Archives of Nethys

Pathfinder RPG (1st Edition) Starfinder RPG Pathfinder RPG (2nd Edition)

Acrobatics | Athletics | Bluff | Computers | Culture | Diplomacy | Disguise | Engineering | Intimidate | Life Science | Medicine | Mysticism | Perception | Physical Science | Piloting | Profession | Sense Motive | Sleight of Hand | Stealth | Survival


Skills

Whether you are a battle-hardened soldier who can freeze a foe’s blood with a glance, a garrulous envoy who can blend into any social situation, or a brilliant technomancer with knowledge about every subject in the galaxy, skills represent some of your most fundamental abilities. At 1st level, you start with a number of skill ranks determined by your class, representing your initial training, and you gain more skill ranks as you gain levels, allowing you to improve in skills you already have or gain new ones.

Computers (Int; Trained Only)

Source Starfinder Core Rulebook pg. 137
You can operate, manipulate, and hack into computer systems. If you don’t have physical access to a computer system’s user interface, you must use a hacking kit to access and manipulate the system. Details of computers themselves begin on page 213.

Computers are set up to give one or more authorized users “root access,” allowing them to access any information or function of the computer as a standard action, with no need for a Computers check. Firewalls can block off specific sections of a computer and grant different users root access to those sections.

The base DC for many of the tasks of the Computers skill is equal to 13 + (4 × the computer’s tier). These DCs may be adjusted by the GM to reflect other circumstances.

Access Unsecured System

Source Starfinder Core Rulebook pg. 138
As a standard action, you can use Computers to access an unsecured computer system’s most basic functions. The DC to access the information or functions of a public computer with no countermeasures or firewalls is generally 10. Unlike other tasks of the Computers skill, you can attempt to access a system untrained if you take 20 on the task, requiring 2 minutes. Secured computer systems, and secured sections of an unsecured system, can be accessed by making a Computers check to hack a system.

Craft Computer

Source Starfinder Core Rulebook pg. 138
If you have enough ranks in Computers, you can build computers. See page 235 for the crafting rules.

Create or Detect Forgery

Source Starfinder Core Rulebook pg. 138
You can use Computers to forge official documents. This takes 1d4 minutes. The GM rolls the Computers check to create a forgery in secret, so you’re not sure how good your forgery is. This check is opposed by the Computers check of anyone who examines the document to determine its authenticity.

The DCs for Computers checks to detect a forgery are based on the type of forged document as well as other circumstances determined by the GM, as shown in the table below.

CircumstanceDC Modifier
Document contradicts knowledge or orders–2
Type of document is well known to examiner–2
Type of document is unknown to examiner+2
Examiner only casually reviews document+2
Forger has a sample of a similar document+8

Destroy or Repair System or Module

Source Starfinder Core Rulebook pg. 138
You can use Computers to repair a computer system or module that has been disabled, or destroy one that has been either removed or disabled by spending 10 minutes per tier of the computer system working on the computer. The DC is based on the tier of the computer system. If you are repairing a disabled module or system and you fail the check by 5 or more, you accidentally destroy the module or system. You can’t take 20 on a Computers check to destroy or repair a computer system.

Detect Fake Shell

Source Starfinder Core Rulebook pg. 138
If you have access to a computer, but not root access, you may actually only have access to a fake shell (see page 217). If you succeed at the check, which takes a full action, you realize that you have accessed a fake shell. The DC is equal to the DC to hack the computer + 5 (see Table 7–22: Computer Tiers on page 214).

Disable or Manipulate Module

Source Starfinder Core Rulebook pg. 139
A character with root access to a computer can disable or manipulate a countermeasure or module as a standard action with a DC 10 Computers check. If you have access (but not root access) to a computer, you can attempt a Computers check to activate, add, disable, or manipulate any countermeasure or module. If you want to affect a countermeasure or module that is behind a firewall, you must first hack the system (see below) to gain access to it. Activating or disabling a countermeasure or module generally takes a standard action. Adding or removing a module generally takes 1 minute per tier of the computer. All of these tasks have a DC equal to the DC to hack the system. You cannot take 20 on a Computers check to disable or manipulate a module.

Gain Root Access

Source Starfinder Core Rulebook pg. 139
If you have access to a computer, you can attempt to upgrade your authorization to gain root access. This works similar to hacking the same computer, but the DC is 20 higher. In many cases it is impossible to gain root access, and every task beyond the computer’s basic functions must be attempted as a separate check to destroy, repair, disable, or manipulate modules or countermeasures. If a firewall has been set to have a different set of authorized users with root access, you must gain root access to it separately. Once you have root access to a computer, you can alter who else is granted root access with a successful Computers check to hack the system.

Hack System

Source Starfinder Core Rulebook pg. 139
You can use Computers to hack a computer system to which you don’t already have access. Hacking a computer system typically takes one full action per tier of the computer system. You can cut this time in half (to a minimum of one full action) for every 5 by which you increase the DC of the Computers check. If you succeed at the check, you gain access to any part of the computer that is not behind a firewall (see page 217). This allows you to use the basic functions of the computer and to make further checks that require you to have access. Accessing parts of a computer behind a firewall requires an additional Computers check for each firewall.