Apps and Software

Table of Contents

Applications and Programs

Much like in our world, Athas’ population has access to hundreds of thousands of apps for their comms and computers. Think of one we have in our world and Athas has one that similar, but also works in either AR or VR. The Apps and Programs in the chart above and described below are those specific to Computer Combat and Hacking. Just because Duo Maps isn’t listed doesn’t mean your character will get lost in the labyrinthine streets of Tyr or New Urik.

Name
Attack Programs  PP  Size  Description  Price
Sword 1 2Su 1d6 DMG 200c
Bomb 2 4Su 2d6 DMG 500c
Burrow Worm 2 4Su 1d4 DMG/Rnd 500c
Snipe 3 10Su 3d6 DMG 1200c
Hijack 1 2 20Su Allows you to Hijack a compromised computer +2 800c
Hijack 2 4 40Su allows you to Hijack a compromised computer +4 1200c
Hijack 3 8 120Su Allows you to Hijack a compromised computer +6 1600c
Hijack 4 12 200Su allows you to Hijack a compromised computer +8 2200c
Defense Programs PP Size Description Price
Shield 1 2Su +2 AC 200c
Armor 2 6Su +4 AC 600c
Brick and Mortar 1 5Su 1d6 DMG repaired 300c
Salve 2 4Su 1d4 DMG/Rnd repaired 500c
Firewall Programs PP Size Description Price
Tier 1 2 6Su 25 HP 100c
Tier 2 3 12Su 40 HP 250c
Tier 3 4 50Su 80 HP 750c
Tier 4 6 500Su 120 HP 1500c
Utility Programs PP Size Description Price
Stealth 1 10Su Allows Stealth 500c
Traceroute 1 10Su Allows Tracking 500c
Spoof IP 1 10Su Counters Tracking 500c
Search Aggregate 3 7Su Track keywords and mentions 200c
System Scan 1 2Su Allows Perception 200c
VR Interface 5 50Su Allows VR Interaction 500c
Hydra Interface 5 25Su Allows the control of multiple computers 1500c

Attack Programs

Sword: This is your basic attack program. You can only have one Sword app running at once, but as long as it is running you can “inflict” the listed damage on any firewall. Double damage on a critical confirmation.

Bomb: Another attack program, but its damage is over an area. At base, it affects a 10′ radius. Upon a critical hit, it expands to 20′ as well as doing double damage.

Burrow Worm: As the name implies, this program “burrows” through a target (firewalls more specifically, but any target). Upon a successful hit, the damage is inflicted over a number of rounds equal to your Int modifier. You can execute this any time, but its effects do not stack. So if the effects are still damaging the target, you do not do extra damage, but you do extend the duration the same number of rounds from that round forward.

Snipe: This is a heavy hitting attack that can be done at “long range” or point blank (or same session, player’s preference). If done point blank, the player rolls damage normally, but because it was activate “on the fly” it takes time to refresh. Thus, it can only be used every 3 rounds. If done “long range”, the program must be used in sync with Traceroute (detailed below). Once your quarry is found, it sets up an automatic remote session. You can “fire” at this range repeatedly until the connection is severed. Repeated is not just rolling damage over and over, instead you roll damage and the target gets a chance to sever. If they don’t, then you can roll damage again, but they get a chance to sever again. To sever the connection, the player must beat your RDB with a Computer Use or Disable Device roll using their RAM as a bonus.

Hijack: This program does what it says on the tin. As detailed in Computer Combat and Hacking, this is the program you need to take over a compromised computer or network. Without this, you cannot attempt to take over the computer or network.

Defense Programs

Shield: While running, this program provides the listed bonus to AC. This stacks with the Armor program provided you have enough processing power to be running both.

Armor: While running, this program provides the listed bonus to AC. This stacks with the Shield program provided you have enough processing power to be running both.

Brick and Mortar: This program heals or temporarily adds to your firewall. If damaged, roll a Computer Use to activate this program DC 20. If you meet or beat the DC, you heal the listed damage to your Firewall. For every 4 you roll over, you can add an additional 1d6 to the healed damage. This is NOT cumulative. You roll once and take the result. If you do not meet at least the DC 20, the program did not execute. If your firewall has not been damaged yet, you can use the “healing” to bolster it temporarily. Same DC, same bonus for rolling higher. Lasts 2d4 rounds.

Salve: This is the opposite of Burrow Worm. This heals 1d4 damage per round for a number of rounds equal to your Int modifier.

