Computer Systems and Hacking

From LiberationMUSH Wiki


For details on how the Computer Systems and Hacking rules work, please see Book of Secrets pages 116-120. Here are some key tables.

Computer Systems Traits
Tasks Traits
Programming Intelligence + Computer
Hacking & Cracking Intelligence + Computer
Working Fast Wits + Computer
Analyzing System Perception + Computer
Finding Data or Traps Perception + Computer
Social Engineering Social Trait + Computer
Encrypting/Deciphering Intelligence + Cryptography
Hardware Work Dexterity or Intelligence + Technology


Computer Systems Difficulty and Time
Activity / Circumstances Difficulty Hours
Writing Cracking Software 6 - 8 (A)
Writing Secuirty Software 7 (A)
Using Cracking Software -1 - -3 -1 - -3
Planting Backdoor (B) +1
Using Backdoor -2 -4
Accessing / Altering Obvious Data 6 1
Accessing / Altering Hidden Data 7 2
Accessing / Altering Classified Data 8 3+
Obvious System Crack 7 1+
Hidden System Crack 8 2+
Scanning Van Eck (B) 1+
Sloppy Filing +1 - +3 -1 - -3
Social Engineering -1 - -3 -1 - -3
Trinary Computer +/-2 +/-2

(A) One roll reflects a week or more of work in downtime; each success when writing software reduces later hacking and cracking rolls by -1 per success.

(B) Difficulty based on the system being hacked, as per Computer System Types.


Computer System Types
Target System Difficulty Successes Hours
Commercial Software 5 - 7 1 - 3 ½ - 2
Unique Software 8 5 2+
Palmtop / Tablet 5 3 1
Laptop / PC 6 3 - 5 1 - 3
Elite PC 8 5 - 8 1- 6
Mini / Small Network 7 3 - 5 ½ - 2
Mainframe / Large Network 8 5 - 10 3 - 5
Commercial Cloud 6 3 - 5 ½ - 2
Secure Cloud 7 3 - 6 1 - 3
Elite Cloud 8 10 3 - 5
Commercial Server 7 5 1 - 3
Secure Server 8 10 5+
Elite Server 9 15 5+
Supercomputer 9 20 5+