Computer Systems and Hacking
From LiberationMUSH Wiki
For details on how the Computer Systems and Hacking rules work, please see Book of Secrets pages 116-120. Here are some key tables.
| Tasks | Traits |
|---|---|
| Programming | Intelligence + Computer |
| Hacking & Cracking | Intelligence + Computer |
| Working Fast | Wits + Computer |
| Analyzing System | Perception + Computer |
| Finding Data or Traps | Perception + Computer |
| Social Engineering | Social Trait + Computer |
| Encrypting/Deciphering | Intelligence + Cryptography |
| Hardware Work | Dexterity or Intelligence + Technology |
| Activity / Circumstances | Difficulty | Hours |
|---|---|---|
| Writing Cracking Software | 6 - 8 | (A) |
| Writing Secuirty Software | 7 | (A) |
| Using Cracking Software | -1 - -3 | -1 - -3 |
| Planting Backdoor | (B) | +1 |
| Using Backdoor | -2 | -4 |
| Accessing / Altering Obvious Data | 6 | 1 |
| Accessing / Altering Hidden Data | 7 | 2 |
| Accessing / Altering Classified Data | 8 | 3+ |
| Obvious System Crack | 7 | 1+ |
| Hidden System Crack | 8 | 2+ |
| Scanning Van Eck | (B) | 1+ |
| Sloppy Filing | +1 - +3 | -1 - -3 |
| Social Engineering | -1 - -3 | -1 - -3 |
| Trinary Computer | +/-2 | +/-2 |
(A) One roll reflects a week or more of work in downtime; each success when writing software reduces later hacking and cracking rolls by -1 per success.
(B) Difficulty based on the system being hacked, as per Computer System Types.
| Target System | Difficulty | Successes | Hours |
|---|---|---|---|
| Commercial Software | 5 - 7 | 1 - 3 | ½ - 2 |
| Unique Software | 8 | 5 | 2+ |
| Palmtop / Tablet | 5 | 3 | 1 |
| Laptop / PC | 6 | 3 - 5 | 1 - 3 |
| Elite PC | 8 | 5 - 8 | 1- 6 |
| Mini / Small Network | 7 | 3 - 5 | ½ - 2 |
| Mainframe / Large Network | 8 | 5 - 10 | 3 - 5 |
| Commercial Cloud | 6 | 3 - 5 | ½ - 2 |
| Secure Cloud | 7 | 3 - 6 | 1 - 3 |
| Elite Cloud | 8 | 10 | 3 - 5 |
| Commercial Server | 7 | 5 | 1 - 3 |
| Secure Server | 8 | 10 | 5+ |
| Elite Server | 9 | 15 | 5+ |
| Supercomputer | 9 | 20 | 5+ |