NOTICE: Infinity N5.2 and FAQ 5.0.0
The wiki currently uses the N5.1.1 rules. Until it has been updated, please download the N5.2 rules PDF and v5.0.0 FAQ from the Rules section of https://infinityuniverse.com/resources/infinity.
Difference between revisions of "Hacker"
From Infinity
| Line 6: | Line 6: | ||
{{skill-label | Obligatory}} | {{skill-label | Obligatory}} | ||
{{Effects}} | {{Effects}} | ||
| + | {{c1}} | ||
*Hackers are equipped with a Hacking Device that allows them to use Hacking Programs, according to the type of Hacking Device they carry. | *Hackers are equipped with a Hacking Device that allows them to use Hacking Programs, according to the type of Hacking Device they carry. | ||
| − | + | {{c1end}} | |
| + | {{n4list}} | ||
| + | * Hackers may be equipped with a Hacking Device that will grant them access to certain Hacking Programs, depending on the type of Device they are using, or to make direct use of certain Programs without requiring a device. | ||
| + | * Hackers may have Upgrade Programs assigned to them. | ||
| + | {{n4end}} | ||
[[Category: Combat Module]] | [[Category: Combat Module]] | ||
Revision as of 17:04, 12 September 2020
Combat Module Intro || Damage | Saving Rolls | Wounds and Structure | Unconscious | Dead | Guts Rolls || Ballistic Skills | BS Attack | Template Weapons and Equipment | Direct Template Weapons | Impact Template Weapons | Ranged Weapon Profile | Speculative Attack | Intuitive Attack || Close Combat | CC Attack | Engaged State | Melee Weapon Profile || Quantronic Combat (Hacking)
CC Special Skills Charts Legend | Berserk | Bioimmunity | Booty | Camouflage & Camouflaged State | Chain of Command | Climbing Plus | Combat Jump | Commlink | Courage | Counterintelligence | Decoy | Doctor | Dogged | Engineer | Exrah | Explode | Forward Deployment | Forward Observer | Frenzy | G: Jumper | Guard | Hacker | Hidden Deployment & Hidden Deployment State | Immunity | Impersonation & Impersonation State | Impetuous | Infiltration | Inspiring Leadership | Lieutenant | Marksmanship | Martial Arts | MetaChemistry | Mimetism | Minelayer | Mnemonica | Morpho-Scan | Natural Born Warrior | NCO | Neurocinetics | No Wound Incapacitation | Non-Hackable | Number 2 | Parachutist | Paramedic | Peripheral | Pilot | Protheion | Regeneration | Religious Troop | Remdriver | Remote Presence | Request Reinforcements | Sapper & Foxhole State | Seed-Embryo | Sensor | Shasvastii & Shasvastii-Embryo State | Sixth Sense | Specialist Operative | Strategic Deployment | Stealth | Strategos | Super-Jump | Surprise Attack | Tactical Awareness | Terrain | Total Reaction | Transmutation | Tri-Core | Triangulated Fire | Veteran | Vulnerability
| HACKER | AUTOMATIC SKILL |
EFFECTS
- Hackers are equipped with a Hacking Device that allows them to use Hacking Programs, according to the type of Hacking Device they carry.
- Hackers may be equipped with a Hacking Device that will grant them access to certain Hacking Programs, depending on the type of Device they are using, or to make direct use of certain Programs without requiring a device.
- Hackers may have Upgrade Programs assigned to them.