Professional Documents
Culture Documents
Find File: The DC and the time required to locate a file on To identify the intruder, make an opposed Technology
an unfamiliar system are determined by the size of the site. check. If the check succeeds, you learn the site from which
Finding public information on the Internet does not fall the intruder is operating (if it’s a single computer, you learn
under this category; this only pertains to finding files on the name of the computer’s owner). Identifying the intrud-
unfamiliar computer systems. er requires 1 minute and is a separate check from cutting
off access. This check can only be made if the intruder is
SCOPE OF SITE DC TIME accessing your site for the entire length of the check—if
the intruder’s session ends before you make the skill check,
Personal computer 10 1 round your attempt fails.
Small office network 15 2 rounds
Degrade Programming: You can destroy or alter pro-
Large office network 20 1 minute grams on a computer to make it harder or impossible to
Massive Network 25 10 minutes use. Crashing a computer simply shuts it down. Its user can
restart it without a skill check (however, restarting takes at
least 1 minute). Destroying programming makes the com-
Defeat Computer Security: The DC is determined by the
puter unusable until the programming is repaired. Damag-
quality of the security installed to defend the system. If the
ing programming imposes a –5 penalty on all checks made
check fails by more than one degree, the system immedi-
with the computer (sometimes this is preferable to destroy-
ately alerts its administrator there has been an unauthor-
ing the programming, since the user might not know any-
ized entry. An alerted administrator may attempt to iden-
thing is wrong, and won’t simply decide to use a different
tify you or cut off access to the system.
computer).
Sometimes, you have to defeat security at more than one Destroy program 15 10 minutes
stage of the operation. If you obtain three or more degrees Damage program 20 10 minutes
of success when attempting to defeat computer secu- Repair program 25 1 hour
rity, you automatically succeed at all subsequent security
Locate What You’re Looking For: To find the data (or ap-
plication, or remote device) you want, make a Technology
skill check.
Covering Your Tracks: This step is optional. By making a • Perform Task: Programs can perform a wide range of
Technology check (DC 20), you can alter your identifying tasks, from word processing and number-crunching
information. This imposes a major circumstance penalty to retrieving email or operating machines by remote.
(–5) on any attempt made to identify you if your activity Fairly routine computer use is covered by the simple
is detected. Feature of having a computer. More complex tasks,
such as remote control, can constitute additional
AUGMENTED REALITY
NAVIGATIONAL COMPUTER
An interim step between virtual reality and the mundane
Vehicles and even mobile devices can have a built- world is “augmented reality,” where virtual images or inter-
in navigational computer able to determine position faces overlay perceptions of the real world. This is common
(usually via connection to the Global Positioning Satel- for advanced computer systems able to project “virtual”
lite network) and plot routes to different known destina- controls on a touch surface or even in the open air (sensitive
tions. This is a Feature essentially the same as the Direc- to the user’s movements), giving the system a great deal of
tion Sense effect and includes the circumstance bonus flexibility in terms of user interface and responsiveness.
of the Navigation System listed for vehicles in Chapter 7
of the Hero’s Handbook. VIRTUAL NETWORKS
TACTICAL COMPUTER A virtual network translates the interactions of a com-
puter system into virtual symbols, such as a network as a
A tactical computer system links sensors to an expert vast city with datalines as “roads” and computer systems as
software package to rapidly calculate the most advan- structures. In this virtual “world” both authorized users and
tageous tactics on the battlefield, providing information hackers can carry out computer related tasks.
via a heads-up display (HUD) in a visor, for example. A tac-
M&M Gamemasters may wish to use a virtual network met-
tical computer system might provide various Enhanced
aphor in settings with sufficiently advanced technology, or
Advantage ranks in combat advantages from Improved
for characters with appropriate powers and equipment to
Initiative to Precise Attack or Favored Environment (for a
allow them to visualize their computer system interactions
pre-programmed environment or set of conditions).
in this way.
VIRTUAL WORLDS
With enough processing power and an effective inter-
face, a computer system could support an entire virtual
world (or even virtual universe). To the minds “inside” the
simulation it appears entirely real, even if events that take
place in the virtual world are unreal or difficult to believe
(potentially allowing for checks to find faults in the illu-
sion).
ARTIFICIAL INTELLIGENCE
An artificial intelligence (abbreviated “AI” ) is a type of con-
struct (see Constructs in Chapter 7 of the Hero’s Handbook
and Gadget Guide: Robots).
OPEN GAME LICENSE Version 1.0a 3. Offer and Acceptance: By Using the Open Game 12. Inability to Comply: If it is impossible for You to
Content You indicate Your acceptance of the terms of comply with any of the terms of this License with respect
The following text is the property of Wizards of the this License. to some or all of the Open Game Content due to statute,
Coast, Inc. and is Copyright 2000 Wizards of the Coast, judicial order, or governmental regulation then You may
Inc (“Wizards”). All Rights Reserved. 4. Grant and Consideration: In consideration for agree- not Use any Open Game Material so affected.
ing to use this License, the Contributors grant You a per-
1. Definitions: (a)”Contributors” means the copyright petual, worldwide, royalty-free, non-exclusive license 13. Termination: This License will terminate automati-
and/or trademark owners who have contributed Open with the exact terms of this License to Use, the Open cally if You fail to comply with all terms herein and fail to
Game Content; (b)”Derivative Material” means copyright- Game Content. cure such breach within 30 days of becoming aware of
ed material including derivative works and translations the breach. All sublicenses shall survive the termination
(including into other computer languages), potation, 5. Representation of Authority to Contribute: If of this License.
