Operational Utilities
Utility Size Multiplier Actions Book Page
Analyze 3 Analyze (Icon, IC, Host, Subsystem, Security), Locate IC Shadowrun 3 Core 220
Browse 1 Locate (File, Node, Slave) Shadowrun 3 Core 220
Commlink 1 Tap Commcall, Make Commcall Shadowrun 3 Core 220
Deception 2 Graceful Logoff, Logon to (LTG, RTG, orHost), Null Operation Shadowrun 3 Core 220
Decrypt 1 Decrypt Access, Decrypt File, DecryptSlave Shadowrun 3 Core 220
Read/Write 2 Download Data, Edit File, Upload Data Shadowrun 3 Core 220
Relocate 2 N/A Shadowrun 3 Core 220
Scanner 3 Locate Decker Shadowrun 3 Core 220
Spoof 3 Control Slave, Edit Slave, Monitor Slave Shadowrun 3 Core 221
Camo 3 Redirect Datatrail Matrix 3 70
Crash 3 Block System Operation, Crash Application, Crash Host Matrix 3 70
Defuse 2 Disarm Data Bomb Matrix 3 70
Doorstop 2 Freeze Vanishing SAN Matrix 3 70
Encrypt 1 Encrypt Access, Encrypt File, Encrypt Slave Matrix 3 70
Evalulate 2 Locate Paydata Matrix 3 70
Mirrors 3 Decoy Matrix 3 71
Purge 2 Disinfect Matrix 3 71
Redecorate 2 Alter icon Matrix 3 71
Sniffer 3 Intercept Data Matrix 3 71
Snooper 2 Analyze Operation Matrix 3 71
Swerve 3 Abort Host Shutdown Matrix 3 71
Triangulate 2 Triangulate Matrix 3 71
Validate 4 Dump Log, Invalidate Account, Restrict Icon, Validate Account Matrix 3 71
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License