Difference between revisions of "Hacking Device"
From Infinity
(N5 first version.) |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | {{section-hacking}} | + | {{n5-section-hacking}} |
− | {{section-equipment}} | + | {{n5-section-equipment}} |
Hacking Devices are the tools used during cybercombat. Multipurpose and versatile, these devices can be useful as support elements or to perform powerful cyberattacks, depending on the Device. | Hacking Devices are the tools used during cybercombat. Multipurpose and versatile, these devices can be useful as support elements or to perform powerful cyberattacks, depending on the Device. | ||
− | |||
− | Hacking | + | {{see-also-start}} |
+ | From [[Quantronic_Combat_(Hacking)#Hacking_Devices_and_Hacking_Programs:_Characteristics | Quantronic Combat (Hacking)]]. | ||
− | *They act in the user's Hacking Area. | + | [[Hacking Device]]s and Hacking Programs have the following characteristics: |
− | *They do not require LoF to act, unless the Hacking Program's own description states otherwise. | + | *They act in the user's [[Hacking Area]]. |
− | + | *They do not require [[LoF]] to act, unless the Hacking Program's own description states otherwise. | |
− | * Only Troopers | + | * Only Troopers in Model form may be targeted by [[Hacking Program]]s. |
− | |||
* They benefit, if applicable, from the target's [[Targeted]] State. | * They benefit, if applicable, from the target's [[Targeted]] State. | ||
+ | {{see-also-end}} | ||
− | + | {| class="n5table-dark" | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | {| class=" | ||
|- | |- | ||
! Device !! Program 1 !! Program 2 !! Program 3 !! Program 4 !! Program 6 !! Program 6 | ! Device !! Program 1 !! Program 2 !! Program 3 !! Program 4 !! Program 6 !! Program 6 | ||
Line 45: | Line 29: | ||
|} | |} | ||
− | |||
− | |||
− | |||
== Hacking Device == | == Hacking Device == | ||
− | {{ | + | {{css_skillbox |black| HACKING DEVICE | EQUIPMENT }} |
{{skill-label | Comms Equipment }} | {{skill-label | Comms Equipment }} | ||
{{effects}} | {{effects}} | ||
− | * Allows the use of the [[Carbonite]], [[Oblivion]], [[Spotlight]] and [[Total Control]] [[Hacking | + | * Allows the use of the [[Carbonite]], [[Oblivion]], [[Spotlight]], and [[Total Control]] [[Hacking Program]]s. |
+ | {{css_skillbox-end}} | ||
== Hacking Device Plus == | == Hacking Device Plus == | ||
− | {{ | + | {{css_skillbox |black| HACKING DEVICE PLUS | EQUIPMENT }} |
{{skill-label | Comms Equipment }} | {{skill-label | Comms Equipment }} | ||
{{effects}} | {{effects}} | ||
− | * Allows the use of the [[Carbonite]], [[Cybermask]], [[Oblivion]], [[Spotlight]], [[Total Control]] and [[White Noise]] [[Hacking | + | * Allows the use of the [[Carbonite]], [[Cybermask]], [[Oblivion]], [[Spotlight]], [[Total Control]], and [[White Noise]] [[Hacking Program]]s. |
+ | {{css_skillbox-end}} | ||
== Killer Hacking Device == | == Killer Hacking Device == | ||
− | {{ | + | {{css_skillbox |black| KILLER HACKING DEVICE | EQUIPMENT }} |
{{skill-label | Comms Equipment }} | {{skill-label | Comms Equipment }} | ||
{{effects}} | {{effects}} | ||
− | * Allows the use of the [[Cybermask]] and [[Trinity]] [[Hacking | + | * Allows the use of the [[Cybermask]] and [[Trinity]] [[Hacking Program]]s. |
+ | {{css_skillbox-end}} | ||
== EVO Hacking Device == | == EVO Hacking Device == | ||
− | {{ | + | {{css_skillbox |black| EVO HACKING DEVICE | EQUIPMENT }} |
{{skill-label | Comms Equipment }} | {{skill-label | Comms Equipment }} | ||
