Computers allows you to access computer systems, write or modify computer programs, and override or bypass computer-controlled devices. This also includes knowledge of computer languages, programming languages, operating systems, and video games.
You attempt to access the internet to come up with information on a topic. Spend 10 minutes and make a Computers check to attempt to find information, with results like Recalling Knowledge on a topic. Larger investigations or topics could require several hours, while single-word answers of information may only take a minute, based on the GM's discretion. Significant and longer investigations should use the Research rules system. The GM sets the DC based on the topic's obscurity, the quality of your connection, and whether the data is being actively repressed.
Critical Success: You find the information. If it was a topic you could have used Recall Knowledge on, you find it in 1 Minute instead.Success: You find the information you were looking for.Critical Failure: You find misleading information thanks to incorrect data or online pranksters. The GM provides you false information on your topic of investigation (or decides to give you no information, as on a failure).Hacking into a site (a virtual location containing files, data, or applications) is a multi-step process called a Session.
During a hack, you attempt to invade a site or network. A site is a virtual location containing files, data, or applications. A site can be as small as a single computer or as large as a cloud network connecting computers and data archives worldwide. The important thing is that access to the site connects the user to everything within it. Some sites can be accessed via the Internet; others are not connected to any outside network and can only be accessed by a user who physically connects to a computer on the site.
Nearly every site is overseen by a system administrator, the person in charge of the site, and who maintains its security. Often, the system administrator is the only person with access to all of a site's functions and data. A site can have more than one system administrator; large sites have a system administrator on duty at all times. A character is typically the system administrator for their personal computer.
When you hack into a site, the visit is called a session. Once your character stops accessing the site, the session is over. The character can return to the site in the future; when they do, it's a new session.
Several steps are required to hack into a site:
Covering Tracks (Optional): This step is optional. Spend 10 Minutes to make a Computers check to alter your identifying information, setting this as the DC that an opposing hacker will need to beat to uncover your true identity.
Access the Site: There are two ways to do so: in person or over the Internet.
Physical Access: If you can gain physical access to the computer, or a computer connected to the site, you can use this option. If the site being hacked is not connected to the Internet, this is probably the only way you can access it. A variety of skill checks may be required, depending on the method used to gain access.
Internet Access: Reaching a site over the Internet requires two Computers checks and 1 Hour. The first check is needed to find a back door to the site on the Internet. The second is a check to defeat the cybersecurity parameters of the site. The DC for both of these checks is set by the GM. Once a character has succeeded on both checks, they have accessed the site.
Locate What You're Looking For: To find the data (or application, or remote device) you want, use the Find File action.
Defeat File Security: Many networks have additional file security. If that's the case, you need to make a Defeat Security check to defeat computer security.
Do Your Stuff: Finally, you can actually do what you came to do. If you just want to look at records, no additional check is needed. (You can also download data, although that often takes several actions--or even several minutes, for especially large amounts of information--to complete.) Altering or deleting records sometimes requires yet another check to defeat computer security. Other operations can be carried out according to the Computers skill description.
Use a Computers check to craft a custom computer. You must first succeed at a Wealth check to acquire the materials. After 4 days of work, attempt a Crafting check against a DC set by the GM.
Success: You successfully create the item.
Failure: You fail to complete the item, but you salvage the raw materials for their full value. You must start over.
Critical Failure: You ruin the raw materials. To try again, you must make a new Wealth check and start over.
You can attempt to bypass the security software and other defensive measures installed on a particular device. Spend 1 Minute and make a Computers check. The DC is determined by the quality of the security program installed to defend the system.
Critical Success: You bypass the security and automatically succeed on all future attempts to bypass this specific device, unless it is updated or reformatted.Success: You disable one level of the device's security.Failure: You are unable to disable the security.Critical Failure: You trigger an alarm, alerting the system administrator to your unauthorized access.If you are the system administrator for a site (which may be as simple as being the owner of a laptop), you can defend the site against intruders. If the site alerts an administrator to an intruder, you can attempt to cut off the intruder's access (end the intruder's session), or even to identify the intruder.
Cut Off Access (1 Minute): Spend 1 Minute and make a Computers check against the intruder's Computers DC. On success, their session ends.
Identify Intruder (3 Minutes): Spend 3 Minutes and make a Computer check against the intruder's Computers DC. On a success, you learn the IP/location they are operating from. (The intruder's session must remain active for the entire 3 minutes to succeed--if the intruder's session ends before the character finishes the check, the character automatically fails. ).
One surefire way to prevent further access is to simply shut the site down. With a single computer, that's often no big deal--but on a large site with many computers (or computers controlling functions that can't be interrupted), it may be time-consuming or even impossible.
You can destroy or alter applications on a computer to make it harder or impossible to use. Spend 1 minute to make a Computers check against the DC of the site you are interacting with. On a success, choose one of the following options:
Crash: Simply shuts the computer down. Its user can restart it without making a skill check (however, restarting takes a minimum of 1 minute).
Damage: The computer becomes unusable until the programming is repaired. Repairing the damage takes at least 1 hour, and a DC 15 Computers check.
Degrade: Impose a -4 penalty on all Computer Science checks made with the computer (sometimes this is preferable to destroying the programming, since the user might not know that anything is wrong, and won't simply decide to use a different computer). Repairing the degradation takes at least 1 hour, and a DC 15 Computers check.
You can Degrade the Programming of multiple computers at a single site; doing so adds +2 to the DC for each additional computer.
This skill can be used for finding files or data on an unfamiliar system. The DC for the check and the actions required are determined by the size of the site on which the character is searching, ranging from 3 actions for a personal computer to 10 minutes for a mainframe or cloud server.
Critical Success: You locate the files in half the usual time.Success: You locate the files.Failure: You are unable to locate the files.Critical Failure: You fail to locate the files and trip the computer's security. The device may crash, lock down, or alert an admin.Hack into Bluetooth or Wi-Fi-controlled physical systems (cameras, drones, electronic locks). If you have access to the site or network that controls such systems, you can spend 1 Minute to make a Computers check to either shut them off or change their operating parameters. The DC depends on the nature of the operation.
Critical Success: You gain root access to the device and can drastically alter its operating parameters, change its site, or make other significant changes.Success: You gain access to the device and can operate it for as long as your session lasts.Failure: You are unable to hack into the deviceCritical Failure: You are unable to hack into the devices, and you alert the device's administrator to your attempt. An alerted administrator may attempt to identify you cut off your access to the system.Fix damaged electronics using a repair kit and a stable surface. Spend 10 Minutes to make a Computers. The GM sets the DC, but it’s usually about the same DC to Repair a given item as it is to Craft it in the first place. Making repairs may require a Wealth check for parts. You cannot Repair a completely destroyed object (0 HP).