Trigger

#hacking #Rules

Trigger (Continuous)
Default: Computer Operation or Expert (Computer Security).
Base Complexity: 3.

Delayed, conditional execution of one or more other programs.

Trigger can function as an automated link between information-gathering programs (Analyze, Listen, and Search), and other programs that are activated in response to certain information. It can also perform normal functions of the computer (shutdown, send alerts to the sysadmin, etc.), and can be set to activate on a schedule rather than in response to other programs.

Trigger requires no roll; it’s called after Analyze, Listen, or Search have successfully defeated any Spoof or Stealth (Program) programs.

The number of programs that a single instance of Trigger can initiate is equal to its Complexity; the programs can be called all once (with the normal penalties for invoking multiple programs; see p. 7), or staggered to execute in stages. A single instance of Trigger can only be set to respond to one instance of a specific info-gathering program, but multiple Triggers can be keyed to multiple programs and instances. Many combinations are possible; some of the more common are Triggers set to run an Analyze on any user attempting to access a given computer, or to shut down a system when unauthorized access is detected.

This is one of the Hacking Programs.

skill_defaults:: "Computer Operation or Expert (Computer Security)"
complexity:: 3