System Shock Wiki
Advertisement
System Shock Wiki
SHODAN 1 "If you desired, you could improve this page... transform it..."
This article is a stub. You can help SHODANPEDIA, The System Shock Wiki
by expanding the page and adding more information to it.

For the levels in the Original Game, see Cyberspace.
For the levels in System Shock 2, see Cyberspace (System Shock 2).


Cyberspace (also known as C-Space, the Net or the Web) is a digital realm where all computers communicate and store data.

Overview[]

Special electrodes grafted into a Neural Interface let users "jack" into a Cyberspace Terminal of a computer network. The user's neurosensors translate the data structures of a computer network into a surreal visual simulation, which the user can navigate to access data, open electronic locks, and otherwise manipulate the system.

Hackers infiltrate specific areas in Cyberspace owned by companies, governments, or individuals with intent to steal or alter information. Time is of the essence for unauthorized users as hunter-killer routines are tracing for their location, disconnecting them from the Net after a few minutes. Watchdog security programs prowl Cyberspace for any foreign presence, attacking it. If a user's software integrity (Cyberspace health) runs out as a result of these attacks, their Net link is broken and they are ejected from Cyberspace, fatigued and injured from the shock.

Appearance[]

Cyberspace represents the aggregate of all computer network traffic, which cannot ordinarily be seen. A neural interface can translate this world of 1's and 0's into an immersive hallucination where important programs manifest as floating geometric shapes in immense rooms of glowing wireframe. Hallways between rooms represent rivers of data between nodes, which drag the user along in digital currents. Corporations have their own guarded logo-like icons within which their data is stored.

Levels[]

Objects[]

Integrity Restorative
A program that refreshes a user’s Net link integrity by filtering out noise and corrupt code thus restoring his Cyberspace health. Appears as a red cross.
Cyberspace Barricade
These barriers block certain areas of Cyberspace and are usually "unlocked" by killing all of the enemies in the area or by hitting a switch.
I.C.E. Barrier
Intrusion Countermeasures Electronics serve as an electronic barrier to intruders trying to scam restricted data such as information or software. They appear as geometric growths around a Cyberspace object and can be eliminated by a Drill software. The I.C.E. protocol was adopted by the Corporate Computer Protection Conference and for years was considered impregnable by hackers, until the computer piracy gang RazorFinger developed the Drill program. Some I.C.E. walls are better than others. Older I.C.E. utilities can sometimes be bypassed by various forms of the Fake ID infiltration program. More recent ones can actually counter-attack the user.
Cyberspace Switch
A switch that when hit disables barriers and allows passage to other areas of Cyberspace. Displays as green when on and red when off.
Cyberspace Core
Spinning whirlpools of data between two pillars. When destroyed they grant access to areas within Realspace.
Exit Portal
Touching it returns sensory input to normal after a few seconds of disorientation. This is commonly followed by disappointment to some users. Most Cyberspace areas have two exits.

Security Constructs[]

Cyberdog
A common but less powerful Cyberspace defenders, in the form of blue pit bull faces.
Cyberguard
Autonomous security programs in general, that protect sensitive data storage areas. They are represented by pink headlike beings.
Cyber Reaver
These are cyborgs whose intelligence is driven by the brain of a human corpse taken involuntarily by SHODAN. In the Net they are dangerous and strong before crashing. They are represented digitally as red, cephalopods with skull faces.
Cyber Stinger
Appearing as green fireflies, they fly around and spawn in pairs.
Cyber-Bully
Large purple constructs that blast attacks that bounce off of walls.
Security Mines
Placed throughout Cyberspace, protecting areas containing restricted information. Colliding with them causes loss of link integrity. Appears as a blue sphere.
SHODAN
She controls Citadel Station, residing with the area of Cyberspace only accessible on the Bridge.

Cut[]

Cyber Stalker
These green constructs stay in place and shoot at intruders. Presumably able to move around as needed, though this isn't confirmed.
Cyber-Spawner
An early form of spawning that would have been destroyable to stop enemies from spawning.
Cyber-Diego
Edward Diego's Cyberspace form, in the form of his red face within a triangular ring.

Software[]

Pulser Combat
The software prototype for this Cyber weapon was developed by Yatsumora Cyberchannels Corporation in 2070. It transmits a focused burst of line trash that disrupts the integrity of any Net entity.
I.C.E. Drill
Developed by RazorFinger pirate gang, Drills are specialized tools designed to cut through the defensive I.C.E. walls that sometimes surround limited access software.
Cybergun
A gun that has 4 different variants, able to shoot similar to guns in Realspace.
Recall Escape
An one-shot program which instantly rewrites a user’s address location to the point of entry in order to "retreat" from security system.
Decoy Evasion
One-use software tool which generates a decoy that distracts security programs, who then attack this ghost image instead of the intruder. Hackers think it came out of the infamous hacker underground of Bulgaria.
Turbo Dash
It increases the speed of drifting and skidding through the Net. It was hacked up by jockeys of the Citadel's system by exploiting a little-known bug in the operating system in order to maneuver against powerful data streams

Cut[]

Cyber Shield
Program which give limited defense against attacks, preventing integrity loss by constantly scanning link integrity software and cycling through error correction routines and then restoring the code to an uncorrupted state.
Quad Damage
This software would temporarily increase damage by four times what it normally is.
Extra Time
Increases the amount of time in the timer, giving a user more time in Cyberspace in areas where a timer is present.
Log Recording
The digital form of Audio Logs, stored purely as data without the normal physical storage.
Cyber Fun Pack Software
These minigames are playable on the GamePig™ and even feature the GamePig logo in the software icon.

Pseudospace[]

Pseudospace is an area within Cyberspace that is unique from the rest in that the Hacker walks around like they do in Realspace. The name is never mentioned in-game but instead is spoken of outside the game. It refers to the final area where the SHODAN fight takes place in the System Shock Remake.

Cut Content[]

The following was planned to be in the game during development but was cut or changed prior to release.

Trivia[]

  • Much like the original game, the wall panels in Cyberspace light up when shot by the player. Lit panels can also cause bordering panels to light up following the rules for Conway's Game Of Life.

Gallery[]

Advertisement