Post by Teufel Penguin on Jul 5, 2014 1:22:50 GMT -4
Online Character Sheet
Name: Jacob McDonald
Nature: Mediator
Generation: 8th
Player: Teufel Penguin
Demeanor: Optimist
Haven: Apartment in the Cape
Chronicle: Cape Brenton by Night
Clan: Tremere
Concept: Hacker / Slicer
DOB: 10-Feb-1927
Embrace: 18-July-1947
Apparent Age: 20
Sire: Eloise Norman
True Age: 87
Alias Ghost in the Machine
ATTRIBUTES
PHYSICAL SOCIAL MENTAL
Strength *** Charisma *** Perception ****
Dexterity **** Manipulation *** Intelligence ****
Stamina ** Appearance **** Wits ***
ABILITIES
TALENTS SKILLSKNOWLEDGES
Acting ** Drive *** Academics ***
Alertness **** Etiquette ** Computer *****
Athletics ** Firearms ** Computer Hacking *****
Brawl *** Melee *** Finance ****
Dodge ** Music ** Investigation ****
Empathy *** Repair **** Linguistics **
Intimidation * Security *** Science ***
Leadership ** Stealth **
Streetwise *** Survival ***
Subterfuge **
ADVANTAGES
BACKGROUNDS DISCIPLINES VIRTUES
Fame (Hacker name in Hacker Comunity) - 2
Resources - 4
Contacts (Hacker Community) - 2
Generation: 5
MERITS/FLAWS HUMANITY/PATH HEALTH
Eat Food (+)
Concentration (+)
Eidetic Memory (+)
Computer Aptitude (+)
Mechanical Aptitude (+)
Lightning Calculator (+)
Time Sense (+)
Inoffensive to Animals (+)
Humanity***** *
WILLPOWER***** *
BLOODPOOL***** ***** *****
Bruised
Hurt -1
Injured -1
Wounded -2
Mauled -2
Crippled -5
Incapacitated
NON-SPENT EXPERIENCE: 0
DISCIPLINELIST
Auspex ***
Dominate ***
Thaumaturgy ****
Fortitude ***
Presense ****
Thaumaturgy Paths:
Path of Technomancy
The newest path to be accepted bythe Tremere hierarchy as part of the clan's official body of knowledge,the Path of Technomancy is a relatively recent innovation. It wasdeveloped in the latter half of the 20th century, and has not yetspread far beyond the North american Pontifices. The path focuses onthe control of electronic devices, from wristwatches to computers, andits proponents maintain that it is a prime example of the versatilityof Thaumaturgy with regards to a changing world. More conservativeTremere, however, state that mixing Tremere magic with mortal scienceborders on treason or even blasphemy, and some European Regents havegone so far as to declare knowledge of Technomancy grounds forexpulsion from their chantries. The Inner council did approve theintroduction of the path into the clan's grimoires, but has yet tovoice any opinion on the conservative opposition of Technomancy.
* Analyze - Mortalsare constantly developing new innovations and any Vampire who wouldwork Technomancy must be able to understand that upon which hepractices his or her magic. The most basic power of this path allowsthe Tremere to project his perceptions into a device, granting him orher a temporary understanding of its purpose, the principles of itsfunctioning and its mean of operation. This does not grant permanentknowledge, only a momentary flash of insight that fades within minutes.The character must touch the device in order to apply this power. Thispower can also be used to understand a nonphysical technologicalinnovation. In other words, a new piece of computer software
** Burnout -It is usually easier to destroy than to create, and sensitiveelectronics are no exception to this rule. Burnout is used to cause adevice's power supply, either internal or external, to surge, damagingor destroying the target. Burnout cannot be used to directly injureanother individual, although the sudden destruction of a pacemaker or acars fuel injection control chip can create a definite health hazard.
*** Encrypt/Decrypt -Electronic security is a paramount concern of governments andcorporations alike. Those Tremere with techno-savvy enough tounderstand the issues at stake have become quite enamored of thispower, which allows the thaumaturge to scramble a device’s controlsmystically, making it inaccessible to anyone but him/her.Encrypt/Decrypt also works on electronic media; a videotape under theinfluence of this power displays just snow and static if played backwithout the owner’s approval. The character must touch the device ordata container wich he wishes to encrypt.
**** Remote Access -With this discipline, a skilled thaumaturge can bypass the need forphysical contact to operate a device. This is not a form of telekinesis; the Vampire does not manipulate the item’s controls, butrather touches it directly with the power of their mind. This discipline may be used on any electronic device within the character’s line of sight.
RITUALS
Wake with Evening’s Freshness
This ritual takes a half-hour to perform, and involves burning feathers, and spreading the ashes over the sleeping area. The vampire who performs this ritual may awaken at the slightest sign of danger, and the rules involving Humanity, regarding the ability to awaken and remain awake, are waived for the first few turns. Lasts until sunset.