Firewall Programs

These are pretty straightforward. Each tier provides your device with a firewall with the listed number of HP. Once that HP reaches 0, as stated in Computer Combat and Hacking, your device is susceptible to Hijack. Once at 0, your firewall needs to reboot. Here are the reboot times.

Firewall Programs Reboot
Tier 1 2
Tier 2 3
Tier 3 4
Tier 4 5

You can attempt an “Essential Process Only” (EPO) reboot, because seriously who needs that fucking virus scan when they’re about to take over your rig?!? Get the f-ing firewall up goddammit! To do so, roll a Computer Use at TN 20 + the PP of the firewall. If you succeed, you get the firewall back up at 1/2 HP on your turn, regardless of where it was in the boot process. If you do not, it continues to fully boot. If you succeed, your firewall still reboots and will regain full HP (minus any taken damage in between) once the full boot and full number of rounds completes.

Utility Programs

Stealth: This masks your presence in a session. Upon activation, you are granted Stealth as a skill with ranks equal to your Computer Use or Disable Device, whichever is higher. Like with Stealth, you can be spotted/detected with a Perception or System Scan Program (detailed below).

Traceroute: This program allows you to track other Users who either disconnected from your session or are moving through the Network/Internet. Upon activation, you are granted Survival to use for Tracking as a skill with ranks equal to your Computer Use or Disable Device, whichever is higher. You can counter this with Spoof IP.

Spoof IP: This program allows you to shake tracking programs. Upon activation, you are granted Survival to use for Tracking as a skill with ranks equal to your Computer Use or Disable Device, whichever is higher. If you are being actively tracked, you roll this vs the person using Traceroute. Whoever rolls higher, wins. Just because they might have beat you doesn’t mean they attack you. They only know where you have gone and must go to where you are and start a session (combat).

Search Aggregate: Allows you to set a search query looking for specific keywords or phrases. It alerts you when these parameters are met.

System Scan: This program allows you to search you system or your immediate area for any intrusions. Upon activation, you are granted Perception skill with ranks equal to your Computer Use or Disable Device, whichever is higher. You can use this as you would use Perception in the real world, but on your system or in a session.

VR Interface: This allows you to use your computer to go into the Cyberplane remotely. It creates an Avatar and sets up your UI. See VR Combat for details about what happens with the Avatar created by this program.

Hydra Interface: Allows for the multiple use of several computers. Each computer must run its own applications and programs and be capable of doing so. Each computer is an autonomous entity. You can control an number of computers equal to the Processor bonus of the computer running the Hydra Interface.

VR Avatars

Avatar AC STR DEX CON Description
Brute 16 18 12 16 Basic “Fighter” Avatar
Stalker 14 12 18 14 A Rogue-Like Avatar
Meat-Shield 20 14 12 18 A tank-figther Avatar
The Wiz 12 12 12 14 A Wizard-Like Avatar
Sniper 14 12 18 16 A Ranged DPS Avatar

To use any of the above Avatars, you first need the VR Interface app running on your computer or communicator. Once that is done, you may select any of the Avatars above and they are considered “Level 1”, or the mimic of that class at level 1. You can increase the level of the Avatar by rolling a Computer Use check (TN 20). This is NOT cumulative and you only get 1 roll. If you do not beat the TN of 20, the Avatar remains at its base level 1. For every 2 you roll over the TN, you can increase the base level by 1. For example, if you rolled a 27 on your roll, you can increase the base level of your avatar by 3 (so total level 4). This level boost lasts for 1 session.

You can permanently raise the level of your Avatar, thus raising the base level from 1, by making a Computer Use check at TN 45. This roll is cumulative and each roll you make is 1 day of work. Once done, you raise it by 1, permanently. You can try to raise it permanently again, but another roll at TN 45 must be made with each roll counting as another day of work. Your avatar cannot have a permanent base level higher than your base ranks in Computer Use. For example, if you have 3 ranks in Computer Use (without Int modifier or trained bonus), you can only raise your avatar to level 3.

Avatar Descriptions

Because of the nature of the VR world, these avatars (and their descriptions and skills) will be very MMO-like. This is because unless you physically enter the Cyberplane you are using a computer-generated avatar with a pre-determined set of skills and abilities. Nonetheless, each avatar has a “Base Class” and depending on the avatar’s level (permanent or augmented) they will receive the same BAB and Saves as that Base Class’ for that level, e.g. if Fighter is the base class and you are level 4 (permanent or augmented for the session), then you get all of the Fighters BAB (and number of attacks) and Saving throw bases. This also applies to Feat Selection.

