Post by HST Seth on Dec 19, 2013 7:26:29 GMT
Hacking
Hacking is a process that has lots of subtle nuances that is wrapped into a fairly small package at current, so here we are to flesh it out! We will divide it into what we call "Maneuvers", which each take different pools and have difficulties based on them! A successful Hack can then perform "Attacks".
You can only hack 1 item at a time, though a Computer Lab counts as 1 item. On the other hand, anything connected to the Lab you are using/item you are using, is fair game for the "Locate" Attack.
Maneuvers
Speed Hacking - Wits + Computers, dif 5-6
Speed Hacking is on-the-go hacking. This is the prodding and probing part of hacking. It is easier to hack from inside the terminal than from a remote location. If you are plugged into the terminal you are hacking, it is dif 6, if you are remote accessing, it is dif 7. This maneuver can also be used to test your Security.
Time Hacking - Int + Computers + Lab, dif 5-6
Any hacking you have hours to take on is a luxury, but if you manage it, you can use your Intelligence. This maneuver can also be used to test your Security.
Computer Security - Int + Computers + Lab
Computer security is how you set up your computer for protection against hackers. The successes you get on this check directly reduce the successes the hacker gets on their hacking check. If an entrant fails to get in, you have the chance to detect them and counter-hack them. Successful hacking is undetectable. Average Security is 3 successes on a general and simple computer; assume if you bought security software, this is about it. You may completely overhaul your security if it is compromised and you know it, this requires you spending 2 downtime actions.
Security Check - Wits + Computers + Lab, dif 6
Checking your security is a routine measure that most Hackers do pretty consistently. It is most often used to check their security itself and makes sure they didn't make a mistake, but can also reveal intrusions. This cannot be done remotely. A successful check tells you your Computer Security successes, and if you get more successes than a previously undetected hacker, you can attempt to counter-hack them as if they failed by as many successes as you bested them by.
Counter-Hacking - Wits + Computers + Lab, dif variable
Counter-Hacking is something you can do if you successfully detected the entrant. The difficulty is based on how many successes the entrant failed by. If they failed to pierce your security by 1 success or more, they are considered detected, but counter-hacking is done at dif 11 - successes failed. So, 1 success failure is a dif 10, while a 3 success failure is a dif 8. It is difficult to counter-hack, and you leave yourself open to a more easy back-entrance (Counter-hacking still has to bypass their computer security)
Attacks
The required successes are how many successes you need to get over the Computer Security to perform this type of attack. This is not an exhaustive list and should be updated when the STs add another attack maneuver because some brilliant Player made one up.
Download - Required Successes: 1
You can download information already on the computer onto a back-up drive.
Delete - Required Successes: 1
You can delete information already on the computer. This does not harm the physical equipment and cannot destroy or harm a computer lab.
Locate - Required Successes: 1 or 3
You locate the IP address and GPS coordinates of the computer. At 3 successes, you may locate other computers connecting to this item and attack them directly at +1 Dif for every new space you jump to via connection. Example: You hack a phone, and use the Locate attack to find it is connected to a lab, you hack that lab at +1 dif, from the lab you manage to locate another tablet connected to it, you hack that tablet at +2 dif, so on and so forth.
Fry - Required Successes: 3
You can destroy all data stored on the Computers you have access to; if labs or libraries are not backed up, they are lost. For each success you get above the required successes, you can trigger the computers to overheat, effectively destroying a dot of a Computer Lab per success, as well.
Backdoor - Required Successes: 5
You remove the computer security for you alone, leaving no trace of you ever being there. Until the person changes their security entirely, you have access. Changing the entire security requires the person to spend a significant amount of time changing passwords while being off the internet. It requires 2 downtime actions.
Equipment Cards
A computer card can be anything from a tablet to a phone to a laptop, but if it is connected to the rest of your stuff, it is directly accessible through that connection and is imperiled by a successful hack.
A Computer Card Looks like This; Your lab should have one:
Tablet, IPAD 4
Computer Security: 7 suxx
Connected To: Desiree's Computer Lab 5 (Anything else connected to the Computer Lab will be noted on the Computer Lab 5)
Enhanced: +3 defenses against Backdoor
Gadget: IP Scattering: +3 successes required to Locate maneuver.