to the Last Drop
Bottled Water: Bad to the Last DropBottled Water: Bad to the Last Drop
Bottled Water: Bad to the Last Drop
 
Latest Trends in Web Technologies
Latest Trends in Web TechnologiesLatest Trends in Web Technologies
Latest Trends in Web Technologies
 
How UX Design Has Changed The World
How UX Design Has Changed The WorldHow UX Design Has Changed The World
How UX Design Has Changed The World
 
Html Ppt
Html PptHtml Ppt
Html Ppt
 
La fata di ferro
La fata di ferroLa fata di ferro
La fata di ferro
 
UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!
 
Simple Steps to UX/UI Web Design
Simple Steps to UX/UI Web DesignSimple Steps to UX/UI Web Design
Simple Steps to UX/UI Web Design
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your Life
 

Similaire à Rebel scrum prototype_1214

Carpe noctem prototype_0315
Carpe noctem prototype_0315Carpe noctem prototype_0315
Carpe noctem prototype_0315sithelement
 
Yu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookYu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookHaris Setiawan
 
Yu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookYu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookHaris Setiawan
 
Design Documentation
Design DocumentationDesign Documentation
Design Documentationvaiyash
 
Castleofdoom
CastleofdoomCastleofdoom
Castleofdoomkdrapala
 
Comp 220 i lab 1 two dimensional arrays lab report and source code
Comp 220 i lab 1 two dimensional arrays lab report and source codeComp 220 i lab 1 two dimensional arrays lab report and source code
Comp 220 i lab 1 two dimensional arrays lab report and source codepradesigali1
 
Erebos prototype
Erebos prototypeErebos prototype
Erebos prototypeUmbraDragon
 
53252470-SCI-DAMATH-GAME.ppt
53252470-SCI-DAMATH-GAME.ppt53252470-SCI-DAMATH-GAME.ppt
53252470-SCI-DAMATH-GAME.ppthoneybal egipto
 
How to play Rummy
How to play RummyHow to play Rummy
How to play RummyPlayRummy
 
How to Classic Indian Rummy
How to Classic Indian RummyHow to Classic Indian Rummy
How to Classic Indian RummyGauravwwww
 
Apocalypse Survival: The Card Game
Apocalypse Survival: The Card GameApocalypse Survival: The Card Game
Apocalypse Survival: The Card GameClintonHuish
 
Card game planning
Card game planningCard game planning
Card game planningJustin Young
 
CTS Boardgame LOTR Documentation
CTS Boardgame LOTR Documentation CTS Boardgame LOTR Documentation
CTS Boardgame LOTR Documentation Joshua Lee
 
BattleLore - Правила игры
BattleLore - Правила игрыBattleLore - Правила игры
BattleLore - Правила игрыAleksey Kabanov
 
Gameplay and ludologie first assignment Alexandre.B
Gameplay and ludologie first assignment Alexandre.BGameplay and ludologie first assignment Alexandre.B
Gameplay and ludologie first assignment Alexandre.BAlexandre Bouhsane
 
Almost horseshoes presentation
Almost horseshoes presentationAlmost horseshoes presentation
Almost horseshoes presentationMike Bonafede
 
Fault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_releaseFault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_releaseWilliam L. McGill
 
Deccan rummy – how to play indian rummy?
Deccan rummy – how to play indian rummy?Deccan rummy – how to play indian rummy?
Deccan rummy – how to play indian rummy?DeccanRummy
 
Instructions to Product Poker
Instructions to Product PokerInstructions to Product Poker
Instructions to Product Pokerotoubia
 

Similaire à Rebel scrum prototype_1214 (20)

Carpe noctem prototype_0315
Carpe noctem prototype_0315Carpe noctem prototype_0315
Carpe noctem prototype_0315
 
Yu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookYu-gi-oh Official Rulebook
Yu-gi-oh Official Rulebook
 
Yu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookYu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official Rulebook
 
