QUOTE (yesferatu @ Mar 18 2011, 03:18 PM)
So I am writing up cheat sheets for riggers and hackers and I hit a snag.
So...let's say you have a rigger trying to locate and physically destroy a hacker.
How does the drone/rigger find the hacker?
As Draco18s said, the Track program is used for a Trace User action, and will likely give you a spot within 50m (expecting the hacker to be using a wireless connection). Could probably narrow this down by having agents in the drones use the Track program when you're homing in to more accurately pinpoint the hacker by triangulation (or more specifically the hacker's commlink); would take three at least to do this with any reasonable accuracy.
QUOTE
How does the hacker stop the drone?
Scan to find the node of the drone, Exploit to actually hack it on the fly, and if the rigger is smart Decrypt (among other things usable to protect a drone) to actually log in and be able to do stuff with the drone. Another option is Spoof and pray that the drone isn't currently being occupied by the rigger (i.e., jumped-in). If that fails, upload your skillsoft in firearms and obey one of Murphy's Laws, "When in doubt, empty the magazine."
QUOTE
Does the hacker have to hack the rigger's comlink, or the drone itself?
No, the rigger's commlink need not be hacked, but hacking the rigger's commlink can give the hacker control of all subscribed drones and the rigger's access ID to more easily spoof commands to the rigger's drones that are running on their own.