Computers (Int, Manipultation; Trained Only)


You|re trained in the operation of computers and modifying or creating software.

Check: Most normal computer operations--using software, getting your e-mail--don|t require a Computers check and can be done untrained. However, searching an unfamiliar network for a particular file, writing programs, altering existing programs to perform differently, and breaking computer security all require skill checks (and training).

Size of SiteDCTime
Personal computer101 round
Small office network152 rounds
Large office network201 minute
Massive network2510 minutes

Sometimes, you have to defeat security at more than one stage of the operation. If you beat the DC by 10 or more when attempting to defeat computer security, you automatically succeed at all subsequent security checks at that site until the end of your session.

Level of SecurityDC
Minimum20
Average25
Exceptional35
Maximum40

To cut off access, make an opposed Computers check against the intruder. If the check succeeds, the intruder|s session is ended. The intruder might be able to defeat your security and access your site again, but has to start over again. Attempting to cut off access takes a full round.
One surefire way to prevent further access is to simply shut the site down. With a single computer, that|s no big deal, but on a large site with many computers (or computers controlling functions that can|t be interrupted) it may be time-consuming or even impossible to do so.
To identify the intruder, make an opposed Computers check. If the check succeeds, you learn the site from which the intruder is operating (if it|s a single computer, you learn the name of the computer|s owner). Identifying the intruder requires 1 minute and is a separate check from cutting off access. This check can only be made if the intruder is accessing your site for the entire length of the check--if the intruder|s session ends before you make the Computers check, your attempt fails.
You can damage the programming of multiple computers at a single site; doing so adds +2 to the DC for each additional computer.
Fixing damaged programming requires an hour and a Computers check against a DC equal to the DC for damaging it + 5. Destroyed programming must be re-installed.

Scope of AlterationDCTime
Crash computer101 minute
Destroy programming1510 minutes
Damage programming2010 minutes


Type of OperationDCTime
Shut down passive remote (including cameras and door locks)201 round per remote
Shut down active remote (including motion detectors and alarms)251 round per remote
Reset parameters301 minute per remote
Change passcodes251 minute
Hide evidence of alteration+101 minute
Minimum security-5--
Exceptional security+10--
Maximum security+15--

Action: Computers requires at least a full-round action. The GM may determine some tasks require several rounds, a few minutes, or longer, as described above.
Special: You can take 10 when using the Computers skill. You can take 20 in some cases, but not those involving a penalty for failure. (You cannot take 20 to defeat computer security or defend security, for example.)

MMSkills
There are no comments on this page.
Valid XHTML :: Valid CSS: :: Powered by WikkaWiki