Design Documentation
Design DocumentationDesign Documentation
Design Documentation
 
Castleofdoom
CastleofdoomCastleofdoom
Castleofdoom
 
Comp 220 i lab 1 two dimensional arrays lab report and source code
Comp 220 i lab 1 two dimensional arrays lab report and source codeComp 220 i lab 1 two dimensional arrays lab report and source code
Comp 220 i lab 1 two dimensional arrays lab report and source code
 
Yu-gi-oh GX Rulebook
Yu-gi-oh GX RulebookYu-gi-oh GX Rulebook
Yu-gi-oh GX Rulebook
 
Erebos prototype
Erebos prototypeErebos prototype
Erebos prototype
 
53252470-SCI-DAMATH-GAME.ppt
53252470-SCI-DAMATH-GAME.ppt53252470-SCI-DAMATH-GAME.ppt
53252470-SCI-DAMATH-GAME.ppt
 
How to play Rummy
How to play RummyHow to play Rummy
How to play Rummy
 
How to Classic Indian Rummy
How to Classic Indian RummyHow to Classic Indian Rummy
How to Classic Indian Rummy
 
Apocalypse Survival: The Card Game
Apocalypse Survival: The Card GameApocalypse Survival: The Card Game
Apocalypse Survival: The Card Game
 
Card game planning
Card game planningCard game planning
Card game planning
 
CTS Boardgame LOTR Documentation
CTS Boardgame LOTR Documentation CTS Boardgame LOTR Documentation
CTS Boardgame LOTR Documentation
 
BattleLore - Правила игры
BattleLore - Правила игрыBattleLore - Правила игры
BattleLore - Правила игры
 
Gameplay and ludologie first assignment Alexandre.B
Gameplay and ludologie first assignment Alexandre.BGameplay and ludologie first assignment Alexandre.B
Gameplay and ludologie first assignment Alexandre.B
 
Almost horseshoes presentation
Almost horseshoes presentationAlmost horseshoes presentation
Almost horseshoes presentation
 
Fault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_releaseFault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_release
 
Deccan rummy – how to play indian rummy?
Deccan rummy – how to play indian rummy?Deccan rummy – how to play indian rummy?
Deccan rummy – how to play indian rummy?
 
Instructions to Product Poker
Instructions to Product PokerInstructions to Product Poker
Instructions to Product Poker
 

Dernier

Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
Peaches App development presentation deck
Peaches App development presentation deckPeaches App development presentation deck
Peaches App development presentation decktbatkhuu1
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...kumaririma588
 
2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptx2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptxsuhanimunjal27
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja Nehwal
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdftbatkhuu1
 
Pastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. XxxPastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. XxxSegundoManuelFaichin1
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...Delhi Call girls
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...sonalitrivedi431
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funneljen_giacalone
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxjeswinjees
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
 

Dernier (20)

Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
Peaches App development presentation deck
Peaches App development presentation deckPeaches App development presentation deck
Peaches App development presentation deck
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
 
2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptx2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptx
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdf
 
Pastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. XxxPastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. Xxx
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funnel
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptx
 
B. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdfB. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdf
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
 

