Mesh Actions
Your actions online are largely influenced by the particular system(s) you are accessing. The following list is not comprehensive, but should give your and your GM a basis for handling online tasks.
Keep in mind that your actions are limited by your current [[Devices#Accounts & Access Privileges|device access priviliges]]. If you wish to do something that your privileges do not allow -- access a file in a restricted directory, edit a log, manipulate a security device -- then you must hack the system to do so. Actions that specifically require hacking are detailed under [[Hacking]], and [[Hacking#System Subversion|Subversion]].
Unless otherwise noted, these actions each take a complex action but require no skill test, assuming you have access privileges.
Universal Actions
These actions apply to [[Devices#Motes|motes]], [[Devices#Hosts|hosts]], [[Devices#Servers|servers]], and most other electronics. Any user can take these actions, though high-security systems may restrict some of these to users with security or admin privileges.
Access Another System
You can authenticate and [[Devices#Acounts & Access Privileges|access]] an account on another system. This creates an account shell, representing your presence on that system.
Apply Tag
You can mark a physical person, place, or thing with an e-tag viewable in AR.
Communicate
you can email, text, and voice or video chat others online, as long as you have their mesh ID
Encrypt/Decrypt
You can protect a file from prying eyes or access it with the proper [[Devices#Authentication Methods|authorization]]
Filter AR Mist
You can attempt to remove spam and other obtrusive AR "mists"
Identify Attacker
You can try to identify someone trying to crash you in [[Mesh Combat#Mesh Actions Identify Attacker Attack Awareness|mesh combat]].
Issue Command
You can command any slaved device, ALI, or teleoperated bot with only a quick action. Each command counts separately, though you may issue the same command to multiple devices/bots at once.
Log Off
Exit a system
Modify Files
You can view, change, upload, download, and delete any files you have access privileges for. Deleted files can still be recovered with an [[Skills#Interface|Inteface Test]] for 1 week, though you can also choose to wipe (permanently delete) a file so that no recovery is possible; however, archived backups may also exist.
Operate Device
Most devices have built-in hardware and electronic functions that you can directly control. Turn on your vehicle, load an autocook blueprint, turn up the heat, turn off the sprinklers, open the door, set a timer, fire a weapon system, adjust settings, etc. At the GM's discretion some functions may require skill tests.
Run Script
Launch a pre-programmed [[#Scripting|script.]]
Scan Wireless Signals
It is a quick action to looks up wireless devices within range and their mesh IDs. It takes a complex action to locate stealthed devices.
Search
You may search a system you are accessing or the [[Research|mesh at large]]
Shield Software
You may actively protect software that is targeted in [[Mesh Combat|mesh combat]]
Stealth Wireless Signals
You can attempt to [[Devices#Stealthed Signals|hide your wireless activity]]
Switch Home Device
If you are an infomorph, you may transfer your virtual mind-state to another system or distribute it among several systems
Terminate Software
You can kill a minor software process you have privileges for and bring it to a stop. If the software belongs to another user or has significance to the story, treat this as an attack in [[Mesh Combat|mesh combat]]
Toggle AR Skin
You can change the augmented reality that skins the world around you with a quick action.
Toggle Privacy Mode
You can set your public profile to private or public with a quick action. You can also toggle the option to allow police/security to override your privacy settings.
Toggle Simulspace
You may enter or exit a simulspace environment.
Use Apps
Most devices are loaded with apps appropriate to their purpose. These commonly include word processors, graphic design studios, video and audio workstations, and games. Dedicated systems may have apps for habitat system controls and weapon stations. Using these apps may require an [[Skills#Interface|interface]] test.
Use Services
You can use software available as a service in the cloud. This usually requires having a subscription to the service, though some are free.
View Apps
You can see both the apps available on the device as well as the ones currently running with only a quick action. Some apps may only be available to specific accounts, according to that system's privileges.
View Profile
You can view the public social network profile and rep scores of anyone within physical range (or within range of sensors you are accessing), unless they are in [[Mesh Introduction#Privacy Mode|privacy mode]].
View Sensor Feeds
Many devices include miniaturized sensors. These can be viewed or streamed directly into your augmented reality. use [[Skills#Perceive|Perceive]] Tests for most sensors; others may require [[Skills#Know|Know]] tests (for example: a chem sniffer's results are analyzed with Know: Chemistry). Sensors used for security pruposes are usually limited to accounts with security or admin privileges.
View System Status
Get a report on the system's "health" and integrity, that status of its built-in functions, the progress of ongoing processes, security alerts/intruder status, and so on.
Security Actions
Actions reserved for accounts with security or admin privileges
Acquire Mesh ID
You can acquire the mesh ID of anyone accessing the system.
