Computer Use: Difference between revisions

From FuturePath
Jump to navigation Jump to search
No edit summary
 
(65 intermediate revisions by the same user not shown)
Line 1: Line 1:
Your skill at using Computer equipment. This is probably the most useful and necessary skill of a Future Hero. Technology is everywhere and normally interfacing with it requires familiarity with computers. Weither you are attempting cyber warfare, hacking into systems to learn secret information, or using sensor scanning equipment this skill will be helpful.  
Your skill at using Computer equipment. This is probably the most useful and necessary skill of a Future Hero. Technology is everywhere and normally interfacing with it requires familiarity with computers. Wither you are attempting cyber warfare, hacking into systems to learn secret information, or using sensor scanning equipment this skill will be helpful.  


==Check==  
==Check==  
Most normal computer operations don’t require a Computer Use check (though a character might have to make a Research check; see the Research skill description). However, searching an unfamiliar network for a particular file, writing computer programs, altering existing programs to perform differently (better or worse), and breaking through computer security are all relatively difficult and require skill checks.
Most normal computer operations don’t require a Computer Use check (though a character might have to make a Study check; see the [[Study]] skill description). However, searching an unfamiliar network for a particular file, writing virus, altering existing programs to perform differently (better or worse), and breaking through computer security are all relatively difficult and require skill checks.


===Find File===
== Computer Hacking ==
This skill can be used for finding files or data on an unfamiliar system. The DC for the check and the time required are determined by the size of the site on which the character is searching.
Finding public information on the Internet does not fall under this category; usually, such a task requires a Research check. This application of the Computer Use skill only pertains to finding files on private systems with which the character is not familiar.


Computer hacking is when a person attempts to break into a computer system that they are not normally allowed in and once in preform some actions such as 'Finding File' or 'Disable System', 'Overload Junction', 'Infect with Virus' and so on.
Computer Hacking is similar in nature to the [[Techniques#Combat_Techniques|Grapple]] technique. In that first you most succeed at hacking past a system's security and once the Hacker is "in" they must keep rolling each turn to stay 'in' the system or else they trigger a security alarm and can be kicked out. The DC is 1/2 the initial DC to get into the system. If the character beats the DC by 10 or more, the character automatically succeeds at all subsequent security checks.
{| class="wikitable" style="margin-left: 10px; width: 85%;"
|+ Hacking Actions
|-
| <div class="toccolours mw-collapsible mw-collapsed">
''' - Defeat Computer Security'''' (Has to be first action)
<div class="mw-collapsible-content">
{| class="wikitable" style="float:right; margin-left: 10px;"  
{| class="wikitable" style="float:right; margin-left: 10px;"  
! style="text-algin:left;"|Size of Site
! style="text-algin:left;"|Level of Security
!DC
!DC
!Time
!Time
|-
|-
| Personal computer||10||1 round
| 0) Basic||15|| 1 Round
|-
|-
| Small office network||15||2 rounds
| 1) Minimum||20|| 2 Round
|-
|-
| Large office network||20||1 minute
| 2) Average||25|| 3 Rounds
|-
|-
| Massive corporate network||25||10 minutes
| 3) Exceptional||35|| 4 Rounds
|-
| 4) Maximum||40|| 5 Rounds
|}
|}


===Defeat Computer Security===
The DC is determined by the quality of the security program installed to defend the system. If the check failed by 10 or more, the security system immediately alerts its administrator that there has been an attempted unauthorized entry. An alerted administrator may attempt to identify the character or cut off the character’s access to the system. See [[Computer_Use#Counter_Hacking|Counter Hacking]]
This application of Computer Use can’t be used untrained. The DC is determined by the quality of the security program installed to defend the system. If the check is failed by 5 or more, the security system immediately alerts its administrator that there has been an unauthorized entry. An alerted administrator may attempt to identify the character or cut off the character’s access to the system.
 
Sometimes, when accessing a difficult site, the character has to defeat security at more than one stage of the operation. If the character beats the DC by 10 or more when attempting to defeat computer security, the character automatically succeeds at all subsequent security checks at that site until the end of the character’s session (see Computer Hacking below).
Sometimes, when accessing a difficult site, the character has to defeat security at more than one stage of the operation. The system may have different security levels that yield different actions. This can be determined at the GM's discretion.
 
