There are times when a simple username and password aren’t enough to gain access to a system. For that, there are Empire-sanctioned Systems Administrators. To them, no system can’t be cracked.
There are two ways to use this License. One is on a computer or system that you are trying to breach. The other is to gain access to information found within the Essex profile of another person. Regardless of the hacking target, you will have distinct activities that you will need to perform.
If you are Licensed to access systems you don’t own, you are also Licensed to acquire and possess certain files that assist in breaking into them. These files contain access credentials, code crawlers, or other ‘helpers’ that are intended to make the job of cracking a system easier. If you do not have this License equipped and those lists are found on your person or within your RIG, you will be fined, put in the Brig, or both. To some, these files are more dangerous than a shotgun during happy hour in the Cantina. If you have them and do not have this License equipped, you may submit them to a special quarantine process during customs check-in and will not be penalized for it. Your belongings will be returned to you after the Assembly.
Out of Game (OOG)
To utilize this License on a computer or terminal, scan the QR code associated with the device you are trying to get access to using your RIG. Sometimes, this QR code will not be obvious so you might need to look for it. This process is very similar to interacting with POIs. From there, you can use relevant items to break any encryption the computer might have.
To utilize this License to hack a RIG, there is a completely different process. Each hacking program comes with information such as how good it is at hacking, what information you will gain, and other details that will help guide your next steps. Once you are in possession of a hacking program, you will be able to find it in your RIG. We have thematically chosen to make the location not-obvious, so you will need to click around in the app to find out how to hack.
Once you have found the program, you will need to follow a series of prompts. At the end of your hack, the results will be one of the following: