Sorry for the delay in reply. Taken a few days to go through this around a very busy schedule.
QUOTE (Thanee @ Jan 12 2012, 04:10 AM)
I have added multiple actions together in my last post to speed things up a bit.
Always much appreciated!
QUOTE (Thanee @ Jan 12 2012, 04:10 AM)
1) Check, where the datastreams are coming from, and whether she will be able to access the sensors from there.
Do you need any further rolls for this?
As an alternative, intercepting and editing the traffic would probably also work, I guess.
With admin access, you pretty much have the rights to do it so choose one of the following:
1) Trace the sources: Software + Tracking
2) Intercept and analyze: Software + Sniffer then software + analyze
3) Matrix Perception Test: Computer + Analyze
QUOTE (Thanee @ Jan 12 2012, 04:10 AM)
First step is creating a legitimate account (a simple Software + Edit test, since I have the necessary privileges for this action and don't need to hack it).
-> Software + Edit
3 hitsWhat access level is this new account?
QUOTE (Thanee @ Jan 12 2012, 04:10 AM)
Second step is hiding the account (an extended Hacking + Stealth (Firewall, 10 minutes) test).
-> Hacking + Stealth (extended)
3 hits-> Hacking + Stealth (extended)
3 hitsTakes 20 minutes for 6 hits (which should suffice, I suppose).
Done
QUOTE (Thanee @ Jan 12 2012, 04:10 AM)
3) Edit the system log to remove her traces. ...
-> Data Search + Browse (extended)
2 hits-> Data Search + Browse (extended)
4 hits (and barely
not a Glitch
)
-> Hacking + Edit
4 hits Done