QUOTE (Lord Ben @ Sep 13 2012, 12:43 AM)

I was under the impression your first command after logging in would be "Shut off the IC!" or "download everything to this datachip!" but it would appear not to be quite that easy.
First situation ("Shut off the IC!") would likely have a warning go off somewhere in a spider's office (agents 37L8An, 88B6At, 28U2Ar have gone offline on node 31). An agent with programming to watch for other agents and reboot ones to go down would likely be the first to respond to that event (and be the one to send the aforementioned alarm). In the nested node situation, there would probably be some agent-based overwatch from up the chain as well. Agents are extremely cheap for a company, so you'd likely see a ton of those.
The second situation ("Download everything!") probably could be done, but you'd get encrypted data and databombs included. Since you're indiscriminately downloading things, you also get subsystems that try to call out, making you easy to trace, not to mention any hostile agents you can get. And as I suggested in my last post, the really juicy data won't be readily available. What you ideally want to do when hacking is to remain hidden and comb through the data on the node, picking up only choice items.
Both things
can be done, but it's the equivalent of a street samurai saying "if we kill all the security guards, nobody can catch us." and "let's steal all the desks, chairs, potted plants, filing cabinets, RFID chips (etc. etc.) now that we got into the lobby."