Additionally, each avatar comes with scores in the 3 primary “physical” Attributes. All rules apply for those various attribute bonus. Also, as mentioned in VR Combat, you can augment these Attributes, and others, using the TNs in the chart below. To determine the HP of your Avatar, you take their Con and multiply it by your Avatar’s level and add the standard Con bonus for each level. For example, the Brute will have 16 +3 HP / level.

Name Benefit TN
Augment Ability +4 to any one Ability 30
Augment Speed +10 to Movement Speed 30
Augment Accuracy +2 to BAB 25
Augment Force +2 to Damage 25
Augment Presence +4 to all Saving throw rolls 30
Enhance Magic/Psionics +2 to damage for your Avatar’s Powers 25
Enhance Defenses +3 to AC 30
Enhance Touch Interface Allows the chance to use Touch Interface anywhere, not just at pre-designated nodes 35

Building your Avatar is very close to building a completely other character. The only thing that carries over to your Avatar is your Mental Attributes and your Skill ranks. If a skill is physical, it will use the attribute bonus of your avatar. If the skill is mental, you will use your Attribute bonus. Some Avatars do grant some skills, which will be a full rank and usually tied to their ability scores, but you can use any skill you have as well.

Each Avatar is detailed with these fields:

Name: Name of the Avatar
AC: Armor class of the Avatar. This can be augmented by the Armor and Shield programs.
Attributes: a quick list of the attributes that appear in the chart above
Base Class: the base class of the Avatar which will affect its BAB (or Proficiency Bonus for 5e) and Saving Throw Progression.
Skills: Any skill granted by the Avatar. They automatically come with a number of ranks equal to the Avatar’s level.
Attacks: This is the base damage dealing ability of the Avatar and can be used at any time on that player’s turn. Just like with normal classes, you can gain multiple attacks from high BAB. If a power says at any point that it does “weapon damage”, this is the weapon it’s talking about.
Powers: A list of what the Avatar can do. This mimics some of the Base Class’ abilities, but sometimes it just grants feats.

The Brute

AC: 16
Attributes: STR: 18 | DEX: 12 | CON: 16
Base Class: Barbarian
Skills: None
Attacks: 2-handed sword at 2d6 damage +1.5 STR bonus
Powers:

Rage: Same as Barbarian class. It also progresses to Greater Rage at the same level.
Rage Powers: At level 1 you select one. You gain others as your avatar levels through the Base Class.
Swipe: Frontal AOE attack. You do weapon damage to up to 6 enemies in front of you.

The Stalker

AC: 14
Attributes: STR: 12 | DEX: 18 | CON: 14
Base Class: Rogue
Skills: Stealth
Attacks: 2 daggers, dual wield, 1d4 damage each. -2/-2 to attack
Powers:

Evasion: Just like the Rogue ability. It also increases to Improved Evasion at the same level.
Ambush: A devastating attack from Stealth that does 4d6 + 1d6 every 2 levels damage. Must be done from Stealth.
Shadow Step: Instantly teleport behind your target and attack with Ambush. Must be done from Stealth.

The Meat-Shield

AC: 20
Attributes: STR: 14 | DEX: 12 | CON: 18
Base Class: Paladin
Skills: None
Attacks: 1-hand weapon (players choice) at 1d8 + STR bonus damage and Shield (no damage)
Powers:

Taunt: Forces all enemies to attack you for 1d4 rounds.
Vigilance: Grants +3 to AC and 3d6 HP for 1d4 rounds
Intervene: Instantly teleport to a friendly target and takes their damage. You may not go again until your turn, but you may use this before your turn if a friendly target is taking damage and only once per round.

The Wiz

AC: 12
Attributes: STR: 12 | DEX: 12 | CON: 14
Base Class: Wizard/Cybermage
Skills: Spellcraft
Attacks: Wand, ranged attack at 1d4 damage, 60′ range increment
Powers:

Bolt: A single attack that does 1d6 + INT bonus damage. You may use your INT Bonus in place of DEX bonus to hit. This raises to 2d6 at level 7 and again to 4d6 at level 12.
Elemental Storm: An AOE attack that does 1d6/level (no cap) damage to a 20′ area. You can choose which classical element applies.
Teleport: This works 2 ways depending if your in combat. If you are out of combat, you can teleport anywhere in line of sight. If you are in combat, you roll a Spellcraft at DC 15. For every 1 you roll over, you can teleport that many feet away from whatever is attacking you.