While a Hacker is 'in' the hacked system they have new actions they do can too the system. Some actions immediately inform security that there is a breach while other actions are stealthy.
 
 
 
</div>
</div>
|-
| <div class="toccolours mw-collapsible mw-collapsed">
''' - Find File/Sensitive Info'''
<div class="mw-collapsible-content">
:DC: Size of Site + Security Level + Mics Mod
{| class="wikitable" style="float:right; margin-left: 10px;"  
{| class="wikitable" style="float:right; margin-left: 10px;"  
! style="text-algin:left;"|Level of Security
! style="text-algin:left;"|Size of Site
!DC
!DC
!Time
|-
|-
| Minimum||20
| Personal computer||+1||2 round
|-
|-
| Average||25
| Small office network||+4||3 rounds
|-
|-
| Exceptional||35
| Large office network||+8||6 rounds
|-
|-
| Maximum||40
| Massive corporate network||+16||12 rounds
|}
|}
:Can Trip Alarm: No
:Retry: Yes
:Time: 2+ Rounds
This skill can be used for finding files or data on an unfamiliar or protected system. The DC for the check and the time required are determined by the size of the site on which the character is searching. This is only necessary if the Hacker must first get pass the systems security and/or if the information is hidden.
Finding public information on the Internet does not fall under this category; usually, such a task requires a [[Study#Researching_a_Topic.2FItem.2FEvent|Study]] check.
This application of the Computer Use skill only pertains to finding files on private systems or on a difficult system with which the character is not familiar.
</div>
</div>
|-
| <div class="toccolours mw-collapsible mw-collapsed">
''' - Disable/Enable System'''
<div class="mw-collapsible-content">
:DC: 5 + Security Level + Mics Mod
:Can Trip Alarm: Yes
:Retry: Yes
:Time: 1 Round
The Misc Mod may come from the GM deciding that the particular device has its own level of security. Some systems may be remote controlled or disable/enabled remotly. If a system is then it may be accessible by the system the Hacker has hacked. If so the Hacker can spend one round controlling the device. Each round they control the device they have to roll again and there is the possibility of tripping a security alarm.
</div>
</div>
|-
| <div class="toccolours mw-collapsible mw-collapsed">
''' - Overload Junction'''
<div class="mw-collapsible-content">
:DC: 10 + Security Level + Mics Mod
:Can Trip Alarm: Yes
:Retry: Yes
:Time: 1 Round
If a system's power or some other utility control is managed remotely by the system hacked by the Hacker then they can spend a turn attempting to damage it. This damage can be enough to out right destroy some things. It is up to the GM to determine how man rounds it will take to completely destroy an system. The destruction can possibly cause area of effect damage. If an enemy target is within range they will have to roll reflex saves and take damage according to grenade rules.


</div>
</div>
|-
| <div class="toccolours mw-collapsible mw-collapsed">
''' - Infect with Virus'''
<div class="mw-collapsible-content">
:DC: 0 + Security Level + Mics Mod
:Can Trip Alarm: Yes
:Retry: No*
:Time: 1 Round


===Computer Hacking===
The Hacker can attempt to infect a system with a virus. The virus has to be programmed or otherwise acquired before the hacking started. To learn more about what Viruses can do read the section below regarding Crafting Viruses.
Breaking into a secure computer or network is often called hacking.
When a character hacks, he or she attempts to invade a site. A site is a virtual location containing files, data, or applications. A site can be as small as a single computer, or as large as a corporate network connecting computers and data archives all over the world—the important thing is that access to the site connects the user to everything within it. Some sites can be accessed via the Internet; others are not connected to any outside network and can only be tapped into by a user who physically accesses a computer connected to the site.
Every site is overseen by a system administrator—the person in charge of the site, and who maintains its security. Often, the system administrator is the only person with access to all of a site’s functions and data. A site can have more than one system administrator; large sites have a system administrator on duty at all times. A character is the system administrator of his or her personal computer.
When a character hacks into a site, the visit is called a session. Once a character stops accessing the site, the session is over. The character can go back to the site in the future; when he or she does, it’s a new session.
Several steps are required to hack into a site:
Covering Tracks: This step is optional. By making a Computer Use check (DC 20), a character can alter his or her identifying information. This imposes a –5 penalty on any attempt made to identify the character if his or her activity is detected.


