9 hits... Firewall 4, +2 slave, +3 secure account, I'm in? *beg*
Wait, didn't hacking a slave mean automatically being redirected to the master node, so I'm hacking that? Damn my lack of knowledge and books!
One node, the slave, may be linked to another node, the mas-
te r. In this setup, the master is given full admin access to the slave.
When slaving a node to a master, the slaved node does not accept
any Matrix connections from any other node but the master and
instantly forwards any connection attempts to the master.
Hackers have three options when faced with a slaved node.
First, they can hack in directly to the slave with an additional
threshold modifer of +2, though this requires a physical (wired)
connection to the device. Second, they can hack the master node
(thus gaining access to the slaved node—and any other slaves—
as well), though this node is usually more secure. Tird, they can
spoof the access ID of the master node and then spoof commands
to the slave.