The Sniper

AC: 14
Attributes: STR: 12 | DEX: 18 | CON: 16
Base Class: Ranger
Skills: Survival and Stealth
Attacks: Short sword and handaxe, dual wield, 1d6 each. -2/-2 to attack. OR Longbow at 1d8 damage, 100′ range increment.
Powers:

Snipe: While in stealth, you can make a single range attack that does 2d6/level. The Range Increment for this power is 100′.
Rapid Shot: for a full round you rapidly fire your bow at a single target. You roll one attack. If you hit, you fire a number of arrows equal to your INT bonus x 2, minimum 2. Roll damage for each arrow that hits individually. If you miss, well, you miss.
Spike Trap: Place a trap on the ground in a 10′ diameter area. If an entity passes through it, it immediately takes 3d6 damage and is Snared and cannot move. It can take normal actions, such as attack actions, but cannot move. The 10′ diameter is a sphere and affects any area within the 3 dimensional sphere.

Applications and Programs

Much like in our world, Athas’ population has access to hundreds of thousands of apps for their comms and computers. Think of one we have in our world and Athas has one that similar, but also works in either AR or VR. The Apps and Programs in the chart above and described below are those specific to Computer Combat and Hacking. Just because Duo Maps isn’t listed doesn’t mean your character will get lost in the labyrinthine streets of Tyr or New Urik.

Name
Attack Programs PP RAM Description Price
Sword 1 2 Medium (4) damage 200c
Bomb 2 3 Medium (4) damage to 3m diameter area 500c
Burrow Worm 2 3 Light (2) damage every round for 1d6 rounds 500c
Snipe 3 4 Heavy (8) damage 1200c
Hijack 1 2 2 Allows you to Hijack a compromised computer +2 800c
Hijack 2 4 3 allows you to Hijack a compromised computer +4 1200c
Hijack 3 8 4 Allows you to Hijack a compromised computer +6 1600c
Hijack 4 12 6 allows you to Hijack a compromised computer +8 2200c
Synapse Overload 3 3 Overloads the synapses of anyone with cybernetics installed causing 4 damage instantly 2200c
Overheat 3 3 Anyone with cybernetics installed takes 3 damage over 1d6 rounds 2200c
Defense Programs PP RAM Description Price
Shield 1 2 Active. Provides defense asset 200c
Armor 2 N/A Passive. Provides 1 armor to your avatar 600c
Brick and Mortar 1 3 1d6 DMG repaired to firewall 300c
Salve 2 3 1d4 DMG/Rnd repaired to firewall 500c
Firewall Programs PP RAM Description Price
Tier 1 2 N/A Passive, a 12 hp firewall 100c
Tier 2 3 N/A Passive, a 18 hp firewall 250c
Tier 3 4 N/A Passive, a 24 hp firewall 750c
Tier 4 6 N/A Passive, a 30 hp firewall 1500c
Utility Programs PP RAM Description Price
Stealth 1 N/A Passive. Allows Stealth 500c
Traceroute 1 1 Allows Tracking 500c
Spoof IP 1 1 Counters Tracking 500c
Search Aggregate 3 2 Track keywords and mentions 200c
System Scan 1 N/A Passive.  Allows Perception 200c
VR Interface 5 N/A  Passive.  Allows VR Interaction 500c
Hydra Interface 5 1 RAM/Device Passive.  Allows the control of multiple computers 1500c

Attack Programs

Sword: This is your basic attack program. You can only have one Sword app running at once, but as long as it is running you can “inflict” the listed damage on any firewall. Double damage on a critical confirmation.

Bomb: Another attack program, but its damage is over an area. At base, it affects a 10′ radius. Upon a critical hit, it expands to 20′ as well as doing double damage.

Burrow Worm: As the name implies, this program “burrows” through a target (firewalls more specifically, but any target). Upon a successful hit, the damage is inflicted over a number of rounds equal to your Int modifier. You can execute this any time, but its effects do not stack. So if the effects are still damaging the target, you do not do extra damage, but you do extend the duration the same number of rounds from that round forward.

Snipe: This is a heavy hitting attack that can be done at “long range” or point blank (or same session, player’s preference). If done point blank, the player rolls damage normally, but because it was activate “on the fly” it takes time to refresh. Thus, it can only be used every 3 rounds. If done “long range”, the program must be used in sync with Traceroute (detailed below). Once your quarry is found, it sets up an automatic remote session. You can “fire” at this range repeatedly until the connection is severed. Repeated is not just applying damage over and over, instead the target takes the damage and then you roll your Computer check again to prevent the target from severing the connection. If they don’t, then you can apply damage again, but they get a chance to sever again.

