Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: "Robert A. Hayden" <hayden@******.MANKATO.MSUS.EDU>
Subject: Hacking a Psionic Ability v3.0
Date: Sun, 31 Jul 1994 14:51:10 +0100
This is another writeup on hacking. It is very similiar to 2.0, but has
some notable changes.

1) You cannot allocate dice to negate sustaining penalties, as that is a
function of the meta-ability (which I called "Divided Attention" for the
purposes of this example).

2) The penalty for systaining a hacked ability is now (force) + 1
instead of just (force). The problem was that your could sustain force 1
hacked powers at a lower penalty than a person that knew the ability at
force 1. This is bad.

-------------------------

How to Hack a Psionic Power
Version 3.0

-------------------

Psionic Hacking Pool:
Psionic Theory (Hacking) Rating + Mastery Level

How to Hack
Allocate dice from your Psionic Hacking Pool. Each dice
allocated represents one for level of force.
Maximum force of power to be hacked cannot exceed 1/2 the
dicipline rating.
Any sustained hacked power gives a (force)+1 penalty to additional
power uses (instead of the standard +2).

----------------------------------

Example:
Trog the Troll is a Full Psionic with the following Psionic abilities.
Telekinesis: 7
General Telekinesis 4
Finite Manipulation 4
Telekinetic Punch 2
Levitation 3
Divinitation: 4
ESP 2
Combat Sense 4
Precognition 2
Telepathy: 4
Detect Lie 2

Psionic Pool: 6
Psionic Hacking Pool: 5

Trog is in the middle of a fierce fire-fight, and he is currently is
systaining a force 4 Combat Sense (which he knows). Trog has decided that
his standard armour isn't enough, and so he wants to erect a Bullet
Barrier (telekinetic) to stop that hot lead with his name on it.

Because he doesn't know Bullet Barrier, he must hack it. To do this, he
can allocate up to a maximum of 3 dice from his Psionic Hacking Pool (1/2
of his telekinesis Dicipline rating, rounded down) to erect a Bullet
Barrier.

The GM assigns a target number of 4 to the task. Trog rolls his three
dice, getting a 2, 4 and 9; two successes. Trog easily resists the drain
with the help of his last two Psionic Hacking Pool dice. The hacked
Bullet Barrier winks into place just as a .44 slug comes into range.

On the next turn, Trog decides that he wants to sustain the hacked Bullet
Barrier. This causes an addition +4 sustaining penalty (force + 1). So,
to sustain both of the powers, he has a +6 penalty to deal with, which
can make things rather miserable.

A Psionicist with the 'Divided Attention' meta-ability could allocate
pool dice to partially or totally negate the penalties that sustaining a
psionic power produces.


____ Robert A. Hayden <=> hayden@******.mankato.msus.edu
\ /__ -=-=-=-=- <=> -=-=-=-=-
\/ / Finger for Geek Code Info <=> I do not necessarily speak for the
\/ Finger for PGP Public Key <=> City of Mankato or anyone else, dammit
-=-=-=-=-=-=-=-
(GEEK CODE 2.1) GJ/CM d- H-- s-:++>s-:+ g+ p? au+ a- w++ v* C++(++++) UL++++$
P+>++ L++$ 3- E---- N+++ K+++ W M+ V-- -po+(---)>$ Y++ t+ 5+++
j R+++$ G- tv+ b+ D+ B--- e+>++(*) u** h* f r-->+++ !n y++**
Message no. 2
From: "Robert A. Hayden" <hayden@******.MANKATO.MSUS.EDU>
Subject: Re: Hacking a Psionic Ability v3.0
Date: Sun, 31 Jul 1994 14:57:19 +0100
Please add the following line to the 'How to Hack' section. I left it off:

[...]
Drain resistence can only be augmented by dice in your Psionic
hacking pool, not by dice in your standard Psionic Pool.
[...]

____ Robert A. Hayden <=> hayden@******.mankato.msus.edu
\ /__ -=-=-=-=- <=> -=-=-=-=-
\/ / Finger for Geek Code Info <=> I do not necessarily speak for the
\/ Finger for PGP Public Key <=> City of Mankato or anyone else, dammit
-=-=-=-=-=-=-=-
(GEEK CODE 2.1) GJ/CM d- H-- s-:++>s-:+ g+ p? au+ a- w++ v* C++(++++) UL++++$
P+>++ L++$ 3- E---- N+++ K+++ W M+ V-- -po+(---)>$ Y++ t+ 5+++
j R+++$ G- tv+ b+ D+ B--- e+>++(*) u** h* f r-->+++ !n y++**

Further Reading

If you enjoyed reading about Hacking a Psionic Ability v3.0, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.