@gilga - come back to me quick and we can move this next part faster…
Some info for you:
- Obviously no problem getting into Cutter's commlink, since you were invited.
- The T-bird's system, to which you are now effectively plugged directly into, does have its own Firewall (and possibly other security within).
- Based on your rolls, I think you will at least get some initial marks, so I am going to let you know some things now to speed things along:
* Once inside you can see that you are in a completely isolated system - the wifi has been manually switched off. Cutter's hardware link is the only reason you are able to be here