User Tools

Site Tools


computer_use_skill

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
computer_use_skill [2013/09/06 08:13]
storyteller
computer_use_skill [2021/12/04 00:39] (current)
Line 1: Line 1:
 ====== Computer Use (Skill) ====== ====== Computer Use (Skill) ======
- +===== COMPUTER USE (INT) ===== 
- +
-**COMPUTER USE (INT)** +
  
 //​Trained/​Untrained//​ //​Trained/​Untrained//​
Line 8: Line 6:
 The Computer Use skill, as one might imagine, governs the use of all computers. ​ The Computer Use skill comes in handy in an extraordinarily wide range of situations and activities. ​ A Computer Use check is not necessary for the most routine uses of computers, and can be made untrained in others. ​ Use this skill to access computer systems (including those which run a starship), write or modify computer programs, and override or bypass computer-controlled devices. This skill is centrally important to many actions in the [[Grid]], as well. The Computer Use skill, as one might imagine, governs the use of all computers. ​ The Computer Use skill comes in handy in an extraordinarily wide range of situations and activities. ​ A Computer Use check is not necessary for the most routine uses of computers, and can be made untrained in others. ​ Use this skill to access computer systems (including those which run a starship), write or modify computer programs, and override or bypass computer-controlled devices. This skill is centrally important to many actions in the [[Grid]], as well.
  
-===== Check: ​===== +**Check:**  ​Most normal computer operations, such as using a typical consumer application or doing research on the Grid, don’t require a Computer Use check, though doing research may require a [[Research (Skill)|Research]] check. Additionally,​ many public access computers run Assist programs that allow the user to act as if trained with a small number of ranks in the Computer Use skill.
-Most normal computer operations, such as using a typical consumer application or doing research on the Grid, don’t require a Computer Use check, though doing research may require a [[Research (Skill)|Research]] check. Additionally,​ many public access computers run [[assist programs|Assist programs]] that allow the user to act as if trained with a small number of ranks in the Computer Use skill.+
  
-More complex tasks, however, including hacking of any sort, programming [[Shadows]],​ and so on, require trained Computer Use checks. [[Grid|Gridrunning]] and hacking are covered under [[Robots and Computers]],​ but less complicated uses of the skill and uses that don’t involve the Grid are covered here.+More complex tasks, however, including hacking of any sort, programming [[shadow|Shadows]], and so on, require trained Computer Use checks. [[Grid|Gridrunning]] and hacking are covered under [[Computers]],​ but less complicated uses of the skill and uses that don’t involve the Grid are covered here.
  
 +===== Untrained Uses =====
 **The following applications of the Computer Use skill can be used untrained.** **The following applications of the Computer Use skill can be used untrained.**
  
Line 24: Line 22:
 You can take 10 or 20 only in systems in which you are an authorized user. Failing Find File checks when hacking bears the same risk of detection as failed checks to overcome Portals and Permissions. You can take 10 or 20 only in systems in which you are an authorized user. Failing Find File checks when hacking bears the same risk of detection as failed checks to overcome Portals and Permissions.
  
-|**Size of Area Accessed** | ** DC** | **Time**| +|**Size of Area Accessed**|**DC**|**Time**| 
-|Personal computer or site|  10 | 1 action| +|Personal computer or site|10|1 action| 
-|Small network/​menu | 15 | 1 round| +|Small network/​menu|15 |1 round| 
-|Large network/​directory| ​ 25 | 1 minute| +|Large network/​directory|25 |1 minute| 
-|Massive network/​root directory| 35| ​ 10 minutes|+|Massive network/​root directory|35| 10 minutes|
  
  
Line 46: Line 44:
 //​Inaccessible sites// are those sites that are not connected to the Grid or not connected to the user’s Grid. Gates and portals to such sites do not exist. //​Inaccessible sites// are those sites that are not connected to the Grid or not connected to the user’s Grid. Gates and portals to such sites do not exist.
  
-== Send Transmission == +==== Send Transmission ​==== 
-Routine communications like hailing a nearby ship or operating a [[mass transceiver|mass]]– or laser-transceiver,​ are accomplished with a Computer Use check (DC 10). Operating a [[Stardrive|drivesat relay]] and other, more complicated transmissions require checks at DC’s of 20 and above. Sending a transmission is a move action; operating a drivesat and other complex function require full round actions or longer. +Routine communications like hailing a nearby ship or operating a [[mass_transceiver_equipment|mass]]– or laser-transceiver,​ are accomplished with a Computer Use check (DC 10). Operating a [[Stardrive|drivesat relay]] and other, more complicated transmissions require checks at DC’s of 20 and above. Sending a transmission is a move action; operating a drivesat and other complex function require full round actions or longer.
  