====Access the Site====
If a Hacker fails to infect a machine an Alarm is triggered and it is impossible to attempt again with the same virus.
There are two ways to do this: physically or over the Internet.
Physical Access: A character gains physical access to the computer, or a computer connected to the site.  If the site being hacked is not connected to the Internet, this is probably the only way a character can access it. A variety of skill checks may be required, depending on the method used to gain access.
Internet Access: Reaching a site over the net requires two Computer Use checks. The first check (DC 10) is needed to find the site on the net. The second is a check to defeat computer security (see the Computer Use skill description). Once a character has succeeded in both checks, the character has accessed the site.
Locate What You’re Looking For: To find the data (or application, or remote device) the character wants, make a Computer Use check. See Find File under the skill description.
Defeat File Security: Many networks have additional file security.  If that’s the case, the character needs to make another check to defeat computer security.
Do Your Stuff: Finally, the character can actually do what he or she came to do. If the character just wants to look at records, no additional check is needed. (A character can also download data, although that often takes several rounds—or even several minutes, for especially large amounts of information—to complete.) Altering or deleting records sometimes requires yet another check to defeat computer security. Other operations can be carried out according to the Computer Use skill description.


====Defend Security====
</div>
If the character is the system administrator for a site (which may be as simple as being the owner of a laptop), he or she can defend the site against intruders. If the site alerts the character to an intruder, the character can attempt to cut off the intruder’s access (end the intruder’s session), or even to identify the intruder.
</div>
To cut off access, make an opposed Computer Use check against the intruder. If the character succeeds, the intruder’s session is ended. The intruder might be able to defeat the character’s security and access his or her site again, but the intruder will have to start the hacking process all over. Attempting to cut off access takes a full round.
|-
One surefire way to prevent further access is to simply shut the site down. With a single computer, that’s often no big deal—but on a large site with many computers (or computers controlling functions that can’t be interrupted), it may be time-consuming or even impossible.
|<div class="toccolours mw-collapsible mw-collapsed">
To identify the intruder, make an opposed Computer Use check against the intruder. If the character succeeds, the character learns the site from which the intruder is operating (if it’s a single computer, the character learns the name of the computer’s owner). Identifying the intruder requires 1 minute and is a separate check from cutting off access. This check can only be made if the intruder is accessing the character’s site for the entire length of the check—if the intruder’s session ends before the character finishes the check, the character automatically fails.
''' - Crash Computer'''
Degrade Programming: A character can destroy or alter applications on a computer to make use of that computer harder or impossible. The DC for the attempt depends on what the character tries to do. Crashing a computer simply shuts it down. Its user can restart it without making a skill check (however, restarting takes 1 minute). Destroying programming makes the computer unusable until the programming is repaired. Damaging programming imposes a –4 penalty on all Computer Use checks made with the computer (sometimes this is preferable to destroying the programming, since the user might not know that anything is wrong, and won’t simply decide to use a different computer).
<div class="mw-collapsible-content">
A character can degrade the programming of multiple computers at a single site; doing so adds +2 to the DC for each additional computer.
:DC: 5 + Security Level + Mics Mod
{| class="wikitable" style="float:right; margin-left: 10px;"
:Can Trip Alarm: No
! style="text-algin:left;"|Scope of Alteration
:Retry: Yes
!DC
:Time: 1 Round
!Time
 
The Hacker can attempt to cause the system they hacked into to Crash. This usually just means the machine needs to reboot in order to get back to normal operations but this can buy a Team precious time needed to do some sort of action. The system comes back up in 1d4 rounds.
 
</div>
</div>
|-
| <div class="toccolours mw-collapsible mw-collapsed">
''' - Manipulate Data'''
<div class="mw-collapsible-content">
:DC: 10 + Security Level + Mics Mod
:Can Trip Alarm: No
:Retry: No*
:Time: 2 Rounds
 
This allows a Hacker to gain access to databases and manipulate data. The size of the data can make it require more then 2 rounds. Things such as transferring money from one account to another or sabotaging company secrets. This by default doesn't raise an alarm. However if the Hacker rolls a natural 1 during this action it still can.
 
