Difference between revisions of "SR5:Hacking Lists"
Adragon202 (talk | contribs) |
Adragon202 (talk | contribs) |
||
Line 16: | Line 16: | ||
|Unload Program | |Unload Program | ||
|} | |} | ||
− | |rowspan=" | + | |rowspan="4"| |
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | ||
|+style="color:black;"|COMPLEX ACTIONS | |+style="color:black;"|COMPLEX ACTIONS | ||
|- | |- | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
+ | !style="background:black;color:gold;"|FUNCTION | ||
+ | !style="background:black;color:gold;"|LIMIT | ||
|- | |- | ||
|Break File | |Break File | ||
|- | |- | ||
− | |Brute Force | + | |Brute Force||Mark Manipulation||Attack |
|- | |- | ||
− | |Check Overwatch Score | + | |Check Overwatch Score||Information Gathering||Sleaze |
|- | |- | ||
− | |Crack File | + | |Crack File||File Manipulation||Attack |
|- | |- | ||
− | |Crash Program | + | |Crash Program||Matrix Combat||Attack |
|- | |- | ||
− | |Data Spike | + | |Data Spike||Matrix Combat||Attack |
|- | |- | ||
− | |Disarm Data Bomb | + | |Disarm Data Bomb||File Manipulation||Firewall |
|- | |- | ||
− | |Edit File | + | |Edit File||File Manipulation||Data Processing |
|- | |- | ||
− | |Enter/Exit Host | + | |Enter/Exit Host||Misc||Data Processing |
|- | |- | ||
− | |Erase Mark | + | |Erase Mark||Mark Manipulation||Attack |
|- | |- | ||
− | |Erase Matrix Signature | + | |Erase Matrix Signature||Mark Manipulation||Attack |
|- | |- | ||
|Format Device | |Format Device | ||
|- | |- | ||
− | |Grid-Hop | + | |Grid-Hop||Misc||Data Processing |
|- | |- | ||
− | |Hack on the Fly | + | |Hack on the Fly||Mark Manipulation||Sleaze |
|- | |- | ||
− | |Hide | + | |Hide||Misc||Sleaze |
|- | |- | ||
− | |Jam Signals | + | |Jam Signals||Misc||Attack |
|- | |- | ||
− | |Jump Into Rigged Device | + | |Jump Into Rigged Device||Misc||Data Processing |
|- | |- | ||
− | |Matrix Perception | + | |Matrix Perception||Information Gathering||Data Processing |
|- | |- | ||
− | |Reboot Device | + | |Reboot Device||Device Manipulation||Data Processing |
|- | |- | ||
− | |Set Data Bomb | + | |Set Data Bomb||File Manipulation||Sleaze |
|- | |- | ||
− | |Snoop | + | |Snoop||Information Gathering||Sleaze |
|- | |- | ||
− | |Spoof Command | + | |Spoof Command||Device Manipulation||Sleaze |
|- | |- | ||
− | |Trace Icon | + | |Trace Icon||Information Gathering||Data Processing |
|} | |} | ||
− | |rowspan=" | + | |rowspan="4"| |
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | ||
|+style="color:black;"|NOISE AND MATRIX USE | |+style="color:black;"|NOISE AND MATRIX USE | ||
Line 114: | Line 116: | ||
|- | |- | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
+ | !style="background:black;color:gold;"|FUNCTION | ||
+ | !style="background:black;color:gold;"|LIMIT | ||
|- | |- | ||
− | |Control Device | + | |Control Device||Device Manipulation||Data Processing* |
|- | |- | ||
− | |Matrix Search | + | |Matrix Search||Information Gathering||Data Processing |
|} | |} | ||
+ | *Control Device may or may not use Data Processing as its limit | ||
|- | |- | ||
| | | | ||
Line 125: | Line 130: | ||
|- | |- | ||
!style="background:black;color:gold;"|ACTION | !style="background:black;color:gold;"|ACTION | ||
+ | !style="background:black;color:gold;"|FUNCTION | ||
+ | !style="background:black;color:gold;"|LIMIT | ||
|- | |- | ||
− | |Change Icon | + | |Change Icon||Misc||Data Processing |
|- | |- | ||
− | |Jack Out | + | |Jack Out||Misc||Firewall |
|- | |- | ||
− | |Invite Mark | + | |Invite Mark||Mark Manipulation||Data Processing |
|- | |- | ||
− | |Send Message | + | |Send Message||Misc||Data Processing |
|- | |- | ||
− | |Switch Interface Mode | + | |Switch Interface Mode||Misc||Data Processing |
+ | |} | ||
+ | |- | ||
+ | | | ||
+ | {|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;" | ||
+ | |+style="color:black;"|INTERRUPT ACTIONS | ||
+ | |- | ||
+ | !style="background:black;color:gold;"|ACTION | ||
+ | !style="background:black;color:gold;"|FUNCTION | ||
+ | !style="background:black;color:gold;"|LIMIT | ||
+ | |- | ||
+ | |Full Matrix Defense||Matrix Combat||Firewall | ||
|} | |} | ||
|} | |} |
Revision as of 18:38, 3 April 2016
5th Edition Lists |
---|
Gear // Magic // Hacking // Skills // Qualities // Packs // Creatures |
|
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
*Control Device may or may not use Data Processing as its limit | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Technomancer Actions
|
|