- Ken Rolston at The Kraken
- Rick Meints at The Kraken
- The Grognard Files
- Francesca Baerald Interview
- Russell Morrissey Interview
- Sarah Newton Interview
- [Mongoose Publishing] Paranoia: Implausible Deniability
- [Mongoose Publishing] Paranoia: Yellow Clearance Black Box Blues (Remastered)
- Sandy Petersen Interview
- [Just Crunch Games] Three Faces of the Wendigo
Power Room and Computer Room
The Power Room and Computer Room is a full-color, 40 x 20 inch, floor plan of a Power Room and a Computer Room, with Hex, Square and No overlay.
This Product includes the VTT files for online play.
The PDF includes a 360° View of the map.
Game Masters need quality maps for their miniatures. DramaScape™ is committed to bringing Game Masters the maps they need.
“Time for a data transfer.”
The Power Room and the Computer Room is a triple room map of a power and computer room with a small connecting corridor and security desk in between them. This product includes a 360-degree panoramic view of the Power Room and the Computer Room.
The rooms can either be used together in a set or used on their own.
The Power Room and the Computer Room are intended for use in near or far future science games. These rooms are suitable for use in a starship, star port, or space station as the station’s or ship’s power and computation centers. The power room can be used in an industrial complex or factory on a planet. The computer room could be used as a server room or secret government facility for storing data on a planet. The computer room could also make an excellent library in a far future game. These rooms could be adapted to a modern setting as advanced cutting edge power stations or data storage for a government or corporation.
The computer room makes a tempting target if it holds secrets.
One scenario is a group of rebels, a rival corporation, or enemy space federation of the government, corporation, or space federation keeping the data a secret make a bold attack on the facility that holds the computer room. They attack the facility by boarding a spaceship or space station or by making a sneak attack on a planet-side factory by attacking it from the outside. Once they get to the computer room, they use their hackers to extract the secret information and then have the hackers plant a computer virus. They then proceed to the power room and shut down the power to remove any automated defenses that would hinder their escape. With the power off, they make their escape with the information.
The Player Characters need to stop the attack from outside or the enemy space marines boarding the ship and then get the power back online. Once they get the power back on, they get a nasty surprise. The hackers put a computer virus into the computer station that activates on reboot. Now the Player Characters need to stop the computer virus from erasing all the data from the memory banks. After all this, the attackers have a major head start but the Player Characters must hunt them down to retrieve the stolen data. This sets up a chase or investigation scene, as they need to try and find them.