With a practiced motion,
B.B. pulled a link cable from his com and patched it directly into the first of the gathered links. With a quick
"RAWR!" he set his hands into a blurring motion of gestures, assisted by thoughts interpreted from the trodenet interface. In a matter of seconds he kicked on his music, pulled up his Exploit program and punched straight through the device's Firewall.
"Pop!" He continued, his hands still waving and punching at the air.
"Oh, why yes. Your generous default Admin would like to set up a shiny new Admin account for, let's say, this matrix ID. Oh, I know you're glad to be of service." Not worrying about some Spider checking the access logs, meant he could do this slop-style. He pulled up the regular network login and punched himself in as a new Admin and took a good look at the place.
"Geez.. Kids these days..." Then with a flurry of digital and physical motion, he began tearing through the node, it's logs, deleted files, everything until he found and sorted every reference to Lana, Hanibal, Sam or the Renton address by relevance to his extra curriculars. Within 8 seconds, he knew all there was to know.
"Secret troubles of youth, yield before the mighty blade of Rectomon the Destroyer! Muahahaha! Boop! Saved! ..Now to tame the inter-mesh!"The matrix search continued for much, much longer. Long enough for the crew to make it to the nearest stuffer shack (
"What?! Oh.. sorry.. Get me whatever. It's all soypress anyway.") and long enough for the sight of a rapidly flailing Gnome to go from startling to funny to bothersome and back to funny again. After a time, he just collapsed across the rear seats.
"I can feel myself becoming a god... uaah.." He coughed a little.
"I now know everything ever recorded about Lana, Hanibal, and Sam of Renton. Sending to Cynth... now. ..So, what'd you guys get me?"[OOC: Hoo boy, some rolls a-coming! 11d6 on Analyze, so I can buy the hits for the link's matrix stats (already provided) with four Simple Actions. Call it done?
Going for admin access so firewall 2 + 6 = threshold of 8.
4 skill + 2 Improved Skill (hacking) + 5 program + 1 PuSHeD + 3 nanites (I'm assuming this isn't a high-level security system

) =
15d6.hits(5) → [5,5,6,5,2,2,1,2,6,3,1,4,3,5,6] = (7) Com's test: Stealth of 5 + 1 from comlink Optimization for a threshold of 6.
Firewall 2 + Analyze 2 =
4d6.hits(5) → [4,6,1,2] = (1) Exploit again at -1:
14d6.hits(5) → [5,6,1,1,6,5,1,2,3,4,4,1,2,3] = (4) Breached.
Even if the comlink got straight 6s, it wouldn't be enough to bust my stealth program.
Creating a legit Admin account for later and then running a Data Search on the link (interval of 1 complex action) for Lana, Hanibal, or Sam.
6 program + 1 PuSHeD + 3 Nanites + 1 Skill + 1 Analytics =
12d6.hits(5) → [6,6,2,4,3,5,4,1,4,5,3,6] = (5)11d6.hits(5) → [2,5,4,1,3,3,5,6,4,4,4] = (3) public info
10d6.hits(5) → [6,5,5,4,1,2,4,1,4,6] = (4) limited interest
9d6.hits(5) → [5,2,6,4,3,6,3,4,6] = (4)8d6.hits(5) → [6,1,2,3,4,6,4,2] = (2)7d6.hits(5) → [5,4,2,3,3,4,4] = (1)6d6.hits(5) → [2,5,5,5,1,1] = (3)5d6.hits(5) → [6,6,4,5,3] = (3)Hidden or actively deleted info
Same shit, different interval (1 minute)
12d6.hits(5) → [1,3,2,3,3,4,2,5,5,5,5,3] = (4)11d6.hits(5) → [3,6,3,2,2,6,1,5,4,2,2] = (3) Public info
10d6.hits(5) → [5,5,2,4,4,1,4,6,2,5] = (4)9d6.hits(5) → [3,4,4,6,6,1,6,3,1] = (3) Limited interest
8d6.hits(5) → [4,4,3,6,6,5,6,1] = (4)7d6.hits(5) → [5,4,3,6,3,4,2] = (2)6d6.hits(5) → [4,3,1,2,2,5] = (1)5d6.hits(5) → [3,6,4,1,3] = (1)4d6.hits(5) → [3,2,6,5] = (2) hidden and deleted info.
Yeah! Power through the bad rolls!
9 minutes though...