  
 +=====Trained Only Uses =====
 **The following applications of the Computer Use skill cannot be used untrained.** **The following applications of the Computer Use skill cannot be used untrained.**
  
Line 56: Line 54:
 Reaching a target via the Grid requires two Computer Use checks. The first check (DC 10 or higher) is needed to find the site on the Grid, as described in Searching the Grid. The second check is to defeat the node’s Portal DC. Once you’ve succeeded at both checks, you’ve accessed the site. Reaching a target via the Grid requires two Computer Use checks. The first check (DC 10 or higher) is needed to find the site on the Grid, as described in Searching the Grid. The second check is to defeat the node’s Portal DC. Once you’ve succeeded at both checks, you’ve accessed the site.
  
-However you get access to your target site/​system,​ you usually start your session in a default node within the domain, a kind of entranceway.+However you get access to your target site/​system,​ you usually start your session in a default node within the domain, a kind of entrance-way.
  
  
 ==== Cover Tracks ==== ==== Cover Tracks ====
-By making a Computer Use check (DC 20) before beginning a session, you can alter your identifying information. The check re-quires ​1 minute and cannot be made untrained; you can take 10 but not 20. This triples the amount of time a trace takes to track , giving you much more time to find and negate the trace or end the session before the track is complete. The alterations last until you end your session.+By making a Computer Use check (DC 20) before beginning a session, you can alter your identifying information. The check requires ​1 minute and cannot be made untrained; you can take 10 but not 20. This triples the amount of time a trace takes to track , giving you much more time to find and negate the trace or end the session before the track is complete. The alterations last until you end your session.
  
  
-==== Defeat Computer Security====+==== Defeat Computer Security ====
 All computers and networks have security systems of one sort or another. Unless you are an authorized user of a system, you will need to defeat the security software to access the system. There are generally at least two steps to hacking into any computerized system: bypassing portals and gaining permissions. Portals are just what they sound like: doors, usually locked doors, which have to be unlocked for you to get at the stuff you want. Permissions allow you to do whatever it is you want to do. All computers and networks have security systems of one sort or another. Unless you are an authorized user of a system, you will need to defeat the security software to access the system. There are generally at least two steps to hacking into any computerized system: bypassing portals and gaining permissions. Portals are just what they sound like: doors, usually locked doors, which have to be unlocked for you to get at the stuff you want. Permissions allow you to do whatever it is you want to do.
  
Line 104: Line 102:
  
 ==== Intercept Communications ==== ==== Intercept Communications ====
-Any form of electronic communication may be intercepted. To intercept messages, you simply set a target and make a Computer Use check (DC 35) to receive “copies” of any messages ​sentto ​or by that target. If you are only after mes-sages between your target and another ​indi-vidual ​whose address you know, the DC drops to 25.+Any form of electronic communication may be intercepted. To intercept messages, you simply set a target and make a Computer Use check (DC 35) to receive “copies” of any messages ​sent to or by that target. If you are only after mes-sages between your target and another ​individual ​whose address you know, the DC drops to 25.
  
 By networking an electricomp with a communication device, you can attempt to intercept communications made by similar devices within the device’s range. Intercepting communications takes one minute to set up and a Computer Use check (DC 35). If you know the number or frequency of the comm device initiating the call, the DC drops to 25. By networking an electricomp with a communication device, you can attempt to intercept communications made by similar devices within the device’s range. Intercepting communications takes one minute to set up and a Computer Use check (DC 35). If you know the number or frequency of the comm device initiating the call, the DC drops to 25.
Line 111: Line 109:
  
 ==== Interface with Alien Computer ==== ==== Interface with Alien Computer ====
-In the decades or centuries that humanity has interacted with the familiar, advanced, alien species (fraal, t’sa, and mechalus), the technology of these species has become quite compatible. Computers and other technology of these species interface and communicate easily and routinely. ​ In cases of new and unfamiliar species, however, it requires time and Computer Use checks to get the systems to interface. If the character has some passing familiarity with the race, and some knowledge of its language (or a program that does), it takes a full-round action and a Computer Use check (DC 20) to interface with the system. If the species and its technology are completely unfamiliar, it takes 30 hours minus the character’s ranks in Computer Use and a Computer Use check (DC 30) to complete the interface. The gamemaster may adjust this time and the DC based on how unfamiliar the species is and how incompatible the computer systems are.+In the decades or centuries that humanity has interacted with the familiar, advanced, alien species ([[fraal_species|fraal]][[t_sa_species|t’sa]], and [[mechalus_species|mechalus]]), the technology of these species has become quite compatible. Computers and other technology of these species interface and communicate easily and routinely. ​ In cases of new and unfamiliar species, however, it requires time and Computer Use checks to get the systems to interface. If the character has some passing familiarity with the race, and some knowledge of its language (or a program that does), it takes a full-round action and a Computer Use check (DC 20) to interface with the system. If the species and its technology are completely unfamiliar, it takes 30 hours minus the character’s ranks in Computer Use and a Computer Use check (DC 30) to complete the interface. The gamemaster may adjust this time and the DC based on how unfamiliar the species is and how incompatible the computer systems are.
  