Machine Blitz (Sabbat)
By concentrating on a machine, the vampire can make machines go haywire in the manner of her choosing, but within reasonable behavior for the machine.
Illusion of Peaceful Death (Milwaukee by Night)
This ritual involves dusting a corpse with a white feather, and has the effect of hiding all signs of unnatural death on a corpse, making the deceased appear to have died of natural causes. This will not hide exsanguination; only obvious signs.
Ward Versus Kindred
This ten-hour ritual requires a point of vampire blood, in addition to the object being made into a ward. This object, when touching a vampire, will do three dice of damage, difficulty Stamina + Fortitude of the vampire, and the vampire must spend a willpower point to touch it again. If this ward is placed on a door or an unbroken circle, the vampire will be unable to pass it. If a bullet is warded, then five successes are required on the appropriate Firearms roll to leave the bullet in the body where it will continue doing damage. (This only works on smaller calibers.)
HISTORY
Jacob's love of computers started when he was nineteen, see this was the year that ENIAC was put into process and he was one of the lucky students at the University of Pennsylvania to get to actually see it in action. It was a marvel of modern technology, its computing power was off the charges at the time. Even though it only publically ran for less that six months it was stil, a wonder to see.
Jacob would spend hours in the libary and the engineering labs during his first term at the university. His days were fairly normal as any other adults in school. Until a faithful night in July of 1947; he and some friends had been out roaming around bars near the college and gotten likely a bit too drunk, and as drunk people are sometimes he followed a group of people, mostly rather charming woman, home... The next morning he woke with a horrible headache, stepping into the daylight made him sick to his stomach and it felt like his skin was on fire.Come to find out, it was actually several weeks later when he crawled out of that house, he wandered back to his dorm only to find he had been kicked out of the school.
Alone in the world, he made his way from homeless shelter to homeless shelter, sleeping in libraries and trying to avoid the sun as much as possible. The odd thing he went through was he was unable to eat anything to satisfy his hunger, he could eat a whole hogie and nothing, he was still hungry. One night, he was sitting in an alley, unable to sleep he saw another homeless person working on something and they cut themselves. The blood was bright and vibrant to him, it made his mouth water and his desire for it was intense, before he knew it he had drug the woman down the alley into the dark. Hours later he awoke, the woman was dead and there was blood everywhere, but he wasn't hungry anymore. It wasn't long after that, he met some others like him and they told him what happen, he tried to refuse it and fought the idea for many years.
That was eighty-seven years ago. It is truly amazing how technology has changed since ENIAC, and more impressive what people that know what to do with that technology can make to survive.CHARACTERNOTES
[*] Online Name: Ghost in the Machine
[*] First Fell in Love with Computers during ENIAC Unveiling at University of Pennsylvania's Moore School of Electrical Engineering; where he was attending for a degree in Electical Engineering
Equipment
{2}Sig P220 9mm
Difficulty: 8
Damage: 5
Payload: 31
Ammo Carried
{4} Clips Standard
{2} Clips Silver Rounds
{2} Clips Armor Piercing
ClassThree Bullet-Proof Vest
Armor Rating: 3
2007YZF-R1 Motorcycle
Personal Affects
His three bedroom apartment is located above his cybercafe, Jake bought the whole building years ago. There is a Lift and a staircase up to his apartment, a special key is needed, or you can buzz to be let in. The Building has five total floors. The Basement, the Haven (two floors) and the Apartments. The Apartments are split into two levels, each with two three bedroom apartments. Jake lives with Pandora in his Apartment and has no plans to rent the other half of his floor, he is considering renting the other two apartments upstairs.
Ownsa cyber cafe
The Haven (Cyber Cafe)[*]A Cybercafe[*]Two story; coffee shop and quite area on ground floor. Lan Party Facilities on Top Floor[*]Haven Computer Network Identical to Mainframe at house.[*]Haven has secured wireless connectivity and a switch system with a thirty-two port cisco 3800 series router.[*]Loaner computers are rentable at a cost of $28/hour. Systems are up to date with current dell desktop systems.[*]LAN users must pay a $5 cover charge for LAN parties and will be charged an additional $20 for every 3 hours of usage.[*]The Apartment and the cybercafe both have three-hour UPS battery backups on all the computers[*]In addition to the battery backups there is two 45kW Liquid Cooled IntelliGEN� Series propane generators with High Efficiency IntelliGEN Power Management Systemand wireless monitoring.One of the wireless monitors is in Mangers office in the cafe, the other in his computer room upstairs. Generators will run seperately of each other, one kicking on as the other starts to run out of propane.The monitor system reports gas levels.
Apartment has programmed security system with live vid-feed cameras linked to main server. Security system includes Temp and motion sensors, as well as a biometic door lock. All windows have motion and glass break sensors.
