Difference between revisions of "ExMod/ModernAbyssalComputers"
m (two charms) |
(Posted some Abyssal hacker charms please comment) |
||
Line 21: | Line 21: | ||
With growth of understanding of how to draw in the weak-minded, the Abyssal can strike with a blade of words, that saps the strength from the one it targets. The Abyssal rolls Manipulation + Computers resisted by the victim's Willpower. Should the Abyssal win, the victim loses willpower equal to the number of successes the Abyssal had over them. If the victim loses all temporary willpower, their soul burns with a cold mixture of hatred and self-loathing. They do not regain willpower and may harm themselves as long as they suffer. They must make a successful Convction roll at difficulty 2 to break out of the soul burn. | With growth of understanding of how to draw in the weak-minded, the Abyssal can strike with a blade of words, that saps the strength from the one it targets. The Abyssal rolls Manipulation + Computers resisted by the victim's Willpower. Should the Abyssal win, the victim loses willpower equal to the number of successes the Abyssal had over them. If the victim loses all temporary willpower, their soul burns with a cold mixture of hatred and self-loathing. They do not regain willpower and may harm themselves as long as they suffer. They must make a successful Convction roll at difficulty 2 to break out of the soul burn. | ||
---- | ---- | ||
+ | ---- | ||
+ | by [[flymolo]] | ||
+ | |||
+ | |||
+ | <i>Malign Technology Gods</i> | ||
+ | Cost: 5m | ||
+ | Type: Simple | ||
+ | Dur: One Scene | ||
+ | Preq: Computer 3 Essence 2 | ||
+ | |||
+ | Choose either a target person or a target computer. All computer use rolls made by that person/ on that computer are diminished by the Abyssals Computer+Essence. The abyssal can choose to exclude all abyssals or no one but not just himself. | ||
+ | ---- | ||
+ | <i>Computer Necromancy Prana</i> | ||
+ | Cost: 10m+1w | ||
+ | Type: Simple | ||
+ | Dur: Permanent | ||
+ | Preq: Computer 2 Essence 3 | ||
+ | |||
+ | This allows an abyssal to assemble a working computer from dead/incompatible parts. A dead computer | ||
+ | cannot use media from a live one unless it is broken first. A dead computer can listen to data from | ||
+ | a live network over a broken cable, but cannot participate. All computer use rolls on a dead computer | ||
+ | are increased by 2 difficulty. | ||
+ | ---- | ||
+ | <i>Ghost in the Machine</i> | ||
+ | Cost: 7m+1w | ||
+ | Type: Simple | ||
+ | Dur: Instant | ||
+ | Preq: Computer 4 Essence 3 | ||
+ | Charms Required: Malign Tech Gods, Computer Necromancy Prana | ||
+ | |||
+ | This charm binds a ghost into a target computer. The ghost must be willing or be fought per demon rules (willpower+essence first to get 3 successes over the other). The ghost is able to control all workings | ||
+ | of the computer. This charm gives the abyssal no more control of the ghost than he previously had, but | ||
+ | only the abyssal or destroying the computer can release the ghost. | ||
+ | ---- | ||
+ | <i>Speaking With Dead Data</i> | ||
+ | Cost: 5m | ||
+ | Type: Simple | ||
+ | Dur: A number Of Questions | ||
+ | Preq: Computer 3 Essence 3 | ||
+ | |||
+ | This charm allows the abyssal to get accurate answers on the previous contents of a device. | ||
+ | The abyssal may ask a number of questions equal to his sucesses on a Manipulation+Computer roll. | ||
+ | The abyssal may take any length of time to ask these question but the essence is committed for the | ||
+ | entire duration. This charm may one be used one per day per computer. | ||
+ | ---- | ||
+ | <i>Log corroding Presence</i> | ||
+ | Cost: 3m+1w | ||
+ | Type: Simple | ||
+ | Dur: One Scene | ||
+ | Preq: Computer 4 Essence 4 | ||
+ | Charms Required: Speaking With Dead Data | ||
+ | |||
+ | All logs and security information based upon the abyssals computer use are faulty. The logs are Abyssal's | ||
+ | Essence*10% faultly. This increases the difficulty of any rolls applying to his use by Abyssal's Essence. | ||
+ | The abyssal may attempt to target certain traits of his computer use (IP, login name, times, activities, files changed, files added, files deleted) | ||
+ | by making a difficulty 5 Wits+Computer roll. This means the faulty messages are applied there first. | ||
+ | ---- | ||
+ | <i>Eroding Data Technique</i> | ||
+ | Cost: 10m | ||
+ | Type: Simple | ||
+ | Dur: Instant | ||
+ | Preq: Computer 5 Essence 4 | ||
+ | Charm Required: Log Corroding Technique | ||
+ | |||
+ | This charm corrupts all data on target computer. All data seems accurate at first glance. To detect | ||
+ | the changes in a file requires Perception+appropriate skill difficulty 3. Relying on the corrupt data | ||
+ | increases the difficulty of any roll by 2. Using the data directly results in botches on appropriate | ||
+ | rolls equal to the abyssals permanent essence at time of casting. Original data can be accessed using | ||
+ | Speaking with Dead Data. |
Latest revision as of 22:47, 7 February 2005
by haren
Calling the Wayward Sheep</b>
<b>Cost: 4 motes, 1 willpower Duration: Instant Type: Simple Minimum Computers: 3 Minimum Essence: 2 Prerequisites: None
By drawing upon their understanding of the Internet and those who dwell there, an Abyssal can draw attention and infamy. They craft a message to place on a public area that is a directed attack at someone of respect in that place. Their words are filled with a kind of dark righteousness that appeals to those without friends or will of their own. Anyone who reads the message and was not personally attacked in it, finds themself rolling against a difficulty of the Abyssal's Essence to resist agreeing with the ideas in the message. Such is how the Abyssal gains followers without even seeing them.
