To put it simply, there are far, far too many programs to learn in a natural way. This is because, in your timeline, Acts and Programs in the Matrix are separate from skills, but also depend on skills. So, enough of this. I cannot explain these to you easily without ripping apart the veil that separates your reality of pen and paper from mine of code. Below is a table of all the actions, what Complex Form they need, and what the roll is to use those skills. Any actions or Complex Forms with a link have too many details to be simplified in a table.
Below this table will be a list of the most to least important Complex Forms, based on how many skills need them. Additionally, this list will mark what Complex Forms are unnecessary. I do not use this term lightly. Unnecessary explicitly means that you can use a Commlink instead.
Action | Time | Skill/Stats | Complex Form | Test Roll |
---|---|---|---|---|
Alter/Swap Icon | Free | System | - | - |
Change Linked Device Mode | Free | System | - | - |
Detect Active/Passive Wireless Nodes | Free | System | - | - |
Jack Out | Free | System | - | - |
Switch Interface Mode | Free | System | - | - |
Terminate Data Transfer | Free | System | - | - |
Transmit Phrase | Free | System | - | - |
Analyze Icon/Node | Simple | Computer | Analyze | Computer + Analyze |
Call/Dismiss Sprite | Simple | Compiling | - | - |
Deactivate Program | Simple | System | - | - |
Decrypt | Simple | System | - | - |
Encrypt | Simple | Electronic Warfare | Encrypt | - |
Issue Command | Simple | System | - | - |
Jump In | Simple | System | - | - |
Log Off | Simple | System | - | - |
Observe In Detail | Simple | System | - | - |
Transfer Data | Simple | System | - | - |
Capture Wireless Signal | Complex | Electronic Warfare | Sniffer | E.Warfare + Sniffer (3) |
Compile Sprite* | Complex | Compiling | - | - |
Control Device | Complex | Object Dependant | Command | O.Dep + Command |
Crash Node | Complex | Hacking | Exploit | Hacking + Exploit (Sys+Firewall; +4 after first Crash.Node) |
Crash Program | Complex | Hacking | Exploit | Hacking + Exploit |
Data Search* | Complex | - | - | - |
Decompile a Sprite* | Complex | Decompiling | - | - |
Detect Hidden Node (General) | Complex (1 Combat Turn per Roll) | Electronic Warfare | Scan | E. War + Scan (15+) |
Detect Hidden Node (Specific) | Complex | Electronic Warfare | Scan | E. War + Scan (4) |
Disarm Data Bomb | Complex | Hacking | Disarm | Hacking + Disarm |
Edit | Complex | Computer | Edit | Computer + Edit |
Hack on the Fly | Complex (Complex Action per Roll) | Hacking | Exploit | Hacking + Exploit (target Firewall) |
Initiate Cryptanalysis | Complex (1 Combat Turn per Roll) | Electronic Warfare | Decrypt | E. War + Decrypt (Encrypt Rating x 2) |
Intercept Traffic (Eavesdrop) | Complex | Hacking | Sniffer | Hack + Sniffer |
Jam Signal* | Complex | - | - | - |
Log On | Complex | - | - | - |
Matrix Attack | Complex | Cybercombat | Atk, Blk.Hammer, or Blkout | C.Combat + [Atk] |
Reboot | Complex (1 Combat Turn per Roll) | System, Response | - | Sys + Response (10) |
Redirect Trace | Complex | Hacking | Spoof | Hacking + Spoof |
Repair Icon | Complex (Complex Act per Roll) | Computer | Medic | Comp + Med (Damage x 2) |
Run Program | Complex | - | - | - |
Set Data Bomb | Complex | - | Data Bomb | - |
Spoof Command | Complex | Hacking | Spoof | Hack + Spoof |
Trace User | Complex (Complex Act per Roll) | Computer | Track | Comp + Track (10) |