QUOTE
Can someone give me a step by step example of maxing out a Doberman or an Optic-X?
Ok Let's look at the Doberman:
Security Drone = Device Rating 4
Response 6 Module = 8,000

or 4,000 (If you do the Hardware build yourself via Parts)
Signal 6 Module = 3,000

or 1,500 (Again if you do the Hardware build yourself via Parts)
Pilot 6 Program = 15,000

for Legal or 1,500 for Pirated which will degrade every 2 months and cost 150

per 2 months to maintain (If your GM uses the Unwired rules.)
Firewall 6 Program = 3,000

or 300 for Pirated with 2 month patching up keep of 30
Adaptability Autosoft with Ergonomic Option Rating 3 (Max Rating for Program) = 1,600

or again 160
Ok if you want to make it harder for them to Hack your drone getting a IC agent with a Analyze program. Also get Encryption program as well. If you want to make it harder to hack just slave it to your comlink and then script the drone not to accept unslave command without a physical (Fiber Optic) connection to drone.
I'll just show you your dicepools and the hacker stat roll combo, for Hacking or Spoofing your drone
First Hacker must find your signal for your Hidden mode Drone....Assuming he does not have the Access ID already. This is scenario of a Hacker seeing a drone and attacking it with no intel ahead of time.
Assumptions being made:
-You have Admin access only accounts on your comlink and Drones (no reason for any others)
-Using SR4A rules.
-Assuming you devices are all running Analyze programs
-IC Agent only accepts commands from Physical connections from Admin User.
For Spoofing Commands (Note a Jumped in Drone can not be Spoofed since Rigger in complete control):
1) Hacker Rolls "Detect Hidden Node" Complex Action = Electronic Warfare + Scan Program Test (4) (This is if the Hacker can see the Drone visually or know its current location.)
2) Hacker Rolls "Capture Wireless Signal" Complex Action = Electronic Warfare + Sniffer (3)
3) Hacker Rolls "Initiate Cryptanalysis" Complex Action = At the end of each Combat Turn the Hacker Rolls Electronic Warfare + Decrypt (encryption rating x 2, 1 Combat Turn) Extended Test. Till he breaks your encryption.
4) Wait for Hacker Comlink to decrypt Traffic....2-4 Turns later....Move to step 5
5) Hacker Rolls "Trace User" Complex Action = Computer + Track (10 + any Stealth Program Running on your Comlink, Complex Action) Extended Test to get Access ID of Your Comlink.
6) Hacker Rolls "Spoof Command" Complex Action = Hacking + Spoof Vs. Drone's Pilot + Firewall (+ Adaptability Autosoft and/or Fuzzy Logic Mod in Arsenal) Since you are Running Admin accounts on Drones Hacker takes a -6 Dice pool modifier.
To Hack into and steal Drone without above mentioned Slaving:
1) Hacker Rolls "Detect Hidden Node" Complex Action = Electronic Warfare + Scan Program Test (4) (This is if the Hacker can see the Drone visually or know its current location.)
2)Hacker Rolls "Hacking on the Fly" Complex Action = Hacking + Exploit (target’s Firewall + admin account increase it by +6, Complex Action) Extended Test. Every Time Hacker rolls you roll Analyze + Firewall (hacker’s Stealth) Extended Test. If you see Hacker before he hacks in...Launch IC with Attack program to attack Hacker's Icon.
3)Hacker wins Drone becomes his since all he has to do is log you off.
4)Resident IC program running Analyze can roll "Observe In Detail" Simple Action = IC Rating + Analyze Vs. Hacking + Stealth, Resident IC program can do this roll 2 times for every IP....so that's 6 times per Combat Turn.
5)When IC wins attack Hacker....or Terminate Connection or other nasty things....once Hacker gone you can log back in as you can have IC reset your account access when Hacker is booted.
I think that covers some of it. Let me know if I messed anything up folks or missed anything.
Most of the time its just easier for the GM to shot your drone....sometimes its quicker!