Name: Jacob McDonald
Nature: Mediator
Generation: 8th
Player: Teufel Penguin
Demeanor: Optimist
Haven: Apartment in the Cape
Chronicle: Cape Brenton by Night
Clan: Tremere
Concept: Hacker / Slicer
DOB: 10-Feb-1927
Embrace: 18-July-1947
Apparent Age: 20
Sire: Eloise Norman
True Age: 87
Alias Ghost in the Machine
ATTRIBUTES
PHYSICAL SOCIAL MENTAL
Strength *** Charisma *** Perception ****
Dexterity **** Manipulation *** Intelligence ****
Stamina ** Appearance **** Wits ***
ABILITIES
TALENTS SKILLSKNOWLEDGES
Acting ** Drive *** Academics ***
Alertness **** Etiquette ** Computer *****
Athletics ** Firearms ** Computer Hacking *****
Brawl *** Melee *** Finance ****
Dodge ** Music ** Investigation ****
Empathy *** Repair **** Linguistics **
Intimidation * Security *** Science ***
Leadership ** Stealth **
Streetwise *** Survival ***
Subterfuge **
ADVANTAGES
BACKGROUNDS DISCIPLINES VIRTUES
Fame (Hacker name in Hacker Comunity) - 2
Resources - 4
Contacts (Hacker Community) - 2
Generation: 5
MERITS/FLAWS HUMANITY/PATH HEALTH
Eat Food (+)
Concentration (+)
Eidetic Memory (+)
Computer Aptitude (+)
Mechanical Aptitude (+)
Lightning Calculator (+)
Time Sense (+)
Inoffensive to Animals (+)
Humanity***** *
WILLPOWER***** *
BLOODPOOL***** ***** *****
Bruised
Hurt -1
Injured -1
Wounded -2
Mauled -2
Crippled -5
Incapacitated
NON-SPENT EXPERIENCE: 0
DISCIPLINELIST
Auspex ***
Dominate ***
Thaumaturgy ****
Fortitude ***
Presense ****
Thaumaturgy Paths:
Path of Technomancy
The newest path to be accepted bythe Tremere hierarchy as part of the clan's official body of knowledge,the Path of Technomancy is a relatively recent innovation. It wasdeveloped in the latter half of the 20th century, and has not yetspread far beyond the North american Pontifices. The path focuses onthe control of electronic devices, from wristwatches to computers, andits proponents maintain that it is a prime example of the versatilityof Thaumaturgy with regards to a changing world. More conservativeTremere, however, state that mixing Tremere magic with mortal scienceborders on treason or even blasphemy, and some European Regents havegone so far as to declare knowledge of Technomancy grounds forexpulsion from their chantries. The Inner council did approve theintroduction of the path into the clan's grimoires, but has yet tovoice any opinion on the conservative opposition of Technomancy.
* Analyze - Mortalsare constantly developing new innovations and any Vampire who wouldwork Technomancy must be able to understand that upon which hepractices his or her magic. The most basic power of this path allowsthe Tremere to project his perceptions into a device, granting him orher a temporary understanding of its purpose, the principles of itsfunctioning and its mean of operation. This does not grant permanentknowledge, only a momentary flash of insight that fades within minutes.The character must touch the device in order to apply this power. Thispower can also be used to understand a nonphysical technologicalinnovation. In other words, a new piece of computer software
** Burnout -It is usually easier to destroy than to create, and sensitiveelectronics are no exception to this rule. Burnout is used to cause adevice's power supply, either internal or external, to surge, damagingor destroying the target. Burnout cannot be used to directly injureanother individual, although the sudden destruction of a pacemaker or acars fuel injection control chip can create a definite health hazard.
*** Encrypt/Decrypt -Electronic security is a paramount concern of governments andcorporations alike. Those Tremere with techno-savvy enough tounderstand the issues at stake have become quite enamored of thispower, which allows the thaumaturge to scramble a device’s controlsmystically, making it inaccessible to anyone but him/her.Encrypt/Decrypt also works on electronic media; a videotape under theinfluence of this power displays just snow and static if played backwithout the owner’s approval. The character must touch the device ordata container wich he wishes to encrypt.
**** Remote Access -With this discipline, a skilled thaumaturge can bypass the need forphysical contact to operate a device. This is not a form of telekinesis; the Vampire does not manipulate the item’s controls, butrather touches it directly with the power of their mind. This discipline may be used on any electronic device within the character’s line of sight.
RITUALS
Wake with Evening’s Freshness
This ritual takes a half-hour to perform, and involves burning feathers, and spreading the ashes over the sleeping area. The vampire who performs this ritual may awaken at the slightest sign of danger, and the rules involving Humanity, regarding the ability to awaken and remain awake, are waived for the first few turns. Lasts until sunset.