Hijack: This program does what it says on the tin. As detailed in Computer Combat and Hacking, this is the program you need to take over a compromised computer or network. Without this, you cannot attempt to take over the computer or network.

Synapse Overload:  This affects “real world” targets.  Meaning, Sword, Bomb, and Burrow Worm only affect programs, entities and objects in the Cyberplane.  This program affects those who have any sort of cybernetic installed, which is almost everyone who isn’t dependent on magic and even they might have enough.  This is done in the AR layer and is treated like an “attack”, meaning roll versus the target’s level as you would with any other “targeted” damaging ability.

Overheat:  This program is like Synapse Overload, but does its damage over time.

Defense Programs

Shield: An active program that provides you with an asset to defense.

Armor: While running, this program provides the listed bonus to AC. This stacks with the Shield program provided you have enough processing power to be running both.

Brick and Mortar: This program heals or temporarily adds to your firewall. If damaged, roll a Computer Use to activate this program level 4(12). If you succeed, you heal the listed damage to your Firewall. For every 4 you roll over, you can add an additional 1d6 to the healed damage. This is the same if you lowered the level by training, assets, etc., which you can normally. If you do not succeed on the roll, the program did not execute. If your firewall has not been damaged yet, you can use the “healing” to bolster it temporarily. Same level, same bonus for rolling higher. Lasts 2d4 rounds.

Salve: This is the opposite of Burrow Worm. This heals 1d4 damage per round for a number of rounds equal to your Int modifier.

Firewall Programs

These are pretty straightforward. Each tier provides your device with a firewall with the listed number of HP. Once that HP reaches 0, as stated in Computer Combat and Hacking, your device is susceptible to Hijack. Once at 0, your firewall needs to reboot. Here are the reboot times.

Firewall Tier Reboot
Tier 1 2
Tier 2 3
Tier 3 4
Tier 4 5

You can attempt an “Essential Process Only” (EPO) reboot, because seriously who needs that fucking virus scan when they’re about to take over your rig?!? Get the f-ing firewall up goddammit! To do so, roll a Computer check versus the tier of the firewall (so 3 for tier 1, 12 for tier 4). If you succeed, you get the firewall back up at 1/2 HP on your turn, regardless of where it was in the boot process. If you do not, it continues to fully boot.  Your firewall still reboots and will regain full HP once the full boot and full number of rounds completes.

Utility Programs

Stealth: This masks your presence in a session. Upon activation, you are granted Stealth as a skill. Like with Stealth, you can be spotted/detected with a Perception or System Scan Program (detailed below).

Traceroute: This program allows you to track other Users who either disconnected from your session or are moving through the Network/Internet. Upon activation, you are granted Tracking as a skill. You can counter this with Spoof IP.

Spoof IP: This program allows you to shake tracking programs. Upon activation, roll a Computer check versus the level of the program/entity that is attempting to track you.  Failure means, they only know where you have gone and must go to where you are and start a session (combat).  Success means they couldn’t trace where you scurried off to.

Search Aggregate: Allows you to set a search query looking for specific keywords or phrases. It alerts you when these parameters are met.

System Scan: This program allows you to search your system or your immediate area for any intrusions. Upon activation, you are granted Perception skill. You can use this as you would use Perception in the real world, but on your system or in a session.

VR Interface: This allows you to use your computer to go into the Cyberplane remotely. It creates an Avatar and sets up your UI. See VR Combat for details about what happens with the Avatar created by this program.

Hydra Interface: Allows for the multiple use of several computers. Each computer must run its own applications and programs and be capable of doing so. Each computer is an autonomous entity. You can control an number of computers equal to the RAM of the computer running the Hydra Interface.

VR Avatars

Avatar Level Description
Brute 4 Basic “Fighter” Avatar
Stalker 4 A Rogue-Like Avatar
Avenger 4 A tank-figther Avatar
The Wiz 4 A Wizard-Like Avatar
Sniper 4 A Ranged DPS Avatar

To use any of the above Avatars, you first need the VR Interface app running on your computer or communicator. Once that is done, you may select any of the Avatars above. You can increase the level of the Avatar by rolling a Computer Use check level 6 (18), or the Augment Presence hack detailed below.

You can permanently raise the level of your Avatar, thus raising the base level from 4, by making a Computer Use check at level 8(24). You may lower the level through training, assets, etc. and each roll you make is 1 day of work. Once done, you raise it by 1, permanently. You can try to raise it permanently again, but another roll at level 8(24) must be made with each roll counting as another day of work. Your avatar cannot have a permanent base level higher than your own tier. Though they do still start at level 4 and are available to tier 1-3 characters.