Messages of Burning Words</b>
<b>Cost: 6 motes, 1 willpower Duration: Instant Type: Simple Minimum Computers: 4 Minimum Essence: 2 Prerequisites: Calling the Wayward Sheep
With growth of understanding of how to draw in the weak-minded, the Abyssal can strike with a blade of words, that saps the strength from the one it targets. The Abyssal rolls Manipulation + Computers resisted by the victim's Willpower. Should the Abyssal win, the victim loses willpower equal to the number of successes the Abyssal had over them. If the victim loses all temporary willpower, their soul burns with a cold mixture of hatred and self-loathing. They do not regain willpower and may harm themselves as long as they suffer. They must make a successful Convction roll at difficulty 2 to break out of the soul burn.
by flymolo
Malign Technology Gods
Cost: 5m Type: Simple Dur: One Scene Preq: Computer 3 Essence 2
Choose either a target person or a target computer. All computer use rolls made by that person/ on that computer are diminished by the Abyssals Computer+Essence. The abyssal can choose to exclude all abyssals or no one but not just himself.
Computer Necromancy Prana
Cost: 10m+1w Type: Simple Dur: Permanent Preq: Computer 2 Essence 3
This allows an abyssal to assemble a working computer from dead/incompatible parts. A dead computer cannot use media from a live one unless it is broken first. A dead computer can listen to data from a live network over a broken cable, but cannot participate. All computer use rolls on a dead computer are increased by 2 difficulty.
Ghost in the Machine
Cost: 7m+1w Type: Simple Dur: Instant Preq: Computer 4 Essence 3 Charms Required: Malign Tech Gods, Computer Necromancy Prana
This charm binds a ghost into a target computer. The ghost must be willing or be fought per demon rules (willpower+essence first to get 3 successes over the other). The ghost is able to control all workings of the computer. This charm gives the abyssal no more control of the ghost than he previously had, but only the abyssal or destroying the computer can release the ghost.
Speaking With Dead Data
Cost: 5m Type: Simple Dur: A number Of Questions Preq: Computer 3 Essence 3
This charm allows the abyssal to get accurate answers on the previous contents of a device. The abyssal may ask a number of questions equal to his sucesses on a Manipulation+Computer roll. The abyssal may take any length of time to ask these question but the essence is committed for the entire duration. This charm may one be used one per day per computer.
Log corroding Presence
Cost: 3m+1w Type: Simple Dur: One Scene Preq: Computer 4 Essence 4 Charms Required: Speaking With Dead Data
All logs and security information based upon the abyssals computer use are faulty. The logs are Abyssal's Essence*10% faultly. This increases the difficulty of any rolls applying to his use by Abyssal's Essence. The abyssal may attempt to target certain traits of his computer use (IP, login name, times, activities, files changed, files added, files deleted) by making a difficulty 5 Wits+Computer roll. This means the faulty messages are applied there first.
Eroding Data Technique
Cost: 10m Type: Simple Dur: Instant Preq: Computer 5 Essence 4 Charm Required: Log Corroding Technique
This charm corrupts all data on target computer. All data seems accurate at first glance. To detect the changes in a file requires Perception+appropriate skill difficulty 3. Relying on the corrupt data increases the difficulty of any roll by 2. Using the data directly results in botches on appropriate rolls equal to the abyssals permanent essence at time of casting. Original data can be accessed using Speaking with Dead Data.