Firewall attempts to detect the hack.
8d6.hits(5) → [3,1,1,6,4,5,1,5] = (3)
8d6.hits(5) → [1,4,1,4,5,3,6,2] = (2)
8d6.hits(5) → [1,3,6,5,6,1,4,2] = (3)
Mirikon, I'll let you roll a threading test to see if you can get your stealth up after the third throw. You'll need a stealth of 8 to not get noticed. Alternately, you could thread on the Mute option for your Exploit program to delay the alert for a full CT.
Makoto couldn't help but feel the pressure as each second ticked by. When working in zettaflops, three seconds of operation is an eternity.