Character Balance
When creating a character it's important to balance strengths, limitations, and weaknesses to ensure the character is interesting. Every Superman has their Kryptonite and every Werewolf its Silver Bullet. This keeps the story going, provides the chance for personal growth, and ensures that nobody can do everything. Having strengths and weaknesses pulls people together. Maintaining a characters balance promotes seeking out others for interaction and story.
Limitations, like weaknesses, are there to ensure a character has depth. The story of the weak becoming strong is far more compelling than the strong proving they're stronger. Soft limits are made to be broken with time and effort. Hard Limits are physical impossibilities and are set to keep characters from being almighty gods. They can only be broken by plot and must be approved by multiple admins.
Limitations, like weaknesses, are there to ensure a character has depth. The story of the weak becoming strong is far more compelling than the strong proving they're stronger. Soft limits are made to be broken with time and effort. Hard Limits are physical impossibilities and are set to keep characters from being almighty gods. They can only be broken by plot and must be approved by multiple admins.
Strengths include but are not limited to:
|
Weaknesses include but are not limited to:
|
Soft Limits include but are not limited to:
|
hard limits include but are not limited to:
|
Hacking
The ability to force technology to behave in ways the owner does not intend, breaching security through various methods, and the ability to obtain information through technological means such as but not limited to financial data, schedules, or schematics.
Hackers can be divided into 4 groups.
Advanced users are your tech support representatives and people who build their own PC's. They know their stuff, they can be trained, but they don't typically know how to crack the code without proper tools or passwords. They're godly with whatever they're trained in but a password or firewall will give them trouble.
Phishers are a step above Advanced Users. They are the most common form of what is called a "Hacker" and can break through tough security with some social engineering or observational prowess to deduce passwords after having intimate conversation with the user.
Data Miners with physical access to a machine can dodge most failsafe techniques and eventually, if given time, gain access to a devices precious information or pop an electronic lock if they have access to their bag of tricks.
Technopaths bend systems to their will. They are one-in-several-billion and entire civilizations live and die without one having ever been born. Odds are nobody will ever meet one of these legendary beings.
Hackers can be divided into 4 groups.
- Advanced users
- Phishers
- Data Miners
- Technopaths
Advanced users are your tech support representatives and people who build their own PC's. They know their stuff, they can be trained, but they don't typically know how to crack the code without proper tools or passwords. They're godly with whatever they're trained in but a password or firewall will give them trouble.
Phishers are a step above Advanced Users. They are the most common form of what is called a "Hacker" and can break through tough security with some social engineering or observational prowess to deduce passwords after having intimate conversation with the user.
Data Miners with physical access to a machine can dodge most failsafe techniques and eventually, if given time, gain access to a devices precious information or pop an electronic lock if they have access to their bag of tricks.
Technopaths bend systems to their will. They are one-in-several-billion and entire civilizations live and die without one having ever been born. Odds are nobody will ever meet one of these legendary beings.