Machine Blitz (Sabbat)
By concentrating on a machine, the vampire can make machines go haywire in the manner of her choosing, but within reasonable behavior for the machine.
Illusion of Peaceful Death (Milwaukee by Night)
This ritual involves dusting a corpse with a white feather, and has the effect of hiding all signs of unnatural death on a corpse, making the deceased appear to have died of natural causes. This will not hide exsanguination; only obvious signs.
Ward Versus Kindred
This ten-hour ritual requires a point of vampire blood, in addition to the object being made into a ward. This object, when touching a vampire, will do three dice of damage, difficulty Stamina + Fortitude of the vampire, and the vampire must spend a willpower point to touch it again. If this ward is placed on a door or an unbroken circle, the vampire will be unable to pass it. If a bullet is warded, then five successes are required on the appropriate Firearms roll to leave the bullet in the body where it will continue doing damage. (This only works on smaller calibers.)
HISTORY
Jacob's love of computers started when he was nineteen, see this was the year that ENIAC was put into process and he was one of the lucky students at the University of Pennsylvania to get to actually see it in action. It was a marvel of modern technology, its computing power was off the charges at the time. Even though it only publically ran for less that six months it was stil, a wonder to see.
Jacob would spend hours in the libary and the engineering labs during his first term at the university. His days were fairly normal as any other adults in school. Until a faithful night in July of 1947; he and some friends had been out roaming around bars near the college and gotten likely a bit too drunk, and as drunk people are sometimes he followed a group of people, mostly rather charming woman, home... The next morning he woke with a horrible headache, stepping into the daylight made him sick to his stomach and it felt like his skin was on fire.Come to find out, it was actually several weeks later when he crawled out of that house, he wandered back to his dorm only to find he had been kicked out of the school.
Alone in the world, he made his way from homeless shelter to homeless shelter, sleeping in libraries and trying to avoid the sun as much as possible. The odd thing he went through was he was unable to eat anything to satisfy his hunger, he could eat a whole hogie and nothing, he was still hungry. One night, he was sitting in an alley, unable to sleep he saw another homeless person working on something and they cut themselves. The blood was bright and vibrant to him, it made his mouth water and his desire for it was intense, before he knew it he had drug the woman down the alley into the dark. Hours later he awoke, the woman was dead and there was blood everywhere, but he wasn't hungry anymore. It wasn't long after that, he met some others like him and they told him what happen, he tried to refuse it and fought the idea for many years.
That was eighty-seven years ago. It is truly amazing how technology has changed since ENIAC, and more impressive what people that know what to do with that technology can make to survive.CHARACTERNOTES
[*] Online Name: Ghost in the Machine
[*] First Fell in Love with Computers during ENIAC Unveiling at University of Pennsylvania's Moore School of Electrical Engineering; where he was attending for a degree in Electical Engineering
Equipment
{2}Sig P220 9mm
Difficulty: 8
Damage: 5
Payload: 31
Ammo Carried
{4} Clips Standard
{2} Clips Silver Rounds
{2} Clips Armor Piercing
ClassThree Bullet-Proof Vest
Armor Rating: 3
2007YZF-R1 Motorcycle
Personal Affects
His three bedroom apartment is located above his cybercafe, Jake bought the whole building years ago. There is a Lift and a staircase up to his apartment, a special key is needed, or you can buzz to be let in. The Building has five total floors. The Basement, the Haven (two floors) and the Apartments. The Apartments are split into two levels, each with two three bedroom apartments. Jake lives with Pandora in his Apartment and has no plans to rent the other half of his floor, he is considering renting the other two apartments upstairs.
Ownsa cyber cafe
The Haven (Cyber Cafe)[*]A Cybercafe[*]Two story; coffee shop and quite area on ground floor. Lan Party Facilities on Top Floor[*]Haven Computer Network Identical to Mainframe at house.[*]Haven has secured wireless connectivity and a switch system with a thirty-two port cisco 3800 series router.[*]Loaner computers are rentable at a cost of $28/hour. Systems are up to date with current dell desktop systems.[*]LAN users must pay a $5 cover charge for LAN parties and will be charged an additional $20 for every 3 hours of usage.[*]The Apartment and the cybercafe both have three-hour UPS battery backups on all the computers[*]In addition to the battery backups there is two 45kW Liquid Cooled IntelliGEN� Series propane generators with High Efficiency IntelliGEN Power Management Systemand wireless monitoring.One of the wireless monitors is in Mangers office in the cafe, the other in his computer room upstairs. Generators will run seperately of each other, one kicking on as the other starts to run out of propane.The monitor system reports gas levels.
Apartment has programmed security system with live vid-feed cameras linked to main server. Security system includes Temp and motion sensors, as well as a biometic door lock. All windows have motion and glass break sensors.