This is an old revision of the document!
INT
You can operate, manipulate, and hack into computer systems. If you don’t have physical access to a computer system’s user interface, you must use a hacking kit to access and manipulate the system.
Computers are set up to give one or more authorized users “root access,” allowing them to access any information or function of the computer as a standard action, with no need for a Computers check. Systems can block off specific sections of a computer and grant different users root access to those sections.
The base DC for many of the tasks of the Computers skill is equal to Complexity*2 with additional tech based and interface based modifiers below.
DC:
| Modifier | DC | Notes |
|---|---|---|
| Computer complexity | 2*complexity | Base modifier, round to full number |
| Interface, one of below | ||
| Non display terminals | +7 | like card decks and similar |
| Non display keyboard terminals | +6 | Like teletypes and similar |
| keypad | +5 | just a numeric keypad or similar |
| mini keyboard | +4 | typical early portable computers or phones with keyboards |
| mini touch screen | +3 | Like a typical smartphone |
| touch screen | +2 | Tablets and similar |
| Keyboard | +1 | Typical for early stationary computers |
| Keyboard and mouse | +0 | or keyboard and touch screen |
| multi-monitor/wall screen setup | -1 | with keyboard and mouse or large touch surface screen |
| Virtual reality | -2 | |
| Holographic display | -3 | |
| Direct neural Interface | -4 | Also if you have a computer brain |
| Interface timeline | How well developed it is compared to similar interfaces | |
| Prototype | +2 | Like for mini touch screens an apple newton |
| Early | +1 | Like for mini touch screens a small touch screen like original iphone |
| Normal | +0 | |
| Late | -1 | |
| Ultimate | -2 | |
These DCs may be adjusted by the GM to reflect other circumstances.
Examples for the starting tech:
You can use Computers to access an unsecured computer system’s most basic functions. The DC to access the information or functions of a public computer with no countermeasures or limitations is generally equal to the base DC -2 for limited information systems like a public info display, the Base DC for more broad systems.
If you want you can attempt to access a system by taking 20 on the task, requiring 2 minutes. Secured computer systems, and secured sections of an unsecured system, can be accessed by making a Computers check to hack a system.
You can also take 10 for access if you are familiar with same or similar systems in base time.
If you have enough ranks in Computers, you can build computers.
You can use Computers to forge official electronic documents. This takes 1d4 minutes. The GM rolls the Computers check to create a forgery in secret, so you’re not sure how good your forgery is.
This check is opposed by the Computers check of anyone who examines the document to determine its authenticity.
The DCs for Computers checks to detect a forgery are based on the type of forged document as well as other circumstances determined by the GM, as shown in the table below.
CIRCUMSTANCE DC MODIFIER
| Document contradicts knowledge or orders | –2 |
| Type of document is well known to examiner | –2 |
| Type of document is unknown to examiner | +2 |
| Examiner only casually reviews document | +2 |
| Forger has a sample of a similar document | +8 |
You can use Computers to repair a computer system or module that has been disabled, or destroy one that has been either removed or disabled by spending 10*1d6 minutes working on the computer.
The DC is based on the tier of the computer system. If you are repairing a disabled module or system and you fail the check by 5 or more, you accidentally destroy the module or system. You can’t take 10 or 20 on a Computers check to destroy or repair a computer system.
If you have access to a computer, but not root access, you may actually only have access to a fake shell (a computer countermeasure that grants access to fake files instead of real ones). If you succeed at the check, you realize that you have accessed a fake shell. The DC is based on the tier of the computer system.
A character with root access to a computer can disable or manipulate a countermeasure or module as a standard action with a DC 10 Computers check. If you have access (but not root access) to a computer, you can attempt a Computers check to activate, add, disable, or manipulate any countermeasure or module. If you want to affect a countermeasure or module that is behind a firewall, you must first hack the system (see below) to gain access to it. Activating or disabling a countermeasure or module generally takes a standard action. Adding or removing a module generally takes 1 minute per DC from complexity and interface. All of these tasks have a DC equal to the DC to hack the system. You cannot take 10 or 20 on a Computers check to disable or manipulate a module.
If you have access to a computer, you can attempt to upgrade your authorization to gain root access. This works similar to hacking the same computer, but the DC is 20 higher. In many cases it is impossible to gain root access, and every task beyond the computer’s basic functions must be attempted as a separate check to destroy, repair, disable, or manipulate modules or countermeasures. If a firewall has been set to have a different set of authorized users with root access, you must gain root access to it separately. Once you have root access to a computer, you can alter who else is granted root access with a successful Computers check to hack the system.
You cannot take 10 to get root.
You can use Computers to hack a computer system to which you don’t already have access. Hacking a computer system typically takes complexity/2 full actions. You can cut this time in half (to a minimum of one full action) for every 5 by which you increase the DC of the Computers check. If you succeed at the check, you gain access to any part of the computer that is not behind a firewall. This allows you to use the basic functions of the computer), and to make further checks that require you to have access. Accessing parts of a computer behind a firewall requires an additional Computers check for each firewall.
If you fail a Computers check to hack a system, you might trigger a countermeasure, if one has been installed. If you take 20 on a Computers check to hack a system with countermeasures without first disabling or destroying them, the countermeasures are automatically activated.
You cannot take 10 to hack a computer.