</div>
</div>
|-
|}
 
== Counter Hacking ==
 
Counter Hacking is what someone may do when they realize there system is being hacked. Simply because a security alarm has been triggered doesn't mean the hacker is caught and is unable to go further. It just means that now they can be expelled from the machine. A System Admin or other user who is defending a system can attempt to remove and even Identify the hacker who is attempting access.
 
{| class="wikitable" style="margin-left: 10px; width: 85%;"
|+ Hacking Actions
|-
|-
| Crash computer||10||1 minute
| <div class="toccolours mw-collapsible mw-collapsed">
'''Deny Access'''
<div class="mw-collapsible-content">
The user defending a system has to roll an opposed Computer Use check against the latest Computer Use score of the Hacker. If successful the Hacker is kicked from the system and is unable to try again for 24 hours and has to take disadvantage for at least a week depending on the GM. The Hacker can relocate and attempt again sooner but they still take disadvantage as long as the system is being defended by the same user.
</div>
</div>
|-
|-
| Destroy programming||15||10 minutes
| <div class="toccolours mw-collapsible mw-collapsed">
'''Identify'''
<div class="mw-collapsible-content">
The user defending a system can roll an opposed Computer Use check against the latest Computer Use score of the Hacker. If successful they can gain a single peace of information. Such as location, make/model of Hacker PC, length of time they have been in the system. With location the user can attempt to Counter Hack the Hacker. With the 'model of hacker PC' they gain advantage while doing so. With 'length of time' they can gain advantage when trying additional Identify or Deny Access attempts.
</div>
</div>
|-
|-
| Damage programming||20||10 minutes
|}
|}


== Crafting Virus ==
A Character can use there Computer Use skill once it is at Rank 2 to craft viruses. Just like crafting rules for the Craft skills the higher the Computer Use Skill Rank the more customization points can be applied to the Virus that is programmed/crafted. A higher Computer Use Rank also allows the Character to make higher ranked Viruses.
Below is a chart of different viruses. Additional customization can be added to make the virus harder to detect or easier to infect. Viruses are categorized under 3 main threat levels. The threat level represents the seriousness of what the virus can do. Or what harm it could bring.
# Threat Level '''1''' Viruses (Rank 2 Computer Use)
## Fill of disk with unusable or pointless data
## Distract users with ads and pop ups.
## Find and send already existing data.
## Allows 'Find File/Sensitive Info' and 'Crash Computer' hacking actions.
# Threat Level '''2''' Viruses (Rank 4 Computer Use)
## Reboot or otherwise temporarily disable a device.
## Record and send active user data such as key strokes.
## Find and delete or otherwise edit data.
## Allows 'Manipulate Data' and 'Disable/Enable System' hacking actions
# Threat Level '''3''' Viruses (Rank 6 Computer Use)
## Damage software or otherwise disable system until repaired.
## Manipulate core operating systems and functions of network.
## Allows 'Overload Junction', 'Infect with Virus' (self replicate),


