Computer Use
Your skill at using Computer equipment. This is probably the most useful and necessary skill of a Future Hero. Technology is everywhere and normally interfacing with it requires familiarity with computers. Weither you are attempting cyber warfare, hacking into systems to learn secret information, or using sensor scanning equipment this skill will be helpful.
Check
Most normal computer operations don’t require a Computer Use check (though a character might have to make a Study check; see the Study skill description). However, searching an unfamiliar network for a particular file, writing virus, altering existing programs to perform differently (better or worse), and breaking through computer security are all relatively difficult and require skill checks.
Find File
Size of Site | DC | Time |
---|---|---|
Personal computer | 10 | 2 round |
Small office network | 15 | 3 rounds |
Large office network | 20 | 6 rounds |
Massive corporate network | 25 | 12 rounds |
This skill can be used for finding files or data on an unfamiliar system. The DC for the check and the time required are determined by the size of the site on which the character is searching.
Finding public information on the Internet does not fall under this category; usually, such a task requires a Study check. This application of the Computer Use skill only pertains to finding files on private systems or on a difficult system with which the character is not familiar.
Computer Hacking
Computer hacking is when a person attempts to break into a computer system that they are not normally allowed in and once in preform some actions such as 'Finding File' or 'Disable System', 'Overload Junction', 'Infect with Virus' and so on.
Computer Hacking is similar in nature to the Grapple technique. In that first you most succeed at hacking past a system's security and once the Hacker is "in" they have options.
Next they Hacker can preform some set of actions. Some actions immediately inform security that there is a breach while other actions are stealthy. Each turn the hacker wishes to stay on the system they have to roll to make sure they do not do anything to trigger a security alarm. The DC is 1/2 the initial DC to get into the system.
Defeat Computer Security
Level of Security | DC | Time |
---|---|---|
Basic | 15 | 1 Round |
Minimum | 20 | 2 Round |
Average | 25 | 3 Rounds |
Exceptional | 35 | 4 Rounds |
Maximum | 40 | 5 Rounds |
The DC is determined by the quality of the security program installed to defend the system. If the check is failed by 10 or more, the security system immediately alerts its administrator that there has been an unauthorized entry. An alerted administrator may attempt to identify the character or cut off the character’s access to the system.
Sometimes, when accessing a difficult site, the character has to defeat security at more than one stage of the operation. If the character beats the DC by 10 or more when attempting to defeat computer security, the character automatically succeeds at all subsequent security checks. Meaning that the Hacker doesn't have to roll for success for each round they still need to Hack in order to break into the system.
Disable/Enable System
Overload Junction
Infect with Virus
Crash Computer
Mess with Data
Crafting Virus
Counter Hacking
Ship Bases Functions
The Computer Use Skill can be used to assist in the operation of certain ship functions. Crypto, Hack, Jam, Scan. To learn more about these ship functions or about ship functions in general visit the Ship Functions section of Space Ships.
Try Again
Computer Use requires at least a full-round action. The GM may determine that some tasks require several rounds, a few minutes, or longer, as described above. A character can take 10 when using the Computer Use skill. A character can take 20 in some cases, but not in those that involve a penalty for failure. (A character cannot take 20 to defeat computer security or defend security.)
Special
- Feats: A character with the Gearhead feat gets a +2 bonus on all Computer Use checks.