Skill (Intelligence)

Skill Use Action DC Description Trained Only Retry Take 10 Take 20 Source
Access Information 1 minute (or longer) 15 (or higher) You can access information from a computer with an attitude of "indifferent" or better. No Yes Yes Yes Core
Access and Reprogram Electronic Device Full-Round Action 10 You can access an electronic device by hooking it up to a computer with an attitude of "indifferent" or better. No Yes Yes Yes LE
Astrogate 1 minute (or longer) Variable You can plot a safe course through hyperspace (see Astrogation). Yes Yes Yes Yes Core
Backtrail 1 minute 25 You can find the identity of the last user to use the the computer and the information they sought. Yes Yes Yes Yes SNV
Copy or Reprogram Code Cylinder or Access Card 10 minutes Variable You can reprogram a code cylinder or access card to accept new codes, or copy the old codes to another cylinder or card. No Yes Yes Yes LE
Cover Tracks 1 minute Variable You can conceal your presence and how you used the computer by increasing all subsequent checks by 5. Yes Yes Yes Yes SNV
Disable or Erase Program 10 minutes 15 You can disable or erase a program from a computer with an attitude of "helpful". Yes Yes Yes Yes Core
Improve Access Full-Round Action Opposed: Will Defense You can adjust the attitude of a computer in order to gain better access to its commands or programs. Yes Yes Yes No Core
Issue Routine Command Standard Action Opposed: Slicing You can issue a routine command to a computer with an attitude of "friendly" or better while being opposed by another user. No Yes Yes Yes Core
Remote Connection Full-Round Action 10 You can connect to a computer network from a remote computer. No Yes Yes No Core
Reprogram Droid 10 minutes Opposed: Will Defense You can reprogram a droid to obey a new master, copy data stored in memory, change skills, or even memory wipe it. Yes Yes Yes Yes Core
Use Communications Variable Variable When functioning as a vehicle's system operator, you can hail another vehicle or intercept communications. Yes Yes Yes Yes SotG
Use Sensors Variable Variable When functioning as a vehicle's system operator, you can use the vehicle's sensors to scan for threats, identify other vehicles, and search for hidden dangers. Yes Yes Yes Yes SotG

Use this skill to access secured files and defeat security systems.

Attitude of the Computer Description
Hostile Treats you as a hostile intruder and attempts to trace your location and isolate your connection.
Unfriendly Treats you as an unauthorized user and blocks your access to its programs and information.
Indifferent Treats you as a guest or visitor and grants you access to non-secret programs and information (as long as this does not conflict with previous commands).
Friendly Treats you as an authorized user and grants you access to any programs and non-secret information (as long as this does not conflict with previous commands). You may add any equipment bonus provided by the computer to your Slicing checks.
Helpful Treats you as if you are its owner or administrator, granting access to all of its programs and information (even if doing so overrides previous commands). You may add any equipment bonus provided by the computer to your Slicing checks.

Access Information

;Requires computer attitude of indifferent or better):

Getting information through a computer requires you to connect to the appropriate network (such as the HoloNet, or its equivalent in other eras) and locate the files you seek. Connecting to a network (a full-round action) doesn't require a skill check if you use a computer that's already linked to it. However, establishing a connection to a network using a remote computer requires a DC 10 Slicing check. You can also get information without connecting to a network if you use a computer whose memory contains that information; the GM decides what information a computer's memory actually holds.

Finding information on a single topic requires a set amount of time (see below); at the end of this time, you must make a Slicing check. The time required and the check DC are determined by the type of information sought. For example, locating general information about a senator is easier than locating specific information (such as the senator's date of birth), which is easier than finding private information (such as the senator's private comm channel code), which is easier than uncovering secret information (such as the senator's cred stick code).

Information DC Time Required
General 15 1 minute (10 rounds)
Specific 20 10 minutes
Private 25 1 hour
Secret* 30 1 day (8 hours)

*Secret information can only be accessed on a computer that is helpful toward you.