Rebel scrum prototype_1214

  • 2. Table of Contents Cover…………………………………………………………………………..Pg. 1 Story………………………………………………………………………...…Pg. 2 Game Overview………………………………..…………………...…….Pg. 3 Game Components……………………………....………….……….….Pg. 4 Reading the Cards………………………………....………………….....Pg. 5 Attack Cards……………………………………….…………………..…...Pg. 6 Defense Cards…………………………………….……………………..…Pg. 7 Movement Cards…………………………………..……………...……....Pg. 8 Player Tokens…………………………………………………….….….….Pg. 9 Game Setup………………………………………………………..….…..…Pg. 11 Player Setup……………………………….………..….……......Pg. 12 Turn Order………………………………………………......……Pg. 13 Board Setup……………………………….…………….......…..Pg. 14 Game Play………………………………………………………………….....Pg. 15 Turn Sequence……….……………………………….....………Pg. 15 Start Phase………………………………………………….....…Pg. 15 Use Card…………………………………………………....….….Pg. 15 Roll Dice…………………………………………………...……...Pg. 15 Buy Card……………………………………………….…...….….Pg. 15 Movement Phase……….……………………………....……...Pg. 15 Battle Phase…………….…………………………….…...……..Pg. 16 End Turn………………………………………………..…....…....Pg.16 General Rules……………………………………………………..…..…….Pg.17 Hacker Win Condition………………………………………………….Pg.18 Card Rules……………………………………………………….………..….Pg.19 Hacker Rules……………………………………………………………..…Pg.20 Virus Rules…………….…………………………………….…….…...……Pg.21 Credits…………………………..………………………….…………....……Pg.22 Story: In today’s world, cyber security has gotten extremely weak and has became vulnerable to attack. Hackers everywhere are taking advantage of this and they need to be stopped. Hackers on both sides of the moral coin are fighting for control of the expansive virtual space that links nations. As a result of this countries have built teams of extremely talented hackers to defend and keep order in our virtual world. Hackers will take take their place in the Great Hacking Wars inside the Omni- present World Wide Web. The battle started with a hacker that went rogue and released an aggressive and crippling virus that is set on an unstoppable warpath to annihilate the internet as we know it. A group of hackers will have to band together, use their skills, and break some rules in order to save the cyber world from destruction. Virus: Originally a common computer virus that continued to evolve and eventually gained sentience, and has thus become a malignant program that is bent on consuming all of the internet as we know it. Hackers: Are a team of highly skilled individuals who were brought together to defend against a world wide virus that is on a path to destroy the cyber world. 2
  • 3. Introduction The Great Hacking Wars is a turn based competitive game in which a group of hackers are making an attempt to stop a rogue hacker that has released an aggressive and crippling virus and is set on an unstoppable warpath to annihilate the Internet, as we know it. Attack the virus core The hackers number one goal should be to breach the firewall and take out the virus core, they can accomplish this by having at least three colors in the mainframe. Avoid the Virus A players secondary goal should be to avoid the virus player at all costs, if the virus catches up to you you may end up losing your pawn do to loss of combat. Players can prepare for a virus attack by having already bought cards for combat, before the virus catches them. Game Overview 3
  • 4. ● 1 Game Board with Square denoted movement spaces (22x25) ● 4 Red, blue, green, or white glass counters to represent Hacker 1 ● 4 Red, blue, green, or white glass counters to represent Hacker 2 ● 4 Red, blue, green, or white glass counters to represent Hacker 3 ● 4 Red, blue, green, or white glass counters to represent Hacker 4 ● 4 Black glass counters to represent the Virus ● 4 x D6 and 1 x D8 ● Rule Book ● 16 purple paper markers ● 16 blue paper markers Game components ● 62 cards o 11 attack cards o 17 defense cards o 34 movement cards 4
  • 5. Roll #(s) to buy card: - Each card has one or more numbers that the player can possibly roll in order to purchase the card of their choice. Modifying Descriptions: - The modifiers vary from card-to-card, some have more than one effect, and being able to use them depends on how many of that player’s pawns are in the mainframe. Modifier types Movement - The card depicted to the right is a Movement Modifying card. Movement Modifiers allow the player to either speed themselfs up or slow down the virus. Attack - Attack Modifiers allow the players to enhance their combat abilities in ways such as adding 3 to each roll. Defense - Defense Modifiers allow players to be prepared for virus attacks. In ways such as, allowing a player to move unharmed (virus can not attack) for up to four turns. Reading The Card’s 5
