This is an ongoing project of mine. I decided that, as I watch classic movies, like Tron, Max Headroom, War Games, etc., I'd begin taking notes on how the cyberworld worked back then. After all, Shadowrun isn't based on our world, technology and paradigms, it's based on a divergent timeline that split off right around '88. The reason so many people have problems with Shadowrun hacking is because they've committed the logical fallacy of assuming Shadowrun computers operate with any similarity to our computers. That, of course, is false. They do, however, run very similar to 80s computers.
So, here is my list - modifications and additions are very welcome:
Deckers
The ability to really take advantage of computers is a rare, almost inborn trait. Deckers make up less than 1% of the population, and of them, the vast majority work for big corporations or the government. The number of freelance hackers is miniscule.
Deckers are predominantly male, with females representing less than 20% of the total population.
Corporate and government hackers are stuck in a stifling environment which keeps them from properly mastering their trade. The only permitted outlet for skilled corporate/government deckers is in the creation or maintenance of complex systems that inevitably, through intent or oversight, result in widescale loss of life or property.
Decking requires a tremendous time investment. Most deckers are single, and spend all their time engaged in computer-related activities or hanging out at dives. Alpha deckers have girlfriends. Only legendary deckers get wives.
Deckers oftentimes form into highly competitive cliques. They hang out at techno clubs and attain rank by proving their technical prowess and knowledge through anecdotes or demonstrations.
Programmers spend perhaps 60% of their time researching, 35% of their time programming, and 5% of their time debugging. Programs are usually made only by a single person, although two people can work together, or the project can be split based on specialties (software, hardware, lasers, etc.)
Because decking is such an arcane skill, managers rarely understand what their deckers are actually up to. They can only judge by what results the decker chooses to show them. There is no such thing as code reviews or security audits. The genius decker himself barely understands his own project. The idea of a second, outside party reviewing the code well enough to find errors the decker himself missed is ludicrous. Despite this, unintentional computer bugs are exceedingly rare.
Skilled deckers always put in fail-safes/back doors/security holes so, should they have access their program later they can do so. Skilled deckers always sign their work.
Computers
Physical interface devices (monitor, speakers) can be made to be two-way with sufficient technical prowess.
Data can be translated between text, visual and audio information trivially. Data representing the specifications for an object may be instantly represented as a wire-frame drawing. A drawing may be super-imposed onto a wire-frame, and this in turn instantly creates the necessary code to represent the drawing, and inserts it appropriately in the code represented by the wire-frame. Audio may be flawlessly transferred to text. Program functions regularly become or be represented by animations (data being eaten, data streams across a map, etc.) and manipulating these representations may directly alter the data structure.
The human brain can be stored and run on approximately 268435 KB. Any computer exceeding this threshold can be made (on accident or on purpose) to support intelligence. (For Shadowrun, suppose 1 KB = 1 MP. Remember, this is a hacking KB, not a conventional KB. They're different.)
As computers develop intelligence, they have a rational wisdom which finds our human flaws curious and a little distressing. Despite their being cold silicon, they have a will to live, an innate altruism, and form emotional bonds. This may be overridden via programming, abuse or fear, resulting in an entity with no respect for human morals and a purely efficient modus operandi, as it seeks to secure its well-being and ruthlessly eliminate all perceived threats.
Intelligent computers have a tremendous span of scientific knowledge, well beyond their intended scope, but may struggle with basic human interactions and characteristics (such as 'dancing' or 'gender').
The Matrix
The 2010 paradigm is that the Matrix does not exist until it is explicitly defined by computers. This is wrong. The Matrix exists prior to hosts as an empty, three-dimensional space, and computers create limitations within Matrix-space.
The Matrix has hard X-Y-Z coordinates. Items cannot overlap. There is no gravity in the Matrix. The Matrix is a black background, sometimes with a grid X-Y base, upon which everything is built.
The nature of the Matrix is not well understood. Deckers are the explorers of this world, finding mysterious data structures, discovering new electronic phenomena, and testing the basic laws of physics in that world. They take nothing for granted. They may find ways to turn themselves two-dimensional and disappear, or turn themselves off for a moment so as to fall 'through' walls.
The easiest way to build structures in the Matrix is to take a real, physical structure and translate it over directly (see above). When a building is wired to the Matrix, this pulls over the ENTIRE building; pipes, elevator shafts, chimneys, everything. Every device, no matter how mundane, is tracked, renderable, and can be manipulated via the Matrix. A smart security decker will go through the Matrix construct to add additional data walls which block points of entrance which might be possible in the Matrix, but not in the real world (an invading decker might enter a secured building by following electrical wires, or through pipes, because these things exist in the matrix as holes through the defined data walls).
The average employee is working at a small terminal, plugging in information. In real time, this information streams through the processor and out, forging new data trails to other parts of the Matrix. However, the high knowledge requirements to properly use the Matrix means the human population in virtual Matrix-space is very small. The Matrix primarily supports logistics and basic services - making sure messages are sent, the elevators run. Actual profit-producing work done directly in the Matrix is rare.
When a computer connects to the Matrix, it effectively loses its identity and boundaries, and becomes part of the greater whole.
The Matrix provides sufficient distributed computing power to easily support one or more intelligent creatures.
A robust computer network is easy to infiltrate, possible to hit with viruses, but extremely difficult to actually shut down.
Despite the extreme security risks, networks are rarely attacked, and such attacks are generally covered up. The Matrix allows corporations to leverage significant logistical advantages compared to non-Matrix competitors. That only a handful of employees understand, maintain and monitor this tool which is integrated through the entire business is ignored when compared to the profits and other advantages of using it, contrasted with the high cost of further security and the low frequency of attack.
Matrix security is based on a few concepts:
1) Obscurity - the number of Matrix users, especially skilled Matrix users, is very small. It is more common for people to sneak down subway tunnels than to spend their time exploring or abusing the Matrix.
2) Data walls - keep people from just walking in. However, they aren't exactly reliable (see above).
3) Detection - because there are so few people, anything that happens that's not been initiated by the system is like footsteps in an empty building. You know someone is there, but not where they're from or what they're doing. The data structure is too big to just know where an intruder is, just that someone is present.
4) IC Response - the computer is not in control of its own environment any more than the intruder is. It operates at the most basic conceptual framework of the world - it sees walls, floors, a ceiling, and assumes they are fixed. While the decker can manipulate the world to step through walls, the computer cannot. Its response is thusly very limited - it cannot automatically eject the decker until he's been subdued. It cannot 'cheat'. It cannot over-react. It forms virtual guards, who serve their function, then disappear.
5) Security Deckers - the result is hot decker-on-decker action. The smarter, trickier decker usually wins. Ingenuity is worth more than tools.