

Touching one copies the code into the interface.


Security ID Module It contains electronic access codes that open doors in the physical world, being equivalent to a specific access card. Integrity Restorative A program that refreshes a user’s Net link integrity by filtering out noise and corrupt code thus restoring his Cyberspace health. Passing through an Information Node will scan it and provide data pertaining to the specific function of a related Switching Node. Infonode A buoy-like marker that imparts various pieces of information and sometimes explains the function of another nearby object, such as a toggle. Data Object Touching one, it copies itself into the user's personal data storage device (such as a Multimedia Data Reader) and may be read later. Appears as a large yellow square surrounded by four small orange diamonds. Touching one, it transmits a brief message that is not stored. Objects Data Fragment A scrap of information that can be read anytime. Hallways between rooms represent rivers of data between nodes, which drag the user along in digital currents. Corporations have their own guarded logo-like icons within which their data is stored.

A neural interface can translate this world of 1's and 0's into an immersive hallucination where important programs manifest as floating geometric shapes in immense rooms of glowing wireframe. The Net of the Citadel Station is divided into three primary realms - Research, Military, and the Security platform that houses SHODAN.Ĭyberspace represents the aggregate of all computer network traffic, which cannot ordinarily be seen. If a user's software integrity (Cyberspace health) runs out as a result of these attacks, his Net link is broken and he is ejected from Cyberspace, fatigued and injured from the shock. Watchdog security programs prowl Cyberspace for any foreign presence, attacking it. Time is of the essence for unauthorized users as hunter-killer routines are tracing for their location, disconnecting them from the Net after a few minutes. Hackers infiltrate specific areas in Cyberspace owned by companies, governments, or individuals with intent to steal or alter information. The user's neurosensors translate the data structures of a computer network into a surreal visual simulation, which the user can navigate to access data, open electronic locks, and otherwise manipulate the system. Special electrodes grafted into a Neural Interface let users "jack" into a Cyberspace Terminal of a computer network. ~ Spectre, Citadel Cyberspace Technician VIIĬyberspace (also known as C-Space, the Net or the Web) is a digital realm where all computers communicate and store data.
