Data Vault

License Information
Systems Administrator
Pillar Technology - Tier 4
Branch Military
Requires Arms Dealer
Time Required Variable

There are times when a simple username and password aren’t enough to gain access to a system. For that, there are Empire-sanctioned Systems Administrators. To them, no system can’t be cracked.

There are two ways to use this License. One is on a computer or system that you are trying to breach. The other is to gain access to information found within the Essex profile of another person. Regardless of the hacking target, you will have distinct activities that you will need to perform.

If you are Licensed to access systems you don’t own, you are also Licensed to acquire and possess certain files that assist in breaking into them. These files contain access credentials, code crawlers, or other ‘helpers’ that are intended to make the job of cracking a system easier. If you do not have this License equipped and those lists are found on your person or within your RIG, you will be fined, put in the Brig, or both. To some, these files are more dangerous than a shotgun during happy hour in the Cantina. If you have them and do not have this License equipped, you may submit them to a special quarantine process during customs check-in and will not be penalized for it. Your belongings will be returned to you after the Assembly.

Out of Game (OOG)

To utilize this License on a computer or terminal, scan the QR code associated with the device you are trying to get access to using your RIG. Sometimes, this QR code will not be obvious so you might need to look for it. This process is very similar to interacting with POIs. From there, you can use relevant items to break any encryption the computer might have.

To utilize this License to hack a RIG, there is a completely different process. Each hacking program comes with information such as how good it is at hacking, what information you will gain, and other details that will help guide your next steps. Once you are in possession of a hacking program, you will be able to find it in your RIG. We have thematically chosen to make the location not-obvious, so you will need to click around in the app to find out how to hack.

Once you have found the program, you will need to follow a series of prompts. At the end of your hack, the results will be one of the following:

  • Your hack fails and the target is not alerted that someone tried to hack them
  • Your hack fails and the target was alerted that someone tried to hack them
  • Your hack fails and the target was alerted exactly who tried to hack them
  • Your hack succeeds and you gain one or more ‘static’ pieces of information about them. This information is specific to their attributes at the time of the hack. For instance: You hack someone to find out how many chips they have. At that exact moment, they had 22 in their bank. Your hacking report will display ‘22 chips’ whenever you look at it.
  • Your hack succeeds and you gain one or more ‘evergreen’ pieces of information about them. This is tantamount to installing spyware on their RIG. In the above example where they had 22 chips at the time of your hack, every time you look at the report of your hack, it will tell you how many chips they have at the moment you’re currently looking.
    • Note: The target will have a series of ways to ‘defend’ against spyware.