Computer Systems and Hacking
From LiberationMUSH Wiki
For details on how the Computer Systems and Hacking rules work, please see Book of Secrets pages 116-120. Here are some key tables.
Tasks | Traits |
---|---|
Programming | Intelligence + Computer |
Hacking & Cracking | Intelligence + Computer |
Working Fast | Wits + Computer |
Analyzing System | Perception + Computer |
Finding Data or Traps | Perception + Computer |
Social Engineering | Social Trait + Computer |
Encrypting/Deciphering | Intelligence + Cryptography |
Hardware Work | Dexterity or Intelligence + Technology |
Activity / Circumstances | Difficulty | Hours |
---|---|---|
Writing Cracking Software | 6 - 8 | (A) |
Writing Secuirty Software | 7 | (A) |
Using Cracking Software | -1 - -3 | -1 - -3 |
Planting Backdoor | (B) | +1 |
Using Backdoor | -2 | -4 |
Accessing / Altering Obvious Data | 6 | 1 |
Accessing / Altering Hidden Data | 7 | 2 |
Accessing / Altering Classified Data | 8 | 3+ |
Obvious System Crack | 7 | 1+ |
Hidden System Crack | 8 | 2+ |
Scanning Van Eck | (B) | 1+ |
Sloppy Filing | +1 - +3 | -1 - -3 |
Social Engineering | -1 - -3 | -1 - -3 |
Trinary Computer | +/-2 | +/-2 |
(A) One roll reflects a week or more of work in downtime; each success when writing software reduces later hacking and cracking rolls by -1 per success.
(B) Difficulty based on the system being hacked, as per Computer System Types.
Target System | Difficulty | Successes | Hours |
---|---|---|---|
Commercial Software | 5 - 7 | 1 - 3 | ½ - 2 |
Unique Software | 8 | 5 | 2+ |
Palmtop / Tablet | 5 | 3 | 1 |
Laptop / PC | 6 | 3 - 5 | 1 - 3 |
Elite PC | 8 | 5 - 8 | 1- 6 |
Mini / Small Network | 7 | 3 - 5 | ½ - 2 |
Mainframe / Large Network | 8 | 5 - 10 | 3 - 5 |
Commercial Cloud | 6 | 3 - 5 | ½ - 2 |
Secure Cloud | 7 | 3 - 6 | 1 - 3 |
Elite Cloud | 8 | 10 | 3 - 5 |
Commercial Server | 7 | 5 | 1 - 3 |
Secure Server | 8 | 10 | 5+ |
Elite Server | 9 | 15 | 5+ |
Supercomputer | 9 | 20 | 5+ |