EccentricFantasy
The mind is a fearsome thing, don't tread on it.
I do not care what you use. I do not care if you use codes and I do not care if you use Layouts. Just follow the rules and have all this inside it:
Virus: The ability to hack into and corrupt other programs. This is the mercenary of the group. Able to break down fire walls, inject malware and even use other programs as puppets. The downfall is antiviruses and malware protection programs will constantly be chasing this one. Also, this program has a defect. This program has a tendency to corrupt the user. If inside the program for too long, the user will be slowly converted into the Virus. So this Program should only be used if fully necessary. This program is the lowest ranking member -Taken by EccentricFantasy
Programmer: This is the defensive and trapper of the group. They can create firewalls to trap, block and they can find weaknesses in code. The draw backs to this Program is the low combat capability. This program is meant mainly for support, defense and strategy. This program is installed with a wide area map feature and is the best support to have. This program is the tactician.
Antivirus: This is the assassin of the group. This person is able to delete, erase and slice through code, programs and viruses. The downfall of this program is a low dexterity. This program cannot take too many hits. However, this is one of the fastest of all the programs and has the best agility. This program is the second in command.
Surfer: This is a program that is the run gunner of the group. This is the fastest character of the programs. This is because they can summon vehicles to travel down streams within the internet and grid. There is only two vehicles that can be summoned. One for sky and one for ground. The problem with this program is that they are virtually useless without their vehicles. Inside the vehicles hold their speed, defense, attack and maneuverability capability. This means outside of a vehicle, there is no chance of them accomplishing anything. This program is the scout.
Protocol: This is the heavy hitter of the programs. This one has the highest dexterity of any of the programs. It also has the highest attack power of any of the programs. This program is mainly used to tank. It is capable of breaking down firewalls and most coding walls. The downfall here is the low endurance and the lack of speed. This program is the leader.
Name:
Age:
Birthday:
Blood Type:
Online Persona: (How they act on the internet)
Personality:
Background:
Program Name:
Program Type: (Check the list. Reserve one you like)
Program Abilities: (Something that comes from the internet. Like firewalls, programing, etc.)
Program Weapon: (Must fit the program type. If it does not fit, do not ask for it. This is optional)
Vehicles: (Only for Surfer)
Position: (Check the list)
This is the list of Program types:Age:
Birthday:
Blood Type:
Online Persona: (How they act on the internet)
Personality:
Background:
Program Name:
Program Type: (Check the list. Reserve one you like)
Program Abilities: (Something that comes from the internet. Like firewalls, programing, etc.)
Program Weapon: (Must fit the program type. If it does not fit, do not ask for it. This is optional)
Vehicles: (Only for Surfer)
Position: (Check the list)
Virus: The ability to hack into and corrupt other programs. This is the mercenary of the group. Able to break down fire walls, inject malware and even use other programs as puppets. The downfall is antiviruses and malware protection programs will constantly be chasing this one. Also, this program has a defect. This program has a tendency to corrupt the user. If inside the program for too long, the user will be slowly converted into the Virus. So this Program should only be used if fully necessary. This program is the lowest ranking member -Taken by EccentricFantasy
Programmer: This is the defensive and trapper of the group. They can create firewalls to trap, block and they can find weaknesses in code. The draw backs to this Program is the low combat capability. This program is meant mainly for support, defense and strategy. This program is installed with a wide area map feature and is the best support to have. This program is the tactician.
Antivirus: This is the assassin of the group. This person is able to delete, erase and slice through code, programs and viruses. The downfall of this program is a low dexterity. This program cannot take too many hits. However, this is one of the fastest of all the programs and has the best agility. This program is the second in command.
Surfer: This is a program that is the run gunner of the group. This is the fastest character of the programs. This is because they can summon vehicles to travel down streams within the internet and grid. There is only two vehicles that can be summoned. One for sky and one for ground. The problem with this program is that they are virtually useless without their vehicles. Inside the vehicles hold their speed, defense, attack and maneuverability capability. This means outside of a vehicle, there is no chance of them accomplishing anything. This program is the scout.
Protocol: This is the heavy hitter of the programs. This one has the highest dexterity of any of the programs. It also has the highest attack power of any of the programs. This program is mainly used to tank. It is capable of breaking down firewalls and most coding walls. The downfall here is the low endurance and the lack of speed. This program is the leader.