modification, correction, addition, extension, upgrade, You are contributing original material as Open Game
improvement, compilation, abridgment or other form Content, You represent that Your Contributions are Your 14. Reformation: If any provision of this License is held
in which an existing work may be recast, transformed original creation and/or You have sufficient rights to to be unenforceable, such provision shall be reformed
or adapted; (c) “Distribute” means to reproduce, license, grant the rights conveyed by this License. only to the extent necessary to make it enforceable.
rent, lease, sell, broadcast, publicly display, transmit or
otherwise distribute; (d)”Open Game Content” means the 6. Notice of License Copyright: You must update the 15. COPYRIGHT NOTICE
game mechanic and includes the methods, procedures, COPYRIGHT NOTICE portion of this License to include
processes and routines to the extent such content does the exact text of the COPYRIGHT NOTICE of any Open Open Game License v 1.0 Copyright 2000, Wizards of the
not embody the Product Identity and is an enhancement Game Content You are copying, modifying or distribut- Coast, Inc.
over the prior art and any additional content clearly iden- ing, and You must add the title, the copyright date, and
tified as Open Game Content by the Contributor, and the copyright holder’s name to the COPYRIGHT NOTICE System Reference Document, Copyright 2000, Wizards of
means any work covered by this License, including trans- of any original Open Game Content you Distribute. the Coast, Inc., Authors Jonathan Tweet, Monte Cook,
lations and derivative works under copyright law, but spe- Skip Williams, based on original material by E. Gary
cifically excludes Product Identity. (e) “Product Identity” 7. Use of Product Identity: You agree not to Use any Gygax and Dave Arneson.
means product and product line names, logos and iden- Product Identity, including as an indication as to com-
tifying marks including trade dress; artifacts; creatures patibility, except as expressly licensed in another, inde- Modern System Reference Document, Copyright 2002-
characters; stories, storylines, plots, thematic elements, pendent Agreement with the owner of each element of 2004, Wizards of the Coast, Inc.; Authors Bill Slavicsek,
dialogue, incidents, language, artwork, symbols, designs, that Product Identity. You agree not to indicate compat- Jeff Grubb, Rich Redman, Charles Ryan, Eric Cagle, David
depictions, likenesses, formats, poses, concepts, themes ibility or co-adaptability with any Trademark or Regis- Noonan, Stan!, Christopher Perkins, Rodney Thompson,
and graphic, photographic and other visual or audio rep- tered Trademark in conjunction with a work containing and JD Wiker, based on material by Jonathan Tweet,
resentations; names and descriptions of characters, spells, Open Game Content except as expressly licensed in Monte Cook, Skip Williams, Richard Baker, Peter Adkison,
enchantments, personalities, teams, personas, likenesses another, independent Agreement with the owner of Bruce R. Cordell, John Tynes, Andy Collins, and JD Wiker.
and special abilities; places, locations, environments, such Trademark or Registered Trademark. The use of
creatures, equipment, magical or supernatural abilities or any Product Identity in Open Game Content does not Mutants & Masterminds, Copyright 2002, Green Ronin
effects, logos, symbols, or graphic designs; and any other constitute a challenge to the ownership of that Product Publishing; Author Steve Kenson.
trademark or registered trademark clearly identified as Identity. The owner of any Product Identity used in Open
Product identity by the owner of the Product Identity, and Game Content shall retain all rights, title and interest in Advanced Player’s Manual, Copyright 2005, Green Ronin
which specifically excludes the Open Game Content; (f) and to that Product Identity. Publishing, LLC; Author Skip Williams.
“Trademark” means the logos, names, mark, sign, motto,
designs that are used by a Contributor to identify itself or 8. Identification: If you distribute Open Game Content Silver Age Sentinels d20, Copyright 2002, Guardians
its products or the associated products contributed to the You must clearly indicate which portions of the work of Order, Inc.; Authors Stephen Kenson, Mark C.
Open Game License by the Contributor (g) “Use”, “Used” that you are distributing are Open Game Content. Mackinnon, Jeff Mackintosh, Jesse Scoble.
or “Using” means to use, Distribute, copy, edit, format,
modify, translate and otherwise create Derivative Mate- 9. Updating the License: Wizards or its designated Mutants & Masterminds, Second Edition, Copyright 2005,
rial of Open Game Content. (h) “You” or “Your” means the Agents may publish updated versions of this License. You Green Ronin Publishing, LLC; Author Steve Kenson.
licensee in terms of this agreement. may use any authorized version of this License to copy,
modify and distribute any Open Game Content originally DC Adventures Hero’s Handbook, Copyright 2010, Green
2. The License: This License applies to any Open Game distributed under any version of this License. Ronin Publishing, LLC; Author Steve Kenson.
Content that contains a notice indicating that the Open
Game Content may only be Used under and in terms of 10. Copy of this License: You MUST include a copy of Mutants & Masterminds Hero’s Handbook, Copyright
this License. You must affix such a notice to any Open this License with every copy of the Open Game Content 2011, Green Ronin Publishing, LLC; Author Steve Kenson.
Game Content that you Use. No terms may be added to You Distribute.
or subtracted from this License except as described by Mutants & Masterminds Gadget Guide: Computers,
the License itself. No other terms or conditions may be 11. Use of Contributor Credits: You may not market Copyright 2013, Green Ronin Publishing, LLC; Author
applied to any Open Game Content distributed using or advertise the Open Game Content using the name Steve Kenson.
this License. of any Contributor unless You have written permission
from the Contributor to do so.