Fixing the degraded programming requires 1 hour and a Computer Use check against a DC equal to the DC for degrading it + 5.
{| class="mw-collapsible mw-collapsed wikitable" style="margin-left: 10px; width: 85%;
Write Program: A character can create a program to help with a specific task. Doing so grants the character a +2 circumstance bonus to the task.
!colspan="3"| '''--- Crafting Viruses Table ---'''
A specific task, in this case, is one type of operation with one target.
|-
The DC to write a program is 20; the time required is 1 hour.
! Virus Name
Operate Remote Device: Many devices are computer-operated via remote links. If the character has access to the computer that controls such systems, the character can either shut them off or change their operating parameters. The DC depends on the nature of the operation. If the character fails the check by 5 or more, the system immediately alerts its administrator that there has been an unauthorized use of the equipment. An alerted administrator may attempt to identify the character or cut off his or her access to the system.
! Ability
{| class="wikitable" style="float:right; margin-left: 10px;"
! Detection and<br />Removal DC
! style="text-algin:left;"|Type of Operation
|-
!DC
! colspan="3" | Threat Level 1 Viruses (Requires 2 Ranks in Computer Use)
!Time
|-
| Backdoor || Lowers the DC for a Hacker to get back into the infected system to 5 || DC 10
|-
| File Mine || This creates a file or directory that links to a virus that can do a TL1 effect || DC 10
|-
| Spam-o-tron || This creates distractions for uses on a network || DC 15
|-
! colspan="3" | Threat Level 2 Viruses (Requires 3 Ranks in Computer Use)
|-
| Backdoor Worm || Lowers the DC for a Hacker to get back into the infected system to 5. It self replicates making it harder to remove. || DC 15
|-
| File Worm || This replicates itself and replaces existing files and directories on a system. When accessed it causes a predetermined TL2 effect. || DC 15
|-
|-
| Shut down passive remote (including cameras and door locks)||20||1 round per remote
| Trojan || This listens in on user actions to try to determine user info such as passwords/usernames, bank info etc... || DC 20
|-
|-
| Shut down active remote (including motion detectors and alarms)||25||1 round per remote
| Try.Delete || This virus can be programmed to hunt down any occurrence of some data and edit or delete it every time it finds it. || DC 20
|-
|-
| Reset parameters||30||1 minute per remote
! colspan="3" | Threat Level 3 Viruses (Requires 4 Ranks in Computer Use)
|-
|-
| Change passcodes||25||1 minute
| Backdoor Boot Sector || Lowers the DC for a Hacker to get back into the infected system to 5. || DC 25
|-
|-
| Hide evidence of alteration||10||1 minute
| OverLoader 9000 || Causes havoc to a systems CPU, Memory and IO to disk. The system is useless until repaired. || DC 20
|-
|-
| Minimum security||–5||
| d3f3C7\/3 (The Defective Virus) || This can only work on systems that control sensitive machinery. It causes overloads in power, pressure, etc.. to disable the physical hardware. || DC 20
|-
| Mind Funk || This virus randomly picks an effect and attempts to do it. Roll a d8 and pick an effect from the list of Virus Threat Levels or design your own. || DC 25
|-
|}
 
A customization point is rewarded for every rank above the rank required to make the virus. They can be spent to increase the DC by 5 for every point. Or increase the effect. Or added a new effect or bonus effect.
 
Crafting a virus takes time to do. You not only have to write it but test it out to ensure it works correctly. The above list are only examples you can make a custom Threat Level X virus as long as the GM agrees and the Character has the correct skill rank for it. It takes one week of full day work to prefect the virus. Once made you no longer need to craft it again. It is now in your 'repertoire' of viruses. You can even sell or buy viruses on the dark market. Threat Level 1's are almost worthless and are only a few credits. Threat Level 2 are worth $100 and Threat Level 3 are worth $10,000. Each bonus point spent increases the price by 50%.
 
== Encrypt/Decrypt Message ==
Your ability to Decrypt messages or Encrypt messages of your own.
 
{| class="wikitable" style="float:right; margin-left: 10px;"
|+ Table: DC Examples
! style="text-algin:left;"|Complexity
!DC
! (In Combat) Time
|-
| Simple || 12 || 2 Rounds
|-
| Standard || 15 || 3 Rounds
|-
| Advanced || 20 || 5 Rounds
|-
|-
| Exceptional security||10||
| Top Secret/Experimental || 30 || 7 Rounds
|-
|-
| Maximum security||15||
| Overly Complex/Exotic || 40 || 10 Rounds
|}
|}


===Conduct Active Sensor Scan===
A character can decrypt writing in an code, or encrypted message. Helpful texts or computer programs can provide a bonus (usually a single advantage bonus) on the check, provided they are applicable to the script in question.
Using a starship’s sensors to analyze another ship or object in sensory range requires a Computer Use check (DC 15). An active sensor scan conducted over a vast distance (for example, across a star system) or subjected to some form of disturbance (such as interference from a solar flare) applies a –5 or higher penalty on the check.
 
If the check succeeds, the character understands the general content of message, reading about one page of text or its equivalent in 30 seconds. If the check fails, the GM makes a Wisdom check (DC 10) for the character to see if he or she avoids drawing a false conclusion about the text. (Success means that the character does not draw a false conclusion; failure means that the character does.)
 
The GM secretly makes both the skill check and the Wisdom check so the character can’t tell whether the conclusion drawn is accurate or not.
 
===Try Again===
Yes, unless conditions change or there is a time limit. A character can take 10 or 20 when making a Encrypt/Decrypt Message check.
 
It can take multiple rounds or more, depending on the complexity of the encryption. It cannot be done during combat unless the player is not activity engages in combat. For example they can be attempting to decipher the encrypted message while other Characters attempt to protect the player.  


