Disarm (Hacking)
Disarm is used to undermine programs without crashing them. It is used to corrupt targeted software so that the disarmed program cannot act against the hacker (and only the hacker), effectively neutralizing its use. Operating systems, personas, IC, agents, sprites, and malware may not be disarmed, but this utility is effective against most Common Use programs, Hacking programs, and autosofts.
...
Disarm Program
To disarm a program, the hacker must make a Hacking + Disarm (Firewall + System, 1 Initiative Pass) Extended Test. When the threshold is reached, the targeted software can no longer be used against the hacker (i.e., Analyze will not detect the hacker, Attack will not target the hacker, and so on). The disarmed software still functions normally against others. Likewise, the hacker is still vulnerable to similar software wielded by others. Disarmed software will remain neutralized until it has been reloaded or until the hacker logs off the node.
Firewalls may also be disarmed, but they feature coded countermeasures that make such attempts likely to trigger an alert. The node makes an Analyze + Firewall (Stealth) Extended Test each time a Disarm Test is made. If it meets its threshold before the Disarm Extended Test succeeds, an alert is triggered, and the Firewall immediately reconfigures itself so that the Disarm attempt must be restarted.
Note that Disarm may not be used against Data Bombs—Defuse is required for that.
Q1
How do you use the disarm action/program on a firewall, if you can not target a node, decker ,IC, etc. I think thay mean you can not disarm the entier icon of a node, decker, IC, ext...
So your Hacker rolls Hacking + Disarm (Firewall + System, 1 Initiative Pass) Extended Test.
Then after each roll of the Extended test the Firewall rolls Analyze + Firewall (Stealth) Extended Test.
If the hacker reaches their threshold first the slide through the firewall, if the firewall reaches its threshold first it reconfigures and goes on Active Alert forcing the hacker to start over.
Q2
Can you disarm a nodes firewall before you try to hack an account?
I might be wrong but, I think you Disarm instead of Hacking an account, since Disarm is a Hacking type of action.
Q3
Can you disarm the analyze on a node before you have hacked into the node?
No, because the Firewall prevents you from accessing the software resident on the node it protects.
Q4
How is a disarm attempt detected? Once a program is disarmed how is the disarming of the program found out?
Analyze + Firewall (Stealth) Extended Test each time a Disarm Test is made. If it meets its threshold before the Disarm Extended Test succeeds, an alert is triggered, and the Firewall immediately reconfigures itself so that the Disarm attempt must be restarted.
Ex.
If i successfully disarm, the analyze program on a node, and firewall on a node without setting off any alerts or glitches, Would I be free to do what I want without detection?
When the detection test is made to detect the tampering attempt on a disarming of a program, is it a convective test or a one time go VS your stealth program.
It appears that the sequence of events is as follows:
Disarm Firewall, while the Firewall attempts to detect.
Disarm Analyze program on a node, Programs can't detect disarm attempts.
Hacker plays merry hob within the system. Tra-la-la.