QUOTE (Yerameyahu @ Jul 22 2010, 07:09 PM)

Dig it, thanks for the Proxy thing.
I'm not sure this 'subscribe and initiate hacking from there' is a real thing, though. Is there a page number?

Because that's exactly what I was talking about. If it's not a Proxy, what exactly are you doing?
It is no different than a Sytem layered within another system... they talk about such things in unwired a bit. You have a Signal Point into the Matrix (Call it Node A)... Node A connects to its controller (Node B), which is a simple little device that routes information from the inner Network to the outer network, so does not really do much but provide a chokepoint (Which can of course be protected by ICE and Programs like any node)... Node B connects to Node C (Which is a subsystem within the building for distributing connections to the Important Data Server - Node D, and Terminal Users (Nodes G1-G100)... Node C is also Protected like any Node... Now for simplicity sake, we hit Node D the, Memory Core that Matters to your attempted Hack (Also Protected)...
Now, to get to Node D You MUST go through all the nodes previous, so you hit A, hack it, subborn it and then to Node B, then to Node C, and Finally to Node D (you really did not need to acces nodes G1-G100 as they are irrelevant for the example). Node D is where the Data is that will give you the keys to the Large Payout... you cannot get to Node D Directly from the Matrix, it is impossible because it only connects to Node C (of course, you could gain physical access and use Nodes G1-G100, or search until you found Node D physically, but for this example, you are on the network from the Matrix)... now Node C only connects to Node B, and so on...
Pretty simplistic example, so I do apologize. Make Sense?
Anyways, you can do the same with Comlinks, assuming you want to take the time, effort, and resources to do so.