  • 12. Board Setup - Four hacker pawns are placed on the board, one at each of the four outer corner spaces. - Remaining pawns go in the idle pawn(s) zone correlating to their chosen color. - Two virus pawns are placed on the board, one at each of the closest purple lane spaces near the center. - The Memory Bank cards are shuffled and the deck is placed face down on the ‘Draw Deck’ space. - One Memory Bank card is drawn from the Draw Deck for each of the five Memory Bank spaces and placed face-up in the empty Memory Bank spaces. (Card One - Card Five) Player Setup - This game is played with 2 to 5 players. - There are always four hackers on the board. If the hacker team is one player short, then the other players determine which hacker team player will control the additional hacker. Two hacker players means each controls two hackers. If there is only one hacker player, he controls all four of the hackers. - Players start the game by first rolling 1D6 to determine the turn order. The lowest roll becomes the virus and the highest roll goes first for the hackers. The hacker turns proceed in clockwise order around the board after that. Turn Order First Hacker > Second Hacker > Virus > Virus >Third Hacker > Fourth Hacker > Virus > Virus > Back to the First Hacker Game Setup 12
  • 13. Choosing Hacker or Virus/Order: - First players must do an initial roll to determine who will be the virus, the winner is determined by which player had the lowest roll. - After the virus has been established the remaining players will roll dice to determine color. The highest roll will select desired color. - Second highest roll chooses from the three remaining colors. - Third highest roll selects from the last two remaining colors. - And the fourth Hacker is the last remaining color on the board. Memory bank - The cards are shuffled at the start of the game and placed in a single deck, face-down in the appropriate space as the ‘draw deck’. - A card is pulled from the draw deck and placed face-up in an empty memory bank space until all five memory bank spaces have cards in them. The Memory Bank spaces should never be empty. - One card should always be in each of the five card slots at all times. - Remaining cards in the shuffled deck should stay at the top right-hand corner of the board in the draw card deck - Upon using a card the player should place it in the bottom right-hand corner labeled discard pile Game Setup Cont... 13
  • 14. The Game Board Explained 14
  • 15. Use Card At this time the player may choose to use a card, or any number of cards they own before they begin to roll their dice. Roll Dice The player then rolls their perspective dice, a D6 for the Hackers and a D8 for the Virus, to move on to the next phase. Buy Card The player can choose to buy a card if the card has the same number on the card’s description as the number they rolled mon the dice. However, doing so will then end the player’s turn. Movement phase This phase allows the players to move each of their pawns around the board. ● Players can only move one pawn per action. ● The pawn of their choice must be moved the spaces specified by the number they have rolled. ● If player’s pawn is moved onto a space that is occupied by the opposing faction, or adjacent to it, the Battle Phase initiates. Turn Sequence ● Start Phase ● Use Card (if Applicable) ● Roll dice ● Buy Card (if player chooses) or Movement Phase ● Battle phase (if applicable) ● End Turn Start Phase The start phase marks the beginning of each player’s turn. This phase is mainly used by the player to scan the board and take into account the current situation in order to help build on their strategy. Gameplay 15
  • 16. Battle Phase When one hacker pawn and one virus pawn have landed on the same space or on spaces directly adjacent to each other they enter into a Battle Phase. When the Battle Phase commences: ● Each player decides if they want to play cards from their hand (if applicable). ○ The player can decide to play zero cards or up to as many as every card in their hand. ● Next, the virus and the hacker will both roll a D6 four consecutive times, combining the rolls for one sum total. ● When all rolls are completed, card modifier effects are taken into account to adjust the roll scores. ● After all of the adjustments are accounted for, the player with the higher modified score is the winner of the Combat Phase. ○ If the virus is the winner they assimilate that hacker’s pawn for themselves; a Purple marker is placed under converted pawn to indicate this. ○ If the hacker is the winner the virus piece is stunned for one turn, this is indicated with a Blue marker that is placed underneath the piece. The hacker is able to roll one additional time to move the pawn again. End Turn Marks the end of each players turn. It is initiated by the player either moving their pawn and finishing their actions, or by the player buying a card. Gameplay Cont... 16
