Difference between revisions of "SR5:Hacking Lists"
Adragon202 (talk | contribs) |
Adragon202 (talk | contribs) |
||
| Line 16: | Line 16: | ||
|Unload Program | |Unload Program | ||
|} | |} | ||
| − | |rowspan=" | + | |rowspan="4"| |
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | ||
|+style="color:black;"|COMPLEX ACTIONS | |+style="color:black;"|COMPLEX ACTIONS | ||
|- | |- | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
| + | !style="background:black;color:gold;"|FUNCTION | ||
| + | !style="background:black;color:gold;"|LIMIT | ||
|- | |- | ||
|Break File | |Break File | ||
|- | |- | ||
| − | |Brute Force | + | |Brute Force||Mark Manipulation||Attack |
|- | |- | ||
| − | |Check Overwatch Score | + | |Check Overwatch Score||Information Gathering||Sleaze |
|- | |- | ||
| − | |Crack File | + | |Crack File||File Manipulation||Attack |
|- | |- | ||
| − | |Crash Program | + | |Crash Program||Matrix Combat||Attack |
|- | |- | ||
| − | |Data Spike | + | |Data Spike||Matrix Combat||Attack |
|- | |- | ||
| − | |Disarm Data Bomb | + | |Disarm Data Bomb||File Manipulation||Firewall |
|- | |- | ||
| − | |Edit File | + | |Edit File||File Manipulation||Data Processing |
|- | |- | ||
| − | |Enter/Exit Host | + | |Enter/Exit Host||Misc||Data Processing |
|- | |- | ||
| − | |Erase Mark | + | |Erase Mark||Mark Manipulation||Attack |
|- | |- | ||
| − | |Erase Matrix Signature | + | |Erase Matrix Signature||Mark Manipulation||Attack |
|- | |- | ||
|Format Device | |Format Device | ||
|- | |- | ||
| − | |Grid-Hop | + | |Grid-Hop||Misc||Data Processing |
|- | |- | ||
| − | |Hack on the Fly | + | |Hack on the Fly||Mark Manipulation||Sleaze |
|- | |- | ||
| − | |Hide | + | |Hide||Misc||Sleaze |
|- | |- | ||
| − | |Jam Signals | + | |Jam Signals||Misc||Attack |
|- | |- | ||
| − | |Jump Into Rigged Device | + | |Jump Into Rigged Device||Misc||Data Processing |
|- | |- | ||
| − | |Matrix Perception | + | |Matrix Perception||Information Gathering||Data Processing |
|- | |- | ||
| − | |Reboot Device | + | |Reboot Device||Device Manipulation||Data Processing |
|- | |- | ||
| − | |Set Data Bomb | + | |Set Data Bomb||File Manipulation||Sleaze |
|- | |- | ||
| − | |Snoop | + | |Snoop||Information Gathering||Sleaze |
|- | |- | ||
| − | |Spoof Command | + | |Spoof Command||Device Manipulation||Sleaze |
|- | |- | ||
| − | |Trace Icon | + | |Trace Icon||Information Gathering||Data Processing |
|} | |} | ||
| − | |rowspan=" | + | |rowspan="4"| |
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | ||
|+style="color:black;"|NOISE AND MATRIX USE | |+style="color:black;"|NOISE AND MATRIX USE | ||
| Line 114: | Line 116: | ||
|- | |- | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
| + | !style="background:black;color:gold;"|FUNCTION | ||
| + | !style="background:black;color:gold;"|LIMIT | ||
|- | |- | ||
| − | |Control Device | + | |Control Device||Device Manipulation||Data Processing* |
|- | |- | ||
| − | |Matrix Search | + | |Matrix Search||Information Gathering||Data Processing |
|} | |} | ||
| + | *Control Device may or may not use Data Processing as its limit | ||
|- | |- | ||
| | | | ||
| Line 125: | Line 130: | ||
|- | |- | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
| + | !style="background:black;color:gold;"|FUNCTION | ||
| + | !style="background:black;color:gold;"|LIMIT | ||
|- | |- | ||
| − | |Change Icon | + | |Change Icon||Misc||Data Processing |
|- | |- | ||
| − | |Jack Out | + | |Jack Out||Misc||Firewall |
|- | |- | ||
| − | |Invite Mark | + | |Invite Mark||Mark Manipulation||Data Processing |
|- | |- | ||
| − | |Send Message | + | |Send Message||Misc||Data Processing |
|- | |- | ||
| − | |Switch Interface Mode | + | |Switch Interface Mode||Misc||Data Processing |
| + | |} | ||
| + | |- | ||
| + | | | ||
| + | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | ||
| + | |+style="color:black;"|INTERRUPT ACTIONS | ||
| + | |- | ||
| + | !style="background:black;color:gold;"|ACTION | ||
| + | !style="background:black;color:gold;"|FUNCTION | ||
| + | !style="background:black;color:gold;"|LIMIT | ||
| + | |- | ||
| + | |Full Matrix Defense||Matrix Combat||Firewall | ||
|} | |} | ||
|} | |} | ||
Revision as of 18:38, 3 April 2016
| 5th Edition Lists |
|---|
| Gear // Magic // Hacking // Skills // Qualities // Packs // Creatures |
|
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
*Control Device may or may not use Data Processing as its limit | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Technomancer Actions
|
|