
You know your way around computers and nothing excites you more than learning a new operating system. Computers are not just useful tools, but they can aid their users and pave the way for how we process information. You appreciate this better than anyone and want nothing more than to use your talents to exploit, write, and hack your way into a new future.
- Skill Proficiencies: Investigation, Sleight of Hand
- Tool Proficiencies: Thieves Tools (Hacker Tools)
- Equipment: thieves' tools, a personal comms device, a set of common clothes, and a pouch containing 10 gp
To determine the origin of your training with computers and hacking materials, roll a d6 or choose from the options in the table below.
d6 | Binary Code |
---|---|
1 | University - Graduate, but no practical experience |
2 | Military |
3 | Criminal/Professional |
4 | Research Station |
5 | Corporate Vessel |
6 | Security Company |
Your love of computers, mainframes, and operating systems has given you insight to the code and the ability to manipulate it. You have procured yourself a set of thieves tools that are specifically used for slicing into computer systems, giving you the opportunity to change the algorithm to gain access, close someone out, or to spread a virus. You've also learned how to write these viruses so long as you have the correct formulas and have studied them. The DC for creating a virus will depend on the severity or complication that the virus is intended to do. The list below lists the types of viruses a Slicer can create and attempt to upload to a system.
- Boot Sector Virus (DC 15) - One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system. Effect - The next time this computer is restarted or turned on, it will become inoperable for 1 minute.
- Overwrite Virus (DC 17) - As the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs. Effect - All files of a system will begin a slow cascade over a 3 day period, resulting in this terminal becoming inoperable.
- Direct Action Virus (DC 20) - This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Effect - You can choose to target one function that this computer controls (ex. Sensors, Security Doors, Cameras) and disable it for an hour.
- Browser Hijacker Virus (DC 22) - This virus targets the terminals display and allows the hacker to remotely take control of the terminal. Effect - For 1 hour you can take complete control of a terminal and execute programs from your personal comms device.
- Network Virus (DC 25) - This virus targets all of the computers connected by a network, typically those apart of the same building or ship, granting the ability to keep track of all users and their actions without them realizing it. Effect - You have the ability to scry on any terminal on a designated network for up to 24 hours.
Counter Hack - You have also learned the art of counter hacking. You can use your Hacking Tools to counter any hacked system infected with a virus. The DC is the same for each virus as its creation DC.
Suggested Characteristics
Slicers are defined by their extensive knowledge of using computers to aid them in their day to day, but also in the ability to effect those systems with code. Because of their affinity for codes, they often find themselves living by one themselves. This code could be one of conduct, or could be interpreted a bit looser, as experts in this field can be both protective and dangerous. Secure or Criminal.
d8 | Personality Trait |
---|---|
1 | I sometimes speak in binary code when I'm frustrated or embarrassed. 1101000110 |
2 | I’ve been known to brag about the systems I've sliced into. |
3 | I’m used to helping out those who aren’t as smart as I am, and I patiently explain anything and everything to others. |
4 | There’s nothing I like more than a good mystery. |
5 | I’m willing to listen to every side of an argument before I make my own judgment. |
6 | I'm a social butterfly. No seriously. Look at how many followers I have in chat! |
7 | My relationship with computers has made me horribly, horribly awkward in social situations. |
8 | I sometimes pretend to be my favorite characters from media because I'm just not as cool. |
d6 | Ideal |
---|---|
1 | Knowledge. I need to know everything, but especially what they don't want me to know.. (Chaotic) |
2 | Honor. I don't steal from others in the trade. (Lawful) |
3 | Justice: I use my skills to expose how the big corporations exploit the little guy. (Good) |
4 | No Limits. Privacy is a construct that has no place in the universe. (Chaotic) |
5 | Entertainment. I want to use my skills to make life a little easier on folks who have had a hard day. (Neutral) |
6 | Control. If you can control the system, you can control the world. (Evil) |
d6 | Bond |
---|---|
1 | It is my duty to protect my companions by ensuring their computers are serviced. |
2 | I have a data drive with a terrible secrets that must not fall into the wrong hands. |
3 | I like tinkering with old systems and terminals cause they remind me of home. |
4 | My life’s work is a program that will eventually provide us with the ultimate experience. |
5 | I’ve been searching my whole life to learn who a mysterious hacker is in real life. |
6 | I inadvertently sliced into the wrong account and it caused several people to lose their life's savings. I'm still trying to atone for this. |
d6 | Flaw |
---|---|
1 | I am easily distracted by the promise of information. |
2 | Even though I work extensively with electronics, I have a fear of anything electrical. |
3 | Unlocking an ancient mystery is worth the price of a civilization. |
4 | I overlook obvious solutions in favor of complicated ones. |
5 | I speak without really thinking through my words, invariably insulting others. |
6 | I can’t keep a secret to save my life, or anyone else’s. |

Comments