Shadowrun (2007 Video Game)
   HOME
*



picture info

Shadowrun (2007 Video Game)
''Shadowrun'' is a science fantasy tabletop role-playing game set in an alternate future in which cybernetics, magic and fantasy creatures co-exist. It combines genres of cyberpunk, urban fantasy and crime, with occasional elements of conspiracy, horror and detective fiction. From its inception in 1989, ''Shadowrun'' has remained among the most popular role-playing games. It has spawned a vast franchise that includes a series of novels, a collectible card game, two miniature-based tabletop wargames, and multiple video games. The title is taken from the game's main premise – a near-future world damaged by a massive magical event, where industrial espionage and corporate warfare runs rampant. A ''shadowrun'' – a successful data theft or physical break-in at a rival corporation or organization – is one of the main tools employed by both corporate rivals and underworld figures. Deckers (futuristic hackers) who can tap into an immersive, three-dimensional cyberspace are ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Urban Fantasy
Urban fantasy is a subgenre of fantasy which places imaginary and unreal elements in an approximation of a contemporary urban setting. The combination provides the writer with quixotic plot-drivers, unusual character traits, and a platform for classic fantasy tropes, without demanding the creation of an entirely-imagined world. Although precursors of urban fantasy date back to the 19th century, the term dates back to the 1970s. The current popularity began in the 1980s, with writers encouraged by the success of Stephen King and Anne Rice. Characteristics Urban fantasy combines selected imaginary/unrealistic elements of plot, character, theme, or setting with a largely-familiar world—combining the familiar and the strange. Such elements may exist secretly in the world or may occur openly. Fantastic components may be magic, paranormal beings, recognizable mythic or folk-tale plots, or thematic tropes (a quest, battle of good/evil, &c.). Authors may use current ''urban myths'', ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Magic (paranormal)
Magic, sometimes spelled magick, is an ancient praxis rooted in sacred rituals, spiritual divinations, and/or cultural lineage—with an intention to invoke, manipulate, or otherwise manifest supernatural forces, beings, or entities in the natural, incarnate world. It is a categorical yet often ambiguous term which has been used to refer to a wide variety of beliefs and practices, frequently considered separate from both religion and science. Although connotations have varied from positive to negative at times throughout history, magic continues to have an important religious and medicinal role in many cultures today. Within Western culture, magic has been linked to ideas of the Other, foreignness, and primitivism; indicating that it is "a powerful marker of cultural difference" and likewise, a non-modern phenomenon. During the late nineteenth and early twentieth century, Western intellectuals perceived the practice of magic to be a sign of a primitive mentality and also commo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Magician (paranormal)
Magic, sometimes spelled magick, is an ancient praxis rooted in sacred rituals, spiritual divinations, and/or cultural lineage—with an intention to invoke, manipulate, or otherwise manifest supernatural forces, beings, or entities in the natural, incarnate world. It is a categorical yet often ambiguous term which has been used to refer to a wide variety of beliefs and practices, frequently considered separate from both religion and science. Although connotations have varied from positive to negative at times throughout history, magic continues to have an important religious and medicinal role in many cultures today. Within Western culture, magic has been linked to ideas of the Other, foreignness, and primitivism; indicating that it is "a powerful marker of cultural difference" and likewise, a non-modern phenomenon. During the late nineteenth and early twentieth century, Western intellectuals perceived the practice of magic to be a sign of a primitive mentality and also commo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyborg
A cyborg ()—a portmanteau of ''cybernetic'' and ''organism''—is a being with both organic and biomechatronic body parts. The term was coined in 1960 by Manfred Clynes and Nathan S. Kline.Cyborgs and Space
in ''Astronautics'' (September 1960), by Manfred E. Clynes and American scientist and researcher Nathan S. Kline.


Description and definition

"Cyborg" is not the same thing as bionics, , or ; it applies to an organism that has restored function ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Intrusion Countermeasures Electronics
Intrusion Countermeasures Electronics (ICE) is a term used in cyberpunk literature to refer to security programs which protect computerized data from being accessed by hackers. Origin of term The term was popularized by William Gibson in his short story "Burning Chrome", which also introduced the term '' cyberspace'', and in his subsequent novel ''Neuromancer''. According to the Jargon File, as well as Gibson's own acknowledgements, the term ICE was originally coined by Tom Maddox. Description of ICE When viewed in a cyberspace virtual reality environment, these constructs are often represented by actual walls of ice, stone, or metal. Black ICE refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be artificially intelligent. Real-world usage Though real-life firewalls, anti-virus software and similar programs fall under this classification, the term has little real world significance and remains primarily a s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Artificial Intelligence
Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech recognition, computer vision, translation between (natural) languages, as well as other mappings of inputs. The ''Oxford English Dictionary'' of Oxford University Press defines artificial intelligence as: the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages. AI applications include advanced web search engines (e.g., Google), recommendation systems (used by YouTube, Amazon and Netflix), understanding human speech (such as Siri and Alexa), self-driving cars (e.g., Tesla), automated decision-making and competing at the highest level in strategic game systems (such as chess and Go). ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subcult ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Theft
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, such as USB flash drives, iPods and even digital cameras. Since employees often spend a considerable amount of time developing contacts, confidential, and copyrighted information for the company they work for, they may feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company, or misuse it while they are still in employment. Information can be sold and bought and then used by criminals and criminal organizations. Alternatively, an employee may choose to deliberately abuse trusted access to information for the purpose of exposing misconduct by the employer. From the perspective of the society, such an act of whistleblowing can be seen as positive and is protected by law in certa ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Corporate Warfare
Corporate warfare is a form of information warfare in which attacks on companies by other companies take place. Such warfare may be part of economic warfare and cyberwarfare; but can involve espionage, 'dirty' PR tactics, or physical theft. The intention is largely to destabilise or sink the value of the opposing company for financial gain, or to steal trade secrets from them. In fiction In the science fiction genre of cyberpunk corporations guard their data and hire individuals to break into computer systems of their competitors. In the genre pioneered by William Gibson, power is largely in the hands of megacorporations which often maintain their own private armies and security forces and wage corporate warfare against each other. Cyber According to Schwartau, companies are typically targeted by their competitors. Such warfare may include methods of industrial espionage, spreading disinformation, leaking confidential information and damaging a company's information systems. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Industrial Espionage
Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrated by governments and is international in scope, industrial or corporate espionage is more often national and occurs between companies or corporations. Forms of economic and industrial espionage Economic or industrial espionage takes place in two main forms. In short, the purpose of espionage is to gather knowledge about one or more organizations. It may include the acquisition of intellectual property, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. Or it could include sequestration of proprietary or operational information, such as that on customer datasets, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Detective Fiction
Detective fiction is a subgenre of crime fiction and mystery fiction in which an investigator or a detective—whether professional, amateur or retired—investigates a crime, often murder. The detective genre began around the same time as speculative fiction and other genre fiction in the mid-nineteenth century and has remained extremely popular, particularly in novels. Some of the most famous heroes of detective fiction include C. Auguste Dupin, Sherlock Holmes, and Hercule Poirot. Juvenile stories featuring The Hardy Boys, Nancy Drew, and The Boxcar Children have also remained in print for several decades. History Ancient Some scholars, such as R. H. Pfeiffer, have suggested that certain ancient and religious texts bear similarities to what would later be called detective fiction. In the Old Testament story of Susanna and the Elders (the Protestant Bible locates this story within the apocrypha), the account told by two witnesses broke down when Daniel cross-examines th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]