IC post for my hacking is up. (Thanks Buddha for approving my transit plan!)
Probing Node 1 -- Admin Access (Threshold = Firewall + System + 6)
1,3,3,2,6,4,4,3,6,6,2,6,2,3,2,4,6 (5)
5,6,2,2,1,2,4,3,2,5,2,5,1,3,3,5 (10)
1,5,2,1,5,5,1,3,3,6,2,4,1,1,4 (14)
6,5,6,2,1,5,2,1,5,4,5,5,5,3 (22)
3,4,4,3,4,2,3,6,5,2,4,2,4 (24)
6,4,2,1,4,3,1,1,6,6,2,4 (27)
3,2,2,6,6,4,6,4,6,6,4 (32)
http://invisiblecastle.com/roller/view/3719093/Probing Node 2 -- Admin Access (Threshold = Firewall + System + 6)
3,5,2,2,4,6,4,3,1,4,1,2,5,6,6,4,3 (5)
6,3,5,5,6,2,1,3,5,6,2,1,3,1,3,6 (12)
6,1,1,4,1,5,2,5,4,1,4,5,5,1,2 (17)
6,6,6,1,6,6,6,4,3,3,4,6,3,2 (24)
1,6,3,4,5,5,1,6,3,6,4,4,4 (29)
4,4,5,6,4,5,5,4,2,2,6,4 (34)
2,3,4,4,5,5,6,2,6,1,2 (38)
http://invisiblecastle.com/roller/view/3719101/--Tasking Agent (Mr. Smith) to Analyze for new Icons, and alert if found.
--Tasking Agent (Mrs. Smith) to Redirect Trace (if any)
Breaching Node 1 (Stealth 5)
Analyzing node 1 (15d6.hits(5)=7)Alert Status?
Connection to other nodes?
Active Programs running?
Number of Active Users?
Rating of matrix Attributes - Firewall, System, Response
Bracing for the inevitable -- Decryption (Rushing the Job -- half the interval, 1s and 2s count for glitches)
2,3,3,2,6,1,6,6,2,4,6,4,1,3 (4)
6,5,4,6,1,1,4,4,2,2,6,4,4 (

1,1,5,5,2,5,3,5,2,1,4,5 (13) -- If it's as bad as Fleet got.
6,2,3,2,2,3,4,3,6,1,6 (16)
6,4,3,2,5,2,6,5,2,4 (20)
1,1,6,3,4,5,6,6,5 (25)
6,2,1,2,3,1,5,4 (27) [Glitch if I get here]