Difference between revisions of "Hacking Device"
From Infinity
(PDF 2.1) |
|||
Line 12: | Line 12: | ||
*They do not require LoF to act, unless the Hacking Program's own description states otherwise. | *They do not require LoF to act, unless the Hacking Program's own description states otherwise. | ||
{{n4list}} | {{n4list}} | ||
− | * Only Troopers or Peripherals in Model form may be targeted by Hacking Programs. | + | {{update | PDF 2.1, July 2023}} |
+ | * Only Troopers in Model form may be targeted by Hacking Programs. | ||
+ | {{update-end}} | ||
+ | {{original}} | ||
+ | * Only Troopers {{originalhighlight}}or Peripherals{{originalhighlight-end}} in Model form may be targeted by Hacking Programs. | ||
+ | {{original-end}} | ||
{{n4end}} | {{n4end}} | ||
* They benefit, if applicable, from the target's [[Targeted]] State. | * They benefit, if applicable, from the target's [[Targeted]] State. | ||
Line 48: | Line 53: | ||
{{n4end}} | {{n4end}} | ||
{{n4list}} | {{n4list}} | ||
+ | |||
== Hacking Device == | == Hacking Device == | ||
{{skillbox |black| HACKING DEVICE | AUTOMATIC EQUIPMENT }} | {{skillbox |black| HACKING DEVICE | AUTOMATIC EQUIPMENT }} |
Latest revision as of 14:52, 11 October 2023
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
360º Visor | AI Motorcycle | Albedo | Baggage | Biometric Visor | Cube | Dazer | Deactivator | Deployable Repeater | ECM | Escape System | FastPanda | Firewall | GizmoKit | Hacking Device | HoloMask & HoloMask State | Holoprojector & Holoecho State | MediKit | Motorcycle | Multispectral Visor | Nanoscreen | Repeater | SymbioMate | TinBot | X-Visor
Hacking Devices are the tools used during cybercombat. Multipurpose and versatile, these devices can be useful as support elements or to perform powerful cyberattacks, depending on the Device.
Hacking Devices and Hacking Programs: Characteristics
Hacking Devices and Hacking Programs have the following characteristics:
- They act in the user's Hacking Area.
- They do not require LoF to act, unless the Hacking Program's own description states otherwise.
Update PDF 2.1, July 2023
- Only Troopers in Model form may be targeted by Hacking Programs.
Show original text.
Original
- Only Troopers or Peripherals in Model form may be targeted by Hacking Programs.
- They benefit, if applicable, from the target's Targeted State.
Device | Program 1 | Program 2 |
---|---|---|
Hacking Device | Carbonite | Spotlight |
HACKING DEVICE | AUTOMATIC EQUIPMENT |
Comms Equipment |
Effects
- Allows the use of the Carbonite and Spotlight Hacking Programs.
Device | Program 1 | Program 2 | Program 3 | Program 4 | Program 6 | Program 6 |
---|---|---|---|---|---|---|
Hacking Device | Carbonite | Spotlight | Total Control | Oblivion | -- | -- |
Hacking Device Plus | Carbonite | Spotlight | Total Control | Oblivion | White Noise | Cybermask |
Killer Hacking Device | Trinity | Cybermask | -- | -- | -- | -- |
EVO Hacking Device | Assisted Fire | Enhanced Reaction | Fairy Dust | Controlled Jump | -- | -- |
Hacking Device
HACKING DEVICE | AUTOMATIC EQUIPMENT |
Comms Equipment |
Effects
- Allows the use of the Carbonite, Oblivion, Spotlight and Total Control Hacking Programs.
Hacking Device Plus
HACKING DEVICE PLUS | AUTOMATIC EQUIPMENT |
Comms Equipment |
Effects
- Allows the use of the Carbonite, Cybermask, Oblivion, Spotlight, Total Control and White Noise Hacking Programs.
Killer Hacking Device
KILLER HACKING DEVICE | AUTOMATIC EQUIPMENT |
Comms Equipment |
Effects
- Allows the use of the Cybermask and Trinity Hacking Programs.
EVO Hacking Device
EVO HACKING DEVICE | AUTOMATIC EQUIPMENT |
Comms Equipment |
Effects
- Allows the use of the Assisted Fire, Controlled Jump, Enhanced Reaction and Fairy Dust Hacking Programs.
REMEMBER
Both Hackers and Hacking Devices may benefit from Upgrades.