Lvl | Name | Area of Effect | Duration | Range | Type |
1) | Device Assessment | self | -- | touch | I |
2) | Interface I | self | 1 min/lvl | touch | U |
3) | Utilize Language | self | -- | touch | U |
4) | Locate Data | self | -- | touch | U |
5) | Data Copy | self | -- | touch | U |
6) | Technology Analysis I | self | -- | touch | I |
7) | Override Security I | self | -- | touch | F |
8) | Data Search I | self | C | touch | U |
9) | Override Security III | self | -- | touch | F |
10) | Interface True | self | 10 min/lvl | touch | F |
11) | Technology Analysis II | self | -- | touch | I |
12) | Add Data | self | -- | touch | F |
13) | Delete Data | self | -- | touch | F |
14) | Override Security V | self | -- | touch | F |
15) | Technology Analysis III | self | -- | touch | I |
16) | |||||
17) | |||||
18) | Technology Analysis IV | self | -- | touch | I |
19) | |||||
20) | Alter Data | self | C | touch | F |
25) | Purge Data | self | -- | touch | F |
30) | Technology Analysis True | self | -- | touch | I |
50) | Interface Mastery | self | 10 min/lvl | touch | F |
1. Device Assessment - Caster can assess the nature of any non-magical item, i.e. its purpose, basic functions, etc. (Example: If the caster had never seen a car before, he'd be able to tell it was designed to provide motive transport and generally what kind of creatures would fit comfortably inside.)
2. Interface I - Allows caster to directly link his nervous system with the circuits of a computer. It must be case before the caster can employ the Data Access and other spells below. Computer in this sense is defined as any sophisticated electronic computing device or control system.
3. Utilize Language - Allows the caster to understand any one language used by the computer currently interfaced with. This might be necessary in order to gain access to certain data, attempt a security override, etc.
4. Locate Data - Caster may scan a database for spcific information related to one key term and read one file related to that term. This is not as sophisticated as Data Search, which allows the caster to quickly scan through records related to the topic and select the one(s) desired. It is not very useful when dealing with large ship or planetary databases or with secured or restricted systems.
5. Data Copy - Allows the cater to copy into his own memory one file located via Data Scan (or called up using normal methods).
6. Technology Analysis I - For each of an device's capabilities, caster has a 20% chance of determining what the device can do. Once a Technology Analysis spell has been cast on a device, it may not be cast on that device again until the caster has reached a new level of experience.
7. Override Security I - Using this spell, the caster may attempt to bypass a level I security system. The system resists at 10th level. Should the caster fail, he may try again in 24 hours (1 day). Once the caster has overridden a certain security program, a regular computer operator may then access the files. If used in conjunction with the Computer Tapping or the appropriate Cyberdeck Operations skills, provides a +5 bonus per level to the skill roll instead.
8. Data Search I - Caster may search a large database for any information which relates to a given topic, and quickly scan such for what is desired. Concentration is required and the time needed may vary with the complexity of the search.
9. Override Security III - As Override Security I, except that the caster may attempt to defeat Level II (20th lvl) or Level III (30th lvl) security programs.
10. Interface True - This spell bypasses the need to cast Interface I and Utilize language and has a longer duration.
11. Technology Analysis II - As Technology Analysis I except the chance to determine a function is increased to 40%.
12. Add Data - Caster may add information or commands to any memory storage system. He cannot add information to existing files (that is considered "alteration").
13. Delete Data - Caster may delete part or all of one data file or command. Programs, operating system and basic input/output files can not be deleted. Can also be a time- or function-delayed virus with this capability.
14. Override Security V - As Override Security I except caster may attempt to defeat Level IV (40th lvl) and Level V (50th lvl) security systems.
15. Technology Analysis III - As Technology Analysis I except the chance to determine a function is increased to 60%.
18. Technology Analysis IV - As Technology Analysis I except the chance to determine a function is increased to 80%.
20. Alter Data - Allows caster to alter the information in one data file or command sequence. Can also be a time- or function-delayed virus with this capability.
25. Purge Data - Allows the caster to purge any data file, group of data files related to a key term or any command, program, or system file. Can also be a time- or function-delayed virus with this capability.
30. Technology Analysis True - As Technology Analysis I except all functions are automatically known.
50. Interface Master - After casting this spell, caster may freely cast any other spells on the list, one per round, for the duration of this spell with no further rolls necessary.