Page 58 - World of Darkness
P. 58

Roll Results                                       Example: Later, Greg tries to hack into the network of
                Dramatic Failure: Your character has caused a sys-  the city’s Department of Motor Vehicles. The DMV network
             tem crash, interrupting any work in progress and forcing  doesn’t have a sysadmin on duty, so the task is an extended
             him to start his efforts from scratch. Data may be lost at  roll. The network’s basic security software requires six
             the Storyteller’s discretion.                   successes to be overcome, so Greg simply needs to keep
                Failure: The task your character attempts to execute  hacking at the system (and not suffer any dramatic failures)
             does not go off properly or the database query he makes  to get in.
             returns no useful information.
                Success: Your character’s function executes properly  Roll Results
             or his queries come back with the correct information.  Dramatic Failure: A dramatic failure on the part of
                Exceptional Success: Your character’s program or  the hacker indicates that he’s been kicked out of the net-
             function executes more quickly and efficiently than ex-  work and can’t access it again for 24 hours. Worse, if a
             pected.                                         sysadmin contests the task, make another Intelligence +
                                                             Computer roll to determine if the admin manages to gain
             Hacking                                         the IP address of the hacker. A dramatic failure on the
                Dice Pool: Intelligence + Computer + equipment  part of the sysadmin indicates that the hacker brushes aside
             versus Intelligence + Computer + equipment      his efforts and penetrates the network automatically.
                Action: Extended and contested (5-10+ successes;  Failure: Your character does not succeed in making
             each roll represents 30 minutes of programming)  any headway in his effort.
                Gaining root access to a network requires talent, cre-  Success: Your character makes progress in his effort.
             ativity and patience, and often results in a battle of wits  Exceptional Success: Your character has found a
             with the system’s administrator(s). Before the hacking  vulnerability he can exploit against his opponent, giving
             attempt begins, the Storyteller determines the network’s  him a substantial advantage (as reflected in the number
             level of security. If there is a system administrator on duty,  of successes you achieve in one roll).
             the hacking attempt is an extended and contested action.  Suggested Equipment: High-performance computer
             If the network is protected by basic security software alone,  (+1 to +3), broadband Internet access (+1), disk of scripts
             the task is simply an extended action.          (+2), system passwords (+3)
                In a contested and extended action between hacker  Possible Penalties: Outdated computer system (-2),
             and sysadmin, roll Intelligence + Computer + any equip-  slow Internet connection (-3)
             ment modifiers for both participants. The winner is the
             first to accumulate the required number of successes. The  Crafts
             hacker needs to accumulate a number of successes equal
             to the network’s basic security setup. This can be any-  Howard pressed the carving tool gently against the
             where from five to 10 based on the sophistication of the  smoothly spinning wood, shaving off a steady curl of pine
             network. The sysadmin needs to accumulate a number of  with the whispery, scratching sound that he once loved. He
             successes equal to the hacker’s Intelligence + Computer.  hadn’t been down in his workshop since Angela died. He’d
             If the hacker wins, he gains unfettered access to the net-  forgotten how much he enjoyed working with his hands.
             work. If the sysadmin wins, he kicks the hacker out of the  He heard the basement door open, and Martha’s voice,
             network and can block any further attempts from that  heavy as lead, sank down the stairs. “Dad? What are you
             invader that day.                               doing down there?”
                Example: Greg is hacking into the network of a local  “Just a quick project, hon,” he called back over his
             financial group, which is protected by an on-duty sysadmin.  shoulder. “Should be done in a few more minutes.”
             Greg’s Intelligence is 4, his Computer is 3 and he’s using an
             average computer setup (no bonus dice). The sysadmin’s  “Okay. Listen… I’m going to start cleaning out mom’s
             Intelligence is 3, his Computer is 3 and he’s using a decent  stuff. I could use some help.”
             system that gives him a +1 modifier. The network’s basic  Howard put down the carving tool and switched off the
             security software requires seven successes to be overcome.  lathe. He tried to keep his voice even. “I’ve got to go out for
             The sysadmin also needs to accumulate seven successes (the  a while today. Can it wait till I get back?”
             total of Greg’s Intelligence + Computer). The first rolls net  Not waiting for an answer, he undid the clamps and
             three successes for Greg and two successes for the sysadmin.  pulled the chair leg from the lathe. The end was now tapered
             Greg needs to gain four more successes to make it past the  to a fine, strong point.
             sysadmin and gain access, while the sysadmin needs to
             accumulate five more successes to kick the intruder out of his  Crafts represents a character’s training or experience
             network.                                        in creating works of physical art or construction with his
                                                             hands, from paintings to car engines to classical sculp-
                If the network is protected by basic security software  ture. Characters possessing this Skill typically have the
             alone, the hacker needs to accumulate a number of suc-  knowledge, but not necessarily the tools or facilities to
             cesses equal to the network’s basic security setup, as above.
                                                             make use of their capabilities. A character might be an

                                                                                                                   57
                                                              MENTAL SKILLS- COMPUTER-CRAFTS
   53   54   55   56   57   58   59   60   61   62   63