===Send Transmission===
== Ship Bases Functions ==
Routine communications (hailing a nearby ship, using a subspace or dimensional transceiver, and so on) are accomplished with a Computer Use check (DC 10). Communications sent over incredibly long distances (such as between star systems) are subject to distortion; correcting that distortion to ensure a message reaches its intended destination requires a successful Computer Use check (DC 20).
The following applications of the Computer Use skill can’t be used untrained:


===Jam Transmission===
The Computer Use Skill can be used to assist in the operation of certain ship functions. [[Crypto]], [[Hack]], [[Jam]], [[Scan]]. To learn more about these ship functions or about ship functions in general visit the [[Space_Ships#Ship_Functions|Ship Functions]] section of [[Space_Ships|Space Ships]].
This skill can be used to prevent a ship or facility from receiving an incoming transmission. An opposed Computer Use check between the individual receiving the message and the individual attempting to jam the message determines whether or not the message gets through. If an unmanned computer receives the transmission, jamming the transmission requires a Computer Use check (DC 15).
Scramble/Unscramble Transmission: Computer Use can be used to scramble a transmission. This is done with an opposed Computer Use check between the individual sending the message and anyone attempting to intercept or unscramble it.


==Try Again==
==Try Again==

Latest revision as of 23:24, 22 October 2017

Your skill at using Computer equipment. This is probably the most useful and necessary skill of a Future Hero. Technology is everywhere and normally interfacing with it requires familiarity with computers. Wither you are attempting cyber warfare, hacking into systems to learn secret information, or using sensor scanning equipment this skill will be helpful.

Check

Most normal computer operations don’t require a Computer Use check (though a character might have to make a Study check; see the Study skill description). However, searching an unfamiliar network for a particular file, writing virus, altering existing programs to perform differently (better or worse), and breaking through computer security are all relatively difficult and require skill checks.

Computer Hacking

Computer hacking is when a person attempts to break into a computer system that they are not normally allowed in and once in preform some actions such as 'Finding File' or 'Disable System', 'Overload Junction', 'Infect with Virus' and so on.

Computer Hacking is similar in nature to the Grapple technique. In that first you most succeed at hacking past a system's security and once the Hacker is "in" they must keep rolling each turn to stay 'in' the system or else they trigger a security alarm and can be kicked out. The DC is 1/2 the initial DC to get into the system. If the character beats the DC by 10 or more, the character automatically succeeds at all subsequent security checks.

Hacking Actions

- Defeat Computer Security' (Has to be first action)

Level of Security DC Time
0) Basic 15 1 Round
1) Minimum 20 2 Round
2) Average 25 3 Rounds
3) Exceptional 35 4 Rounds
4) Maximum 40 5 Rounds

The DC is determined by the quality of the security program installed to defend the system. If the check failed by 10 or more, the security system immediately alerts its administrator that there has been an attempted unauthorized entry. An alerted administrator may attempt to identify the character or cut off the character’s access to the system. See Counter Hacking

Sometimes, when accessing a difficult site, the character has to defeat security at more than one stage of the operation. The system may have different security levels that yield different actions. This can be determined at the GM's discretion.

While a Hacker is 'in' the hacked system they have new actions they do can too the system. Some actions immediately inform security that there is a breach while other actions are stealthy.


- Find File/Sensitive Info

DC: Size of Site + Security Level + Mics Mod
Size of Site DC Time
Personal computer +1 2 round
Small office network +4 3 rounds
Large office network +8 6 rounds
Massive corporate network +16 12 rounds
Can Trip Alarm: No
Retry: Yes
Time: 2+ Rounds

This skill can be used for finding files or data on an unfamiliar or protected system. The DC for the check and the time required are determined by the size of the site on which the character is searching. This is only necessary if the Hacker must first get pass the systems security and/or if the information is hidden.

Finding public information on the Internet does not fall under this category; usually, such a task requires a Study check.

This application of the Computer Use skill only pertains to finding files on private systems or on a difficult system with which the character is not familiar.