Avatar Descriptions

Because of the nature of the VR world, these avatars (and their descriptions and skills) will be very MMO-like. This is because unless you physically enter the Cyberplane you are using a computer-generated avatar with a pre-determined set of skills and abilities.

Name Benefit TN
Augment Ability +4 to any Pool or +1 Edge to any Pool 5 (15)
Augment Speed +10 to Movement Speed 4 (12)
Augment Accuracy Gives an asset to attack in combat for that session 6 (18)
Augment Force +2 to Damage 5 (15)
Augment Presence Increase the Base level of the Avatar by 1d6 6 (18)
Enhance Magic/Psionics +2 to damage for your Avatar’s Powers 25
Enhance Defenses Provides 1, 2, or 3 armor for that session. TNs are listed respectively 4 (12), 5(15), 6(18)
Enhance Touch Interface Allows the chance to use Touch Interface anywhere, not just at pre-designated nodes 3 (9)

Building your Avatar is very close to building a completely other character. The only thing that carries over to your Avatar is your Mental Attributes and your Skills. You cannot use any special abilities granted by your type or focus, nor can you use any skills that would affect the “real world”. You may use any computer skills you have, deduction and perception skills, or social interaction skills. Otherwise, you’re stuck with what your chosen avatar can do.

Each Avatar is detailed with these fields:

Name: Name of the Avatar
Level: Armor class of the Avatar. This can be augmented by the Armor and Shield programs.
Attributes: a quick list of the attributes that appear in the chart above
Attacks: This is the base damage dealing ability of the Avatar and can be used at any time on that player’s turn. Just like with normal classes, you can gain multiple attacks from high BAB. If a power says at any point that it does “weapon damage”, this is the weapon it’s talking about.
Powers: A list of what the Avatar can do. This mimics some of the Base Class’ abilities, but sometimes it just grants feats.

The Brute

Level: 4
Attacks: 2-handed sword at Heavy Damage (6)
PowersRage: When Firewall drops below 50%, +2 to damage done by 2-handed sword.
Swipe: Frontal AOE attack. You do weapon damage to up to 6 enemies in front of you.

The Stalker

Level: 4
Attacks: 2 daggers, dual wield, Light Damage (2)
Powers:  Ambush: A devastating attack from Stealth that does 12 damage. Must be done from Stealth meaning the Stealth program must be active.
Shadow Step: Instantly teleport behind your target and attack with Ambush. Must be done from Stealth.

The Avenger

Level: 4
Attacks: 1-hand weapon (players choice) at Medium Damage (4) and Shield (no damage, but you don’t need the Shield app to be running)
Powers:  Taunt: Forces all enemies to attack you for 1d6 rounds.
Vigilance: Grants +1 to Armor and 3d6 HP for 1d6 rounds.
Intervene: Instantly teleport to a friendly target and takes their damage. You may not go again until your turn, but you may use this before your turn if a friendly target is taking damage and only once per round.

The Wiz

Level: 4
Attacks: Arcane Bolt, ranged attack at Medium Damage (4), 60′ range increment
PowersAugment Bolt:  For each level you raise this avatar, you gain an additional +1 to Arcane Bolt’s damage.
Elemental Storm: An AOE attack that does 2/level (no cap) damage to a 20′ area. You can choose which classical element applies.
Teleport: This works 2 ways depending if your in combat. If you are out of combat, you can teleport anywhere in line of sight. If you are in combat, you roll a Computer check versus the level of your Avatar. For every 1 you roll over, you can teleport that many feet away from whatever is attacking you.

The Sniper

Level: 4
Attacks: Short sword and handaxe, dual wield, Medium Damage (4). OR Longbow at Heavy Damage (6), 100′ range increment.
PowersSnipe: While in stealth, you can make a single range attack that does 6/level. The Range Increment for this power is 100′.
Rapid Shot: for a full round you rapidly fire your bow at a single target. You roll one attack. If you hit, you fire a number of arrows equal to your Level. Roll damage for each arrow that hits individually. If you miss, well, you miss.
Spike Trap: Place a trap on the ground in a 10′ diameter area. If an entity passes through it, it immediately takes 6 damage and is Snared and cannot move. It can take normal actions, such as attack actions, but cannot move. The 10′ diameter is a sphere and affects any area within the 3 dimensional sphere.