  • 17. - Hackers start out moving throughout the outer lane. - Hackers have to land on the slider with their color in order to move to the inner land. - Hackers must be on one of the colored corner spaces in the inner lane in order to attempt to attack the virus’s mainframe firewall. - The virus pawns will start out on the edge of the firewall and move throughout the inner lane. - Virus has to land on the top or bottom slider square to get out of the inner lane, but can use any color slider square to switch back into the inner lane. - Hacker must land on the slider square with their color to move from or to the outer and inner lanes. - There are three numbers on each corner of the Mainframe firewall that correspond to each corner of the inner lane. A hacker must successfully roll one of those numbers OR use an SQL Injection card to move into the Mainframe to down the Virus Core. Win Conditions: - VIRUS TEAM WINS IF: All of the hackers have no pawns on the board the virus wins the game. General rules 17
  • 19. - Players can hold up to 5 cards maximum. - Each card has numbers in the top-right; these are what the player must roll in order to be able to ‘purchase’ the card with their turn’s roll. - In the event the draw deck is empty, the discard deck is shuffled and re-added to the draw deck space. - A player’s current cards are laid down at their sitting place, face-up and visible to all. - Cards to be played in a turn must be played before the roll is cast. - Likewise, in a combat phase, a card to be used during combat must be played before the roll is cast. - Cards that last for a full turn (such as Code Ninjas) are set aside until the full turn is played, then discarded. - Cards that are played are removed from a player’s hand and placed into a discard deck. Card rules 19
  • 20. - Hacker players use one six-sided die [1 D6] for their actions. - Each hacker has a single action per round UNLESS one of the hacker’s pawns entered combat with a virus pawn on her turn and won in this case the hacker should reroll. - A hacker’s starting place shows which color he is - this determines where additional pawns start, which spaces he can use to change lanes. - When a hacker rolls the dice, they can choose to buy a card with their roll (if possible) OR move a pawn. - If a 1 or a 6 is rolled, the hacker also has the option to bring in an additional pawn as their turn’s action, up to a total of 3 times (4 pawns maximum). - Pawns that are brought into the game in this fashion start in one of the 3 spaces in the corner that matches the hacker’s starting color. - Hackers do NOT enter combat when their pawn lands on another hacker’s pawn unless it has been assimilated by the virus. - If a hacker has no in-play pawns because their pieces were assimilated, they can still roll to try and bring in another pawn UNLESS they has already reached their 4-pawn limit. - If a player has reached their pawn limit and has no in-play pawns under their control, they are only able to use or purchase a card. This hacker has been locked out of the system until another hacker can free one of their pawns from the virus’s control or they buy a card that takes the pawn back from the virus. Hacker Rules 20
  • 21. - The virus player uses one eight-sided die [1 D8] for their actions. - The virus player will start out with two pawns and will have two actions total per turn. - Each virus pawn will be placed on opposite sides of the outer firewall on their labeled start positions. (Purple squares with grey circles) - Once the virus converts hacker pawn or uses a drawn card to acquire another pawn the virus player will have that pawn until it is defeated by a hacker or a card is used by a hacker to convert it back from the viruses control. - If the virus is successful in beating the hacker the virus gains another pawn. - But if the hacker wins then the virus’s pawn is stunned for one turn; this is indicated by a blue marker that is placed underneath that virus pawn. - The virus then has one less action next turn. Virus Rules 21
  • 22. Producer: Jonathan Montgomery Story: Shawn Neal Mechanics Designer: Lauren Holden,Anthony Cravatta, Jonathan Montgomery, Shawn Neal, Brian Pisarczyk Artist: Brian Pisarczyk, Jonathan Montgomery Editor: Anthony Cravatta Testing: Anthony Cravatta, Lauren Holden, Jonathan Montgomery, Shawn Neal, Brian Pisarczyk Credits 22