Latest revision |
Your text |
Line 263: |
Line 263: |
| ** Arcantric Simulator ••••• | | ** Arcantric Simulator ••••• |
| ** Arcantric Defensive Agent •••• | | ** Arcantric Defensive Agent •••• |
− |
| |
− | ==Computer Rules==
| |
− |
| |
− | ===Hacking===
| |
− | :Dice Pool: Int + Computer + equipment vs (System Security or Int + Computer + equipment)
| |
− | :Action: Extended and contested (5-10+ successes; each roll represents 30 min)
| |
− | The hacker needs to accumulate a number of successes equal to the network's basic security setup. The sysadmin (if any) needs to accumulate a number of successes equal to the hacker's Int + Computer to kick him out of the system.
| |
− |
| |
− | Roll Results:
| |
− | * Dramatic Failure: kicked out of the network and can't access again for 24 hours. If sysadmin contests task, make another Int + Computer roll to determine if admin manages to trace hacker / hacker brushes aside admins efforts and penetrates network.
| |
− | * Exceptional Success: Your character has found vulnerability he can exploit; one-dice (cumulative) bonus to subsequent rolls.
| |
− |
| |
− | ===Traces===
| |
− | :Dice Pool: Wit + Computer + equipment (- Proxy Servers)
| |
− | :Action: Extended (Intruders Int + Computer; each roll represents 10 min)
| |
− | The Admin may only take a maximum of rolls equal to the number of the intruder's rolls.
| |
− |
| |
− | Roll Results:
| |
− | * Dramatic Failure: Admin gets wrong location.
| |
− | * Exceptional Success: Admin gets region of log-in; when intruder comes online again and scores and exceptional sucess Admin gets to know exact location.
| |
− |
| |
− | ===Encrypting or Decrypting Data===
| |
− | :Dice Pool: Int + Investigation or Computer
| |
− | :Action: Extended (5+ successes dependent on volume of information, each roll represents 30 min.)
| |
− | Ciphers count as a kind of “information armor” when it comes to uncovering the underlying message. A simple homespun code such as a Caesar cipher (no Cost) subtracts one success from attempts to uncover the information, standard computer cryptography programs (Res •••) substract two, and top-of-the-line military technology (Res •••••) substracts three successes from the attacker’s attempt — and can’t be cracked without time and powerful computers.
| |
− |
| |
− | Roll Results:
| |
− | * Dramatic Failure:
| |
− | * Exceptional Success:
| |
− |
| |
− | Possible Penalties: Bureaucratic Communication (-1), Military Code (-2), Obscure Information (-4)
| |
− |
| |
− | ===Coding Programs===
| |
− | :Dice Pool: Int + Computer + equipment
| |
− | :Action: Extended (5+ successes, each roll represents 30 min.)
| |
− |
| |
− | Basic Program Setup: Pow: 1, Fin: 1, Res: 1; Rank 1; Influence [] ••, Size 2; distribute 5 points between Pow, Fin and Res, choose Influence and a funtional effect for the Program (see Generic Programs for examples).
| |
− |
| |
− | Additional Successes can be used for increases in Pow, Fin and Res on a one by one basis, three successes can imbue additional Special Functions (Numina), five additional successes can increase the Programs Rank by one.
| |
− |
| |
− | Roll Results:
| |
− | * Dramatic Failure:
| |
− | * Exceptional Success:
| |
− |
| |
− | -----
| |
− | Suggested Equipment: High-performance computer (+1 to +3), broadband Internet access (+1), disk of scripts (+2), system passwords (+3)
| |
− | Possible Penalties: Outdated computer system (-2), slow Internet connection (-3)
| |