Difference between revisions of "Hacker"
From Infinity
Line 1: | Line 1: | ||
− | {{section- | + | {{section-hacking}} |
{{section-special-skills}} | {{section-special-skills}} | ||
Line 15: | Line 15: | ||
− | [[Category: | + | [[Category: Hacking]] |
Revision as of 10:43, 16 September 2020
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
CC Special Skills Charts Legend | Berserk | Bioimmunity | Booty | Camouflage & Camouflaged State | Chain of Command | Climbing Plus | Combat Jump | Commlink | Courage | Counterintelligence | Decoy | Doctor | Dogged | Engineer | Exrah | Explode | Forward Deployment | Forward Observer | Frenzy | G: Jumper | Guard | Hacker | Hidden Deployment & Hidden Deployment State | Immunity | Impersonation & Impersonation State | Impetuous | Infiltration | Inspiring Leadership | Lieutenant | Marksmanship | Martial Arts | MetaChemistry | Mimetism | Minelayer | Mnemonica | Morpho-Scan | Natural Born Warrior | NCO | Neurocinetics | No Wound Incapacitation | Non-Hackable | Number 2 | Parachutist | Paramedic | Peripheral | Pilot | Protheion | Regeneration | Religious Troop | Remdriver | Remote Presence | Request Reinforcements | Sapper & Foxhole State | Seed-Embryo | Sensor | Shasvastii & Shasvastii-Embryo State | Sixth Sense | Specialist Operative | Strategic Deployment | Stealth | Strategos | Super-Jump | Surprise Attack | Tactical Awareness | Terrain | Total Reaction | Transmutation | Tri-Core | Triangulated Fire | Veteran | Vulnerability
HACKER | AUTOMATIC SKILL |
Obligatory |
Effects
- Hackers are equipped with a Hacking Device that allows them to use Hacking Programs, according to the type of Hacking Device they carry.
- Hackers may be equipped with a Hacking Device that will grant them access to certain Hacking Programs, depending on the type of Device they are using, or to make direct use of certain Programs without requiring a device.
- Hackers may have Upgrade Programs assigned to them.