{"id":18015,"date":"2025-05-28T19:00:10","date_gmt":"2025-05-28T23:00:10","guid":{"rendered":""},"modified":"2026-04-09T07:45:09","modified_gmt":"2026-04-09T11:45:09","slug":"hacking","status":"publish","type":"post","link":"https:\/\/havenrpg.net\/newsite\/2025\/05\/28\/hacking\/","title":{"rendered":"Hacking"},"content":{"rendered":"<p><span style=\"color:#008080\">Requirements<span style=\"color:#008000\">:<\/span\/span> Rank 3 requires Thief, Hunter, Scientist or Engineer focus.<br \/>Rank 4 to 5 requires engineer focus 2-3<\/p>\n<p>This stat determines the ability of a character to hack computer systems.<\/p>\n<p>Hacking 0<br \/>No ability to hack.<br \/>Hacking 1<br \/>Able to determine the presence of unencrypted information sent over a<br \/>network.<br \/>Hacking 2<br \/>Able to read unencrypted material sent over a network, such as emails.<br \/>Hacking 3<br \/>Able to hack into poorly protected computers.<br \/>Hacking 4<br \/>Able to hack into most computers and read almost any legally encrypted<br \/>material sent over a network.<br \/>Hacking 5<br \/>Able to hack into most professionally encrypted sites and can often<br \/>crack even military-grade encryption.<\/p>\n<p>Hacking the Police Band:<br \/>Characters with Hacking 2 and over can hack the local police band to<br \/>listen to ongoing dispatch messages. To do this, one must purchase a<br \/>police scanner and simply hold it in one&#8217;s inventory.<\/p>\n<p>Each rank of hacking reduces the cost of doing a phone trace by 15%.<br \/>At Rank 3 it allows the jamming of a traced individual&#8217;s communications.<br \/>At Rank 5 it allows the interception of some of the traced individual&#8217;s<br \/>communications.<\/p>\n<p>When combined with engineering to a total of at least 5, they can detect<br \/>bugs in any room they enter.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Requirements: Rank 3 requires Thief, Hunter, Scientist or Engineer focus.Rank 4 to 5 requires engineer focus 2-3 This stat determines the ability of a character to hack computer systems. Hacking 0No ability to hack.Hacking 1Able to determine the presence of unencrypted information sent over anetwork.Hacking&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[124],"tags":[],"class_list":["post-18015","post","type-post","status-publish","format-standard","hentry","category-helpfile"],"_links":{"self":[{"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/posts\/18015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/comments?post=18015"}],"version-history":[{"count":0,"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/posts\/18015\/revisions"}],"wp:attachment":[{"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/media?parent=18015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/categories?post=18015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/havenrpg.net\/newsite\/wp-json\/wp\/v2\/tags?post=18015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}