First off, good answers all!
Now, as long as a peripheral has a wireless connection, it can be hacked/spoofed. If it doesn't have a wireless connection, you either have to find the point it is wired to and hook into that node, or forget hacking and go physical on the object.
Hacking involves breaking into the code with raw force and creating an account it will recognize. Spoofing is convincing the security that you're someone else. Let's take a look at how some hackers get into the secure door:
Slamm-0! - Intuition 5, Edge 3, Response 5, Hacking 5, Exploit Program R4, Stealth Program R6
Netcat - Intuition 6, Response 4, Hacking 6, Exploit Complex Form R3, Stealth Complex Form R5
Bung - Intuition 4, Response 6, Hacking 4, Spoof Program R5
Slamm-0! is in a hurry, after the guards stumbled upon him stealing the plans for the newest BUZZ!BLITZ drink recipe, he needs to get out of the building. He lost them at the last intersection, but he knows he's only got a little time before they catch up. The only thing standing between him and freedom is a R5 Security door. He leans against the wall, slips into VR (Hot Sim) and gets to work:
He won initiative against the door, so he goes first:
Slamm-0! -
Hacking on the fly (10d6.hits(5)=5) Door -
Analyze roll (10d6.hits(5)=3) Slamm-0! is through the door, and his Stealth program allowed him to get through unnoticed. Now, off to collect his fee and then, to the store for the pickles and ice cream.
Netcat is planning a visit to the Aztechnology pyramid for some "business" during regular hours. Since she has the time and doesn't want to be hassled by anyone, she works on creating a backdoor to the security system, allowing her Admin access to all doors and security. The Azzies have a R6 security rating for the area she's visiting, so it a little tough, but manageable.
Probing Extended Test (9d6.hits(5)=3) - 15 successes needed, 1 day
Probing Extended Test (9d6.hits(5)=0) - 15 successes needed, 2 days
Probing Extended Test (9d6.hits(5)=3) - 12 successes needed, 3 days
Probing Extended Test (9d6.hits(5)=3) - 9 successes needed, 4 days
Probing Extended Test (9d6.hits(5)=3) - 6 successes needed, 5 days
Probing Extended Test (9d6.hits(5)=2) - 4 successes needed, 6 days
Probing Extended Test (9d6.hits(5)=4) - Success! 7 days total
Now, she's got her account. When she gets to the pyramid and tries to use it the first time, the system checks it out (only on the first access attempt):
Security test against Stealth (12d6.hits(5)=2) Her Stealth complex form held up to the scrutiny of the system's security, so she's got free access to the area.
Bung is checking in on his pal Deadbeat since he hasn't heard from him in a few weeks. Deadbeat's apartment has a R4 security door and bung doesn't have the code to the door. Fortunately, he's got Deadbeat's Access ID saved from the other times he's had to check up on him, so he can try and spoof the door into thinking he's Deadbeat:
Bung -
Hacking + Spoof (9d6.hits(5)=3) Door -
System + Firewall (8d6.hits(5)=2) Bung's attempt succeeds and he's in. The brief success is marred, however, by the sight of his old friend lying dead on the floor, a bullet to the back of his head.
Someone's gonna pay for this, he promises Deadbeat.