Computer Stat Blocks
Computer's Name Computer Level
TraitsThis provides information about the computer and its purpose.
Access Point Each access point should be noted as physical (if it requires the character to be physically adjacent) or remote (if it can be accessed from a distance). This is followed by the number of successes required to Hack the access point. The DC of skill checks that can be attempted to use the access point are listed here, followed by the minimum proficiency rank required for the skills (if any) in parentheses. Each access point is associated with its own unique vulnerabilities and countermeasures. If a computer has multiple access points, these access points (and their associated vulnerabilities and countermeasures) are listed separately.
Vulnerabilities Each vulnerability lists in parentheses the DC of any skill checks that can be attempted to exploit it, followed by a value of how much it lowers the access point's DC. Some computers don't have this entry.
Countermeasures Lists the nature of the countermeasures that trigger after reaching the number of failures in the parentheses; the DC of any skill checks required to notice and disable the countermeasures are also here. Some countermeasures have the persistent trait, meaning once they've been triggered, they automatically trigger again at the end of each ensuing round. Persistent countermeasures can be disabled even after they've been triggered, and doing so prevents them from triggering again (but doesn't erase the effects of previous triggers).