 ==== Jam Transmission ==== ==== Jam Transmission ====
Line 138: Line 136:
  
  
-==== Power Up/Power Down System====+==== Power Up/Power Down System ====
 A character in control of a computer system can use the Computer Use skill to siphon power away from or to any system connected to that computer. With a simple Computer Use check (DC 20), a character may activate or deactivate any such system as a move action. A character in control of a computer system can use the Computer Use skill to siphon power away from or to any system connected to that computer. With a simple Computer Use check (DC 20), a character may activate or deactivate any such system as a move action.
  
-==== Robots====+==== Robots ====
 Robots are computerized systems and can be programmed, reprogrammed,​ or hacked like any other computer. This usually requires physical access to the robot and some sort of interface device. If the robot has a robolink, however, you can at-tempt to intercept the signal and access its systems that way, if you have the gear. Robots are computerized systems and can be programmed, reprogrammed,​ or hacked like any other computer. This usually requires physical access to the robot and some sort of interface device. If the robot has a robolink, however, you can at-tempt to intercept the signal and access its systems that way, if you have the gear.
  
-Finding the frequency of a robolink with an electricomp requires a Search check (with the +4 equipment bonus provided by the sensor) with a DC of 40. You can then program your own RemCon implant (or similar device) to broadcast on that frequency and attempt to access the robot’s ​program-ming.+Finding the frequency of a robolink with an electricomp requires a Search check (with the +4 equipment bonus provided by the sensor) with a DC of 40. You can then program your own RemCon implant (or similar device) to broadcast on that frequency and attempt to access the robot’s ​programming.
  
 Whether accessing a robot’s systems directly or through a robolink and RemCon implant, its security must be defeated like any other computer system. Once you have access, you can attempt the following:  ​ Whether accessing a robot’s systems directly or through a robolink and RemCon implant, its security must be defeated like any other computer system. Once you have access, you can attempt the following:  ​
-**Reprogram Robot Friend-or-Foe Subroutine** ​ 
-Altering a robot’s attitude toward a certain individual or group is similar in many respects to altering an NPC’s attitude using the Diplomacy skill. Rather than using interac-tion to reason with the robot, however, a character simply uses Computer Use to change the robot’s base programming. The DC for changing a robot’s attitude is based on the difference between the robot’s initial atti-tude and the new attitude. 
  
-The advantage of using this method over simply using Diplomacy on the NPC ro-bot ​is that henceforth, regardless of circum-stances, the robot will always have the new attitude toward the character or group. The time to perform this use of the skill is equal to the check’s DC X 1 round.+**Reprogram Robot Friend-or-Foe Subroutine:​** 
 +Altering a robot’s attitude toward a certain individual or group is similar in many respects to altering an NPC’s attitude using the Diplomacy skill. Rather than using interaction to reason with the robot, however, a character simply uses Computer Use to change the robot’s base programming. The DC for changing a robot’s attitude is based on the difference between the robot’s initial attitude and the new attitude. 
 + 
 +The advantage of using this method over simply using Diplomacy on the NPC robot is that henceforth, regardless of circumstances, the robot will always have the new attitude toward the character or group. The time to perform this use of the skill is equal to the check’s DC X 1 round.
  
 |**Initial Attitude**|**New Attitude**| |**Initial Attitude**|**New Attitude**|
Line 186: Line 185:
 ==== Upgrade Programming ==== ==== Upgrade Programming ====
 It’s generally easier to alter an existing program than to create a new one from scratch. The DC depends on what the alteration sets out to accomplish and whether or not the user wants his “tampering” to readily obvious. It’s generally easier to alter an existing program than to create a new one from scratch. The DC depends on what the alteration sets out to accomplish and whether or not the user wants his “tampering” to readily obvious.
-|**Type of Alteration**| ​ **DC** | **Time**| +|**Type of Alteration**|**DC**|**Time**| 
-|Upgrade program (apply a +2 circumstance bonus to skill checks for using the system; costs 200 credits)|  15|  1 hour|+|Upgrade program (apply a +2 circumstance bonus to skill checks for using the system; costs 200 dollars)|15|1 hour|
  
  
Line 212: Line 211:
  
  
-{{tag>​skills intbased trainedonly sw modern future}}+{{tag>​skills intbased trainedonly sw modern future ​mechalus insight}}
  
computer_use_skill.1378455213.txt.gz · Last modified: 2021/12/04 00:41 (external edit)