Difference between revisions of "SR5:Matrix Rules"
Adragon202 (talk | contribs) (Created page with "{{SR5:Rules Navigation}} <center> {| | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" |+style="color:black;"|FREE ACTIONS |- !s...") |
Adragon202 (talk | contribs) |
||
Line 23: | Line 23: | ||
!style="background:black;color:gold;"|FUNCTION | !style="background:black;color:gold;"|FUNCTION | ||
!style="background:black;color:gold;"|LIMIT | !style="background:black;color:gold;"|LIMIT | ||
+ | !style="background:black;color:gold;"|MARKS | ||
|- | |- | ||
− | |Brute Force||Mark Manipulation||Attack | + | |Brute Force||Mark Manipulation||Attack||None |
|- | |- | ||
− | |Check Overwatch Score||Information Gathering||Sleaze | + | |Check Overwatch Score||Information Gathering||Sleaze||None |
|- | |- | ||
− | |Crack File||File Manipulation||Attack | + | |Crack File||File Manipulation||Attack||1 |
|- | |- | ||
− | |Crash Program||Matrix Combat||Attack | + | |Crash Program||Matrix Combat||Attack||1 |
|- | |- | ||
− | |Data Spike||Matrix Combat||Attack | + | |Data Spike||Matrix Combat||Attack||None |
|- | |- | ||
− | |Disarm Data Bomb||File Manipulation||Firewall | + | |Disarm Data Bomb||File Manipulation||Firewall||None |
|- | |- | ||
− | |Edit File||File Manipulation||Data Processing | + | |Edit File||File Manipulation||Data Processing||1 |
|- | |- | ||
− | |Enter/Exit Host||Misc||Data Processing | + | |Enter/Exit Host||Misc||Data Processing||1 |
|- | |- | ||
− | |Erase Mark||Mark Manipulation||Attack | + | |Erase Mark||Mark Manipulation||Attack||Special |
|- | |- | ||
− | |Erase Matrix Signature||Mark Manipulation||Attack | + | |Erase Matrix Signature||Mark Manipulation||Attack||None |
|- | |- | ||
− | |Format Device||Device Manipulation||Sleaze | + | |Format Device||Device Manipulation||Sleaze||3 |
|- | |- | ||
− | |Grid-Hop||Misc||Data Processing | + | |Grid-Hop||Misc||Data Processing||None |
|- | |- | ||
− | |Hack on the Fly||Mark Manipulation||Sleaze | + | |Hack on the Fly||Mark Manipulation||Sleaze||None |
|- | |- | ||
− | |Hide||Misc||Sleaze | + | |Hide||Misc||Sleaze||0 |
|- | |- | ||
− | |Jam Signals||Misc||Attack | + | |Jam Signals||Misc||Attack||Owner |
|- | |- | ||
− | |Jump Into Rigged Device||Misc||Data Processing | + | |Jump Into Rigged Device||Misc||Data Processing||3 |
|- | |- | ||
− | |Matrix Perception||Information Gathering||Data Processing | + | |Matrix Perception||Information Gathering||Data Processing||None |
|- | |- | ||
− | |Reboot Device||Device Manipulation||Data Processing | + | |Reboot Device||Device Manipulation||Data Processing||3 |
|- | |- | ||
− | |Set Data Bomb||File Manipulation||Sleaze | + | |Set Data Bomb||File Manipulation||Sleaze||1 |
|- | |- | ||
− | |Snoop||Information Gathering||Sleaze | + | |Snoop||Information Gathering||Sleaze||1 |
|- | |- | ||
− | |Spoof Command||Device Manipulation||Sleaze | + | |Spoof Command||Device Manipulation||Sleaze||1 |
|- | |- | ||
− | |Trace Icon||Information Gathering||Data Processing | + | |Trace Icon||Information Gathering||Data Processing||2 |
|} | |} | ||
|- | |- | ||
Line 76: | Line 77: | ||
!style="background:black;color:gold;"|FUNCTION | !style="background:black;color:gold;"|FUNCTION | ||
!style="background:black;color:gold;"|LIMIT | !style="background:black;color:gold;"|LIMIT | ||
+ | !style="background:black;color:gold;"|MARKS | ||
|- | |- | ||
− | |Control Device||Device Manipulation||Data Processing* | + | |Control Device||Device Manipulation||Data Processing*||Varies |
|- | |- | ||
− | |Matrix Search||Information Gathering||Data Processing | + | |Matrix Search||Information Gathering||Data Processing||Special |
|} | |} | ||
*Control Device may or may not use Data | *Control Device may or may not use Data | ||
Line 91: | Line 93: | ||
!style="background:black;color:gold;"|FUNCTION | !style="background:black;color:gold;"|FUNCTION | ||
!style="background:black;color:gold;"|LIMIT | !style="background:black;color:gold;"|LIMIT | ||
+ | !style="background:black;color:gold;"|MARKS | ||
|- | |- | ||
− | |Change Icon||Misc||Data Processing | + | |Change Icon||Misc||Data Processing||Owner |
|- | |- | ||
− | |Jack Out||Misc||Firewall | + | |Jack Out||Misc||Firewall||Owner |
|- | |- | ||
− | |Invite Mark||Mark Manipulation||Data Processing | + | |Invite Mark||Mark Manipulation||Data Processing||Owner |
|- | |- | ||
− | |Send Message||Misc||Data Processing | + | |Send Message||Misc||Data Processing||1 |
|- | |- | ||
− | |Switch Interface Mode||Misc||Data Processing | + | |Switch Interface Mode||Misc||Data Processing||Owner |
|} | |} | ||
|- | |- | ||
Line 112: | Line 115: | ||
!style="background:black;color:gold;"|INIT COST | !style="background:black;color:gold;"|INIT COST | ||
|- | |- | ||
− | |Full Matrix Defense||Matrix Combat||Firewall||-10 | + | |Full Matrix Defense||Matrix Combat||Firewall||-10||Owner |
|} | |} | ||
|} | |} |
Revision as of 18:56, 3 April 2016
5th Edition Rules |
---|
Basics // Combat // Magic // Matrix // Driving // Character Creation |
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
*Control Device may or may not use Data Processing as its limit | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Technomancer Actions
|
|