Activate Countermeasure
You may initiate an active [[Countermeasures]] against an intruder, such as locking them out, tracing them or initiating a reboot.
Attack
You can attempt to crash software, including account shells, apps, firewalls, infomorphs, operating systems, and services (See [[Mesh Combat]])
Bypass Jamming
You can attempt to temporarily overcome jamming by winning an Opposed [[Skills#Interface|Interface]] test with the jamming party (also see [[Hacking#System Subversion|system subversion]])
Locate Intruder
If you suspect a hacker has invaded your system, you can attempt to identify them (see [[Countermeasures#Locate Intruder|Locate Intruder]])
Lockout
You can block a specified mesh ID from accessing the system. If that mesh ID is currently accessing the system, its account shell must be crashed in mesh combat first.
Monitor Activity
You can spy on an app's activity or another specific user's actions in real-time. if the user is hacking the system, this may require winning an Opposed [[Skills#Infosec|Infosec Test]] to ascertain what they are doing. Hackers sometimes use this to monitor the firewall or system defender.
Scan Infomorph
You can analyze an infomorph with a successful [[Skills#Interface|Interface Test]]. This will tell you the type of infomorph, its public profile (if not private), its mesh ID, and whether or not it is an ALI or a fork. A more in-depth analysis takes an [[Skills#Interface|Interface Test]] and a timeframe of 10 minutes, but will reveal its [[Identity Systems|digital code]] ID and any embedded apps or meshware. If the infomorph has e-veil meshware, this is an opposed test against the veil's [[Skills#Program|Program]] 80.
Trace
You can track a user to their physical location (or at least the system they originate from); see [[Tracking|Physical Tracking]].
Trigger Alert
You can put the system on passive or active alert
View Logs
Access the system's logs. This will tell you when users accessed the system, what apps they used, what file they viewed or modified, what [[Mesh Introduction#Slaved Devices|linked]] systems they accessed, their mesh IDs, what other devices were in wireless range at what times, and similar forensic histories. Older logs (over a month) are often backed up to a cloud service and erased. Searching for specific information may require a [[Research|Research Test]].
View Users
You can see which other users are currently accessing the system, what apps they are using, and their mesh IDs. Intruders with hidden status will not be shown.
Admin Actions
Only admin accounts are allowed to take these actions.
Disable Sensors or Device Functions
You can turn off sensors or other physical functions. This may keep someone with physical access to the device from using it.
Modify Accounts
You can add new accounts and remove old ones. You cannot remove accounts that are currently being accessed -- the user must completely log off first (or have their account shell crashed in mesh combat). Every device has a root admin account that cannot be removed (short of wiping the system).
Modify Privileges
You can add or remove specific privileges, such as allowing access to certain directories, files, sensors, or apps. You can also downgrade security accounts to user privileges or elevate users to security accounts and security accounts to admins. You can remove or downgrade admin privileges from other accounts, however every device has a root admin account that cannot be modified (with ware, this usually means the person they are installed in).
Modify Software
You can install, remove, and update apps.
Wipe System
You can completely erase all data from the system: all files, apps, accounts, infomorphs, and the operating system itself. This is a lengthy process, taking 1 minute for motes, 3 minutes for hosts, and 10 minutes for servers. Infomorphs are immediately warned, so that they have time to copy themselves or move to a new home device. Forensic methods (an [[Skills#Interface|Interface Test]]) can be used to recover wiped data, at least until the system is re-installed, unless you choose to securely wipe the system (double the time).
Scripting
A script is a simple program -- a batch of instructions -- that you can embed in a system to be executed at a later scheduled time or upon a certain trigger event, without your presence. When activated, the script will undertake a series of pre-defined actions, in order. Scripts are commonly used by hackers to subvert a system while they are occupied elsewhere, but they can also be used with your own systems (though it is usually easier to tell ALIs what to do)..
Scripts can be programmed on the fly or pre-programmed. When composing the script, you must detail what actions the script will take, in what order, and at what times (or trigger events). The script cannot contain more steps/takss than your [[Skills#Program|Program Skill]] / 10. To program a script, you must success in a [[Skills#Program|Program Test]] with a timeframe of 1 hour per step. Superior successes provide 1 point of [[Pools#Insight|Insight pool]] that the script may use for making tests.
To load a script into a system, you must have the necessary access privileges or must succeed in a [[Hacking|Hacking]]. If successful, the script is loaded into the system and will run as programmed. Once the script is activated, it carries out the pre-programmed sequence of actions. The script is considered to have the same access privileges as the account that runs it. The programmer's [[Skills#Infosec|Infosec]], [[Skills#Interface|Interface]], and [[Skills#Research|Research]] skills are used for any tests called for by those actions, but only the script's own Insight pools may be used.
Scripts may also be discovered in [[Countermeasures#Security Audits|security audits]].