User blog comment:Jojo-a-gogo/ What would your nen ability be?/@comment-26378703-20150718044436

Manipulator power: SysAdmin My last Nen power idea was not too well thought out and contained many problems, so this is my second idea and much more balanced and thought out .How to activate and basic conditions..In order for this power to work I must first gain physical access to a computer on a local network, I attach my nen to the computer and it spreads throughout the network more centralized systems in the network speed up this process. .Ability: Malware.Once I fully infiltrate the network I am able to retrieve information from it directly into my memories as well as alter or delete it in the system .Ability: Virus.This ability allows me to access and control any physical device connected to the system including: cameras,microphones, speakers, turrets, motion sensors, access control doors, even the thermostat and fire system if it's networked. When controlling cameras and motion sensors they function as my own eyes sending visual signals directly to my brain as with all other input devices on the system. All devices on the network function as En to a limited capacity allowing me to tell only where each device is and if it's in use. (Has limitations when used with my next ability, Trojan, but I'll cover that later) .Ability: Trojan.This ability allows me to manipulate a specific device that it stays under my influence and continues to provide me with information from the network until it is removed. I can only have 3 of these at any given time adding a 4th disables the oldest one automatically (same drawbacks and limitations apply to this ability as my hacker ability further down) .Ability: system failure.This ability is quite simple any device on the network I am infiltrating (does not work with Trojan) can be detonated much like a mine, and will fail to kill anybody shrouding themselves with minimal aura, but will almost certainly kill non Nen users .Ability: Hacker.This ability allows me to infiltrate any system on the Internet from anywhere however there are major conditions that must be met and my influence is limited. To gain access with my nene at first have in my knowledge a valid login ID and password as well as the IP address and MAC address of the device I connect to, it also must be connected to the Internet, when I connect I am only able to spread my nen to the systems that are 1 degree of separation from my initial intrusion and can not spread any further. When connected in this fashion each sensory device must replace one of my own meaning if I choose to access 2 cameras or motion sensors, they replace the use of my eyes and I can't use them in my current location, same goes for microphones and ears. One speaker can be assigned to my vocal cords. Door controls and turrets link to my legs and arms allowing me a total of 9 devices on the network, these devices will also not work as En. I am also unable to alter information just receive it. This ability functions much like Trojan except previously accessing the network physically negates my need for the required information to connect .Ability: Skynet.This is an emmiter ability that allows me to fire nen bullets out of turrets if standard rounds are depleted. .Ability: Keylogger.This ability is nothing more than a mass dump of information onto a target device or network, information gathered from one network that's ready to sell can simply be dumped into a system in targeted locations that I am aware of before use of this ability or just a dump it wherever, the benefit of this ability is once I start it I can leave and it does it for me .Drawbacks.While using this power I am confined to within 3 meters of my initial entry point. If infiltration is interrupted for any reason I must go higher such as to the router or the server to make another attempt, if an attempt is failed at the central system I can never gain full access to it, but can gain access in multiple individual devices provided I am within 3 meters of all the devices I infiltrate, and my nen can not spread beyond those devices. When using hacker on a system remotely my real body is unable to use its sensory organs or limbs that are assigned to a device leaving me at worst blind crippled deaf and mute. .Use and intent.These abilities are designed mainly for government and possibly corporate espionage, but can be deployed for theft. This ability is best used with a small group of people to relay them information making their task able to be executed flawlessly. .Strengths.Because manipulators generally have poor defense this removes me from the front lines allowing me to take a support role and mitigates my danger for the most part. The way I access the system allows me to leave no trace of my being there and remove any evidence that my accomplices were there either.