Okay, after reconfiguration and updating with all the warez Granny buys from Shan the cluster ends up looking like this.
Sculpting: An extremely hi-res scan of the stone circle at Calanais on the Isle of Lewis. Various stones represent slaved nodes, resident programs, IC etc. Which stone is which is often very dificult to determine from moment to moment as IC uses Stealth to disguise itself as files, ordinary Programs or pure sculpting.
Hardware: In Granny's quarters in Whampoa hang the additional 15 Rail Drones she purchased to outfit the other five buses that were to be added to her imaginary 'fleet.'
Cracked open like alien shellfish and wired together with yards of glowing fibreoptics they are a strange chaotic sight to behold.
Ares Sentinel 'R' Rail Drones x 8, Cluster Nexus (Persona Limit: 8 Program Limit: 16), SatCom module.
Ares Sentinel 'R' Rail Drones x 7, Cluster Slave Nodes.
Authentication: Passcode
Privileges: Standard, no legitimate Admin Accounts.
Attributes:Nodes 1-7: Response 4, Signal (-), Firewall 6, System 4
Node 8: Response 4, Signal (

, Firewall 6, System 4
Spiders: 1 Rating 6 Data Sprite, Obfuscating Access Log.
IC: 2 Singularity Encore IC 4 patrolling node 8, 3 Singularity Encore IC 4 guarding node 8, 1 Singularity Encore IC 4 performing rotating signals encryption and Access ID spoofing, 1 Singularity Encore IC 4 as a Utility construct.
Resident Programs:Node 1-7: Singularity Encore IC 4:
Patrol x 2
- Command, Analyse, Scan @ Rating 6 with Optimization (3), Virus Resistance (6) and Ergonomic options.
- Sniffer, Spoof and Track @ Rating 6 with Optimization (3), Mute and Ergonomic options.
- Homeground 5 Autosoft with Optimization (1) option.
Guards x 3
- Analyse, Armour and Stealth @ Rating 6 with Optimization (3), Virus Resistance (6) and Ergonomic options.
- Cascading 3 and Expert Offense 3 Autosofts.
- One with Blackout and Attack 6 with Optimization (3) and Area (3) options.
- One with Blackout and Attack 6 with Optimization (3) and Armour Piercing (3) Options.
- One with Nuke 6 with Optimization (3) and Armour Piercing (3) options and Disarm 6 with Optimization (3), Mute and Ergonomic Options.
SigEnc
- Stealth, ECCM, Analyse and Encrypt @ Rating 6 with Optimization (3), Virus Resistance (6) and Ergonomic options.
- Decrypt and Spoof @ Rating 6 with Optimization (3), Mute and Ergonomic options.
- Homeground 5 Autosoft with Optimization (1) option.
Utility
- Browse, Scan, Stealth and Encrypt @ Rating 6 with Optimization (3), Virus Resistance (6) and Ergonomic options.
- Exploit, Sniffer and Spoof @ Rating 6 with Optimization (3), Mute and Ergonomic options.
Node 8:
- All Common Programs @ Rating 6 with Optimization (3), Virus Resistance (6) and Ergonomic options.
- Tacsoft 2 with Ergonomic option.
- Two active copies of Encrypt for Access Log and Node Encryption.
ARC: Alert Granny, launch Guardian IC against intruder and set Patrol IC to Track intruder.
Topology: Nodes 1-7 are hardwired to the cluster with fibre and have their wireless ripped out, they serve purely as host nodes for the cluster's IC. Node 8 connects to the Matrix through a fibre link to the Whampoa Data Haven and acts as a gateway for any slaved devices. Node 8 operates in hidden mode and only connects wirelessly to a pre-approved list of slave nodes that must be running Granny's signal encryption IC. The cluster has Strong (1hr) Node Encryption and also runs constant Encryption on the Access Log. The real Access Log is hidden within the running Binary of the Access Log Encryption Program by a Rating 6 Data Sprite running Steganography. The visible Access Log is merely a copy of this hidden log that acts as a honeypot. A backup copy of the Access Log is also kept in the IC Nodes where it is constantly examined for evidence of anyone using or creating a legitimate admin account. Another honeypot. A pair of Hidden Admin Accounts do exist. During each logout the Sprite Watermarks a randomized AccessID, password and the user name of the active admin account to a random RFID tag on Granny's person. A similar pair of Hidden Security Accounts exist for Kemuel which do not permit Wireless Access.
So long as a network can remain connected to this nexus somehow (satcoms, retrans units etc) it can be slaved to the nexus thus requiring a hacker to penetrate the nexus and it's encryption before compromising any other part of the network.
I think I got everything there, there might be a few tiny bits I forgot to change or update....
I've still to generate a shopping list for electronics but that can wait.
How quickly do we want to move here? I can try to bust into the Noodle place right now or I can take my time and do it overnight. Depends on how concerned we are about the girls safety.