{{effects}} | {{effects}} | ||
− | * Allows the use of the [[Assisted Fire]], [[Controlled Jump]], [[Enhanced Reaction]] and [[Fairy Dust]] | + | * Allows the use of the [[Assisted Fire]], [[Controlled Jump]], [[Enhanced Reaction]], and [[Fairy Dust]] [[Hacking Program]]s. |
+ | {{css_skillbox-end}} | ||
+ | {{remember-start}} | ||
+ | Both Hackers and Hacking Devices may benefit from [[Quantronic_Combat_(Hacking)#Upgrade_Programs_.28UPGRADE.29 | Upgrades]]. Check all the rules on [[Hacking]]. | ||
+ | {{remember-end}} | ||
− | |||
+ | |||
+ | {{n5-section-hacking}} | ||
+ | {{n5-section-equipment}} | ||
[[Category:Hacking]] | [[Category:Hacking]] | ||
+ | |||
+ | <!-- Label and Trait categories. --> | ||
+ | [[Category: Comms Equipment ]] |
Latest revision as of 16:00, 27 March 2025
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Hacking ProgramsAssisted Fire | Carbonite | Controlled Jump | Cybermask | Enhanced Reaction | Fairy Dust | Oblivion | Spotlight | Total Control | Trinity | White Noise | Zero Pain
360º Visor | AI Motorcycle | Albedo | Baggage | Bangbomb | Biometric Visor | Cube | Dazer | Deactivator | Deployable Cover | Deployable Repeater | ECM | FastPanda | Firewall | GizmoKit | Hacking Device | HoloMask | Holoprojector | MediKit | Motorcycle | Multispectral Visor | Nanoscreen | Repeater | SymbioMate | TinBot | X-Visor
Hacking Devices are the tools used during cybercombat. Multipurpose and versatile, these devices can be useful as support elements or to perform powerful cyberattacks, depending on the Device.
SEE ALSO
From Quantronic Combat (Hacking).
Hacking Devices and Hacking Programs have the following characteristics:
- They act in the user's Hacking Area.
- They do not require LoF to act, unless the Hacking Program's own description states otherwise.
- Only Troopers in Model form may be targeted by Hacking Programs.
- They benefit, if applicable, from the target's Targeted State.
Device | Program 1 | Program 2 | Program 3 | Program 4 | Program 6 | Program 6 |
---|---|---|---|---|---|---|
Hacking Device | Carbonite | Spotlight | Total Control | Oblivion | -- | -- |
Hacking Device Plus | Carbonite | Spotlight | Total Control | Oblivion | White Noise | Cybermask |
Killer Hacking Device | Trinity | Cybermask | -- | -- | -- | -- |
EVO Hacking Device | Assisted Fire | Enhanced Reaction | Fairy Dust | Controlled Jump | -- | -- |
Hacking Device
HACKING DEVICE
EQUIPMENT
EFFECTS
- Allows the use of the Carbonite, Oblivion, Spotlight, and Total Control Hacking Programs.
Hacking Device Plus
HACKING DEVICE PLUS
EQUIPMENT
EFFECTS
- Allows the use of the Carbonite, Cybermask, Oblivion, Spotlight, Total Control, and White Noise Hacking Programs.
Killer Hacking Device
KILLER HACKING DEVICE
EQUIPMENT
EVO Hacking Device
EVO HACKING DEVICE
EQUIPMENT
EFFECTS
- Allows the use of the Assisted Fire, Controlled Jump, Enhanced Reaction, and Fairy Dust Hacking Programs.
REMEMBER
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Hacking ProgramsAssisted Fire | Carbonite | Controlled Jump | Cybermask | Enhanced Reaction | Fairy Dust | Oblivion | Spotlight | Total Control | Trinity | White Noise | Zero Pain
360º Visor | AI Motorcycle | Albedo | Baggage | Bangbomb | Biometric Visor | Cube | Dazer | Deactivator | Deployable Cover | Deployable Repeater | ECM | FastPanda | Firewall | GizmoKit | Hacking Device | HoloMask | Holoprojector | MediKit | Motorcycle | Multispectral Visor | Nanoscreen | Repeater | SymbioMate | TinBot | X-Visor