- Disable/Enable System

DC: 5 + Security Level + Mics Mod
Can Trip Alarm: Yes
Retry: Yes
Time: 1 Round

The Misc Mod may come from the GM deciding that the particular device has its own level of security. Some systems may be remote controlled or disable/enabled remotly. If a system is then it may be accessible by the system the Hacker has hacked. If so the Hacker can spend one round controlling the device. Each round they control the device they have to roll again and there is the possibility of tripping a security alarm.

- Overload Junction

DC: 10 + Security Level + Mics Mod
Can Trip Alarm: Yes
Retry: Yes
Time: 1 Round

If a system's power or some other utility control is managed remotely by the system hacked by the Hacker then they can spend a turn attempting to damage it. This damage can be enough to out right destroy some things. It is up to the GM to determine how man rounds it will take to completely destroy an system. The destruction can possibly cause area of effect damage. If an enemy target is within range they will have to roll reflex saves and take damage according to grenade rules.

- Infect with Virus

DC: 0 + Security Level + Mics Mod
Can Trip Alarm: Yes
Retry: No*
Time: 1 Round

The Hacker can attempt to infect a system with a virus. The virus has to be programmed or otherwise acquired before the hacking started. To learn more about what Viruses can do read the section below regarding Crafting Viruses.

If a Hacker fails to infect a machine an Alarm is triggered and it is impossible to attempt again with the same virus.

- Crash Computer

DC: 5 + Security Level + Mics Mod
Can Trip Alarm: No
Retry: Yes
Time: 1 Round

The Hacker can attempt to cause the system they hacked into to Crash. This usually just means the machine needs to reboot in order to get back to normal operations but this can buy a Team precious time needed to do some sort of action. The system comes back up in 1d4 rounds.

- Manipulate Data

DC: 10 + Security Level + Mics Mod
Can Trip Alarm: No
Retry: No*
Time: 2 Rounds

This allows a Hacker to gain access to databases and manipulate data. The size of the data can make it require more then 2 rounds. Things such as transferring money from one account to another or sabotaging company secrets. This by default doesn't raise an alarm. However if the Hacker rolls a natural 1 during this action it still can.

Counter Hacking

Counter Hacking is what someone may do when they realize there system is being hacked. Simply because a security alarm has been triggered doesn't mean the hacker is caught and is unable to go further. It just means that now they can be expelled from the machine. A System Admin or other user who is defending a system can attempt to remove and even Identify the hacker who is attempting access.

Hacking Actions

Deny Access

The user defending a system has to roll an opposed Computer Use check against the latest Computer Use score of the Hacker. If successful the Hacker is kicked from the system and is unable to try again for 24 hours and has to take disadvantage for at least a week depending on the GM. The Hacker can relocate and attempt again sooner but they still take disadvantage as long as the system is being defended by the same user.

Identify

The user defending a system can roll an opposed Computer Use check against the latest Computer Use score of the Hacker. If successful they can gain a single peace of information. Such as location, make/model of Hacker PC, length of time they have been in the system. With location the user can attempt to Counter Hack the Hacker. With the 'model of hacker PC' they gain advantage while doing so. With 'length of time' they can gain advantage when trying additional Identify or Deny Access attempts.

Crafting Virus

A Character can use there Computer Use skill once it is at Rank 2 to craft viruses. Just like crafting rules for the Craft skills the higher the Computer Use Skill Rank the more customization points can be applied to the Virus that is programmed/crafted. A higher Computer Use Rank also allows the Character to make higher ranked Viruses.

Below is a chart of different viruses. Additional customization can be added to make the virus harder to detect or easier to infect. Viruses are categorized under 3 main threat levels. The threat level represents the seriousness of what the virus can do. Or what harm it could bring.

