Editing Savage Shadowrun AE Conversion

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 660: Line 660:
 
:'''Back-Door''': A back door is slang for a secret Access port that can bypass certain levels of a Network Host security. For example this could allow a decker to gain Access to a Tier IV security area without first bypassing or Accessing the lower Tier security areas and gets the deccker straight to the Network Host.   
 
:'''Back-Door''': A back door is slang for a secret Access port that can bypass certain levels of a Network Host security. For example this could allow a decker to gain Access to a Tier IV security area without first bypassing or Accessing the lower Tier security areas and gets the deccker straight to the Network Host.   
 
:'''Closed Host''': A Host system that does not have access to the Matrix. This is often done by paranoid and ultra security minded corps or government agencies where they store their most secretive and sensative data. Often the case for where the real pay dirt might be located and why a Decker might follow a team when breaking into a physical site.
 
:'''Closed Host''': A Host system that does not have access to the Matrix. This is often done by paranoid and ultra security minded corps or government agencies where they store their most secretive and sensative data. Often the case for where the real pay dirt might be located and why a Decker might follow a team when breaking into a physical site.
:'''Computer System''': A computer system is a term to describe anything with a microprocessor and wireless connectivity. A computer system might be a cyberarm, a comlink, a broadcasting Node, any kind of vehicle, drone or a security system; In 2060s the possibilities are endless. Basically, if it has a microprocessor, it can be hacked via the wireless signal it emits. Hacking a computer system also gives you direct access to any devices linked to the system. See Devices for more information.
+
:'''Computer System''': A computer system is a term to describe anything with a microprocessor and wireless connectivity. A computer system might be a cyberarm, a comlink, a broadcasting Nod, any kind of vehicle, drone or a security system; In 2060s the possibilities are endless. Basically, if it has a microprocessor, it can be hacked via the wireless signal it emits. Hacking a computer system also gives you direct access to any devices linked to the system. See Devices for more information.
 
:'''Counter Hacking''': Counter hacking is the process by which a person defends herself against an unwanted intrusion into a computer system or device. This is accomplished by making an opposed Hacking skill check (the person counter hacking gains their Firewall rating as a bonus to this check). You can attempt this roll untrained if you need to. The winner of the opposed roll is either booted from the system or remains logged in, as the case may be. If booted the hacker suffers a -2 to future hacking attempts against this computer system for the rest of the scene.
 
:'''Counter Hacking''': Counter hacking is the process by which a person defends herself against an unwanted intrusion into a computer system or device. This is accomplished by making an opposed Hacking skill check (the person counter hacking gains their Firewall rating as a bonus to this check). You can attempt this roll untrained if you need to. The winner of the opposed roll is either booted from the system or remains logged in, as the case may be. If booted the hacker suffers a -2 to future hacking attempts against this computer system for the rest of the scene.
 
:'''Device''': A device is an object that is linked to a computer system in some way, much like your home printer, microphone or web camera that is connected to your computer or comlink (in to 2060s desktops are rare). Most devices are wirelessly linked to a computer, though some can be hardwired with cables or nano wires (especially with Cyberware for 'security reasons). Common devices are alarm systems of all types, door maglocks, security cameras and systems (like weapons), elevators and even items you can sync up with your comlink. Some devices can only be hacked by gaining access to the computer system to which they are linked, while others can be hacked directly.  
 
:'''Device''': A device is an object that is linked to a computer system in some way, much like your home printer, microphone or web camera that is connected to your computer or comlink (in to 2060s desktops are rare). Most devices are wirelessly linked to a computer, though some can be hardwired with cables or nano wires (especially with Cyberware for 'security reasons). Common devices are alarm systems of all types, door maglocks, security cameras and systems (like weapons), elevators and even items you can sync up with your comlink. Some devices can only be hacked by gaining access to the computer system to which they are linked, while others can be hacked directly.  

Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see RPGnet:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)