Access and Reprogram Electronic Device

;Source: LE

To access information contained within an electronic device, you must first connect it to an indifferent, friendly, or helpful computer (a full-round action) via a wireless or wired system. Connecting wirelessly requires you to establish a connection as you would with a network. A wired connection may be as simple as obtaining the correct cable or making an improvised connection (see Mechanics). The same attitudes and DCs used to Access Information from a computer are also used for devices, although most self-contained devices will not set off alarms or attempt to isolate your location.

Astrogate

;Trained Only:

You can plot a safe course through hyperspace. Doing so usually requires 1 minute, at the end of which time you must succeed on a Slicing check. Various factors influence the DC of the check (see Astrogation).

Backtrail

;Trained Only ;Source: SNV

A successful DC 25 Slicing check reveals the identity of the last person to use the computer and the information they sought. The computer's attitude modifies the DC as normal.

Copy or Reprogram Code Cylinder or Access Card

;Source: LE

You can make a Slicing check to reprogram a code cylinder or access card to accept new codes, or copy the existing codes to another cylinder or card. The DC for these actions depends on the level of security (see below). The device must be physically connected to an indifferent, friendly, or helpful computer before it can be copied or reprogrammed. Copying or reprogramming a code cylinder or access card takes 10 minutes.

Security Level DC
Administrative (civilian) 20
Encrypted Military 30
Encrypted Imperial Military 35

Cover Tracks

;Trained Only ;Source: SNV

When you access a computer, you can conceal your presence and how you used the computer by increasing all Slicing check DCs by 5. Any character who attempts to analyze the computer to determine your identity and what you did takes a -5 penalty on their Slicing check.

Disable or Erase Program

;Trained Only; requires computer attitude of helpful):

You can disable or erase a program on a computer that is helpful toward you. Disabling or erasing a program takes 10 minutes and requires a DC 15 Slicing check.

Improve Access

;Trained Only:

As a full-round action, you can make a Slicing check to adjust the attitude of a computer in order to gain access to its programs and information. You must be able to communicate with the computer either through a direct interface (such as a keypad) or by connecting to it through an appropriate network (such as the HoloNet). Apply a modifier on the check based on the computer's current attitude toward you: hostile -10, unfriendly -5, indifferent -2, friendly +0. If the check equals or exceeds the computer's Will Defense, the computer's attitude shifts one step in your favor. If you fail, the computer's attitude does not change. If you fail by 5 or more, the computer's becomes one step worse (for example, indifferent to unfriendly) and the computer notifies the computer's administrator of the access attempt.

A hostile computer can be dangerous. If a computer becomes hostile or if you fail any Slicing check made to improve access to a hostile computer, it traces your exact location and notifies the nearest security personnel. In addition, if you fail by 5 or more when attempting to improve access to a hostile computer, it isolates your connection and rejects any further attempts you make to access it for 24 hours.

Issue Routine Command

;Requires computer attitude of friendly or better):

As a standard action, you can issue a routine command to a computer. Examples include turning a computer on or off, viewing and editing documents or recordings in its memory, printing a hard copy of a document or image on a flimsiplast sheet, opening or closing doors that the computer controls, and the like.

Issuing routine commands doesn't normally require a Slicing check. However, if another character issues a contradictory command, the computer follows the command of the character toward whom it has a better attitude (for example, it follows a command from someone toward whom it is helpful over someone toward whom it is friendly). If the computer has the same attitude toward both characters, make an opposed Slicing check against the competing character. If you succeed, your command takes effect. If you fail, the opposing character's command takes effect.

Reprogram Droid

;Trained Only; requires tool kit:

You can make a check to reprogram a droid to obey a new master, copy data stored in its memory banks, change its trained skills, erase memories selectively, or erase its memory entirely (resetting the droid to its factory preset status). The DC for any of these actions is equal to the droid's Will Defense. Reprogramming a droid takes 10 minutes.

Special

*You can take 10 on Slicing checks. You can take 20 on a Slicing check except when attempting to improve access. *When a computer is friendly or helpful toward you, you gain an equipment bonus on all Slicing checks made with that computer equal to its Intelligence bonus.