  1. Threat Level 1 Viruses (Rank 2 Computer Use)
    1. Fill of disk with unusable or pointless data
    2. Distract users with ads and pop ups.
    3. Find and send already existing data.
    4. Allows 'Find File/Sensitive Info' and 'Crash Computer' hacking actions.
  2. Threat Level 2 Viruses (Rank 4 Computer Use)
    1. Reboot or otherwise temporarily disable a device.
    2. Record and send active user data such as key strokes.
    3. Find and delete or otherwise edit data.
    4. Allows 'Manipulate Data' and 'Disable/Enable System' hacking actions
  3. Threat Level 3 Viruses (Rank 6 Computer Use)
    1. Damage software or otherwise disable system until repaired.
    2. Manipulate core operating systems and functions of network.
    3. Allows 'Overload Junction', 'Infect with Virus' (self replicate),
--- Crafting Viruses Table ---
Virus Name Ability Detection and
Removal DC
Threat Level 1 Viruses (Requires 2 Ranks in Computer Use)
Backdoor Lowers the DC for a Hacker to get back into the infected system to 5 DC 10
File Mine This creates a file or directory that links to a virus that can do a TL1 effect DC 10
Spam-o-tron This creates distractions for uses on a network DC 15
Threat Level 2 Viruses (Requires 3 Ranks in Computer Use)
Backdoor Worm Lowers the DC for a Hacker to get back into the infected system to 5. It self replicates making it harder to remove. DC 15
File Worm This replicates itself and replaces existing files and directories on a system. When accessed it causes a predetermined TL2 effect. DC 15
Trojan This listens in on user actions to try to determine user info such as passwords/usernames, bank info etc... DC 20
Try.Delete This virus can be programmed to hunt down any occurrence of some data and edit or delete it every time it finds it. DC 20
Threat Level 3 Viruses (Requires 4 Ranks in Computer Use)
Backdoor Boot Sector Lowers the DC for a Hacker to get back into the infected system to 5. DC 25
OverLoader 9000 Causes havoc to a systems CPU, Memory and IO to disk. The system is useless until repaired. DC 20
d3f3C7\/3 (The Defective Virus) This can only work on systems that control sensitive machinery. It causes overloads in power, pressure, etc.. to disable the physical hardware. DC 20
Mind Funk This virus randomly picks an effect and attempts to do it. Roll a d8 and pick an effect from the list of Virus Threat Levels or design your own. DC 25

A customization point is rewarded for every rank above the rank required to make the virus. They can be spent to increase the DC by 5 for every point. Or increase the effect. Or added a new effect or bonus effect.

Crafting a virus takes time to do. You not only have to write it but test it out to ensure it works correctly. The above list are only examples you can make a custom Threat Level X virus as long as the GM agrees and the Character has the correct skill rank for it. It takes one week of full day work to prefect the virus. Once made you no longer need to craft it again. It is now in your 'repertoire' of viruses. You can even sell or buy viruses on the dark market. Threat Level 1's are almost worthless and are only a few credits. Threat Level 2 are worth $100 and Threat Level 3 are worth $10,000. Each bonus point spent increases the price by 50%.

Encrypt/Decrypt Message

Your ability to Decrypt messages or Encrypt messages of your own.

Table: DC Examples
Complexity DC (In Combat) Time
Simple 12 2 Rounds
Standard 15 3 Rounds
Advanced 20 5 Rounds
Top Secret/Experimental 30 7 Rounds
Overly Complex/Exotic 40 10 Rounds

A character can decrypt writing in an code, or encrypted message. Helpful texts or computer programs can provide a bonus (usually a single advantage bonus) on the check, provided they are applicable to the script in question.

If the check succeeds, the character understands the general content of message, reading about one page of text or its equivalent in 30 seconds. If the check fails, the GM makes a Wisdom check (DC 10) for the character to see if he or she avoids drawing a false conclusion about the text. (Success means that the character does not draw a false conclusion; failure means that the character does.)

The GM secretly makes both the skill check and the Wisdom check so the character can’t tell whether the conclusion drawn is accurate or not.

Try Again

Yes, unless conditions change or there is a time limit. A character can take 10 or 20 when making a Encrypt/Decrypt Message check.

It can take multiple rounds or more, depending on the complexity of the encryption. It cannot be done during combat unless the player is not activity engages in combat. For example they can be attempting to decipher the encrypted message while other Characters attempt to protect the player.

Ship Bases Functions

The Computer Use Skill can be used to assist in the operation of certain ship functions. Crypto, Hack, Jam, Scan. To learn more about these ship functions or about ship functions in general visit the Ship Functions section of Space Ships.

Try Again

Computer Use requires at least a full-round action. The GM may determine that some tasks require several rounds, a few minutes, or longer, as described above. A character can take 10 when using the Computer Use skill. A character can take 20 in some cases, but not in those that involve a penalty for failure. (A character cannot take 20 to defeat computer security or defend security.)

Special

  • Feats: A character with the Gearhead feat gets a +2 bonus on all Computer Use checks.