Bad Wolf

Published on July 2016 | Categories: Types, Games & Puzzles | Downloads: 47 | Comments: 0 | Views: 343
of x
Download PDF   Embed   Report

The model can attempt to gain access to a computersystem using a suitable computer terminal which must berepresented on-table.This computer may be connected tothe system being accessed or it might be remote.Thereare 3 levels of Hacker access, each harder than the last butoffering greater benefits.A Hacking attempt takes one fullactivation, and might take longer than a single turndepending on how the dice rolls go

Comments

Content

The model can attempt to gain access to a computer
system using a suitable computer terminal which must be
represented on-table.This computer may be connected to
the system being accessed or it might be remote.There
are 3 levels of Hacker access, each harder than the last but
offering greater benefits.A Hacking attempt takes one full
activation, and might take longer than a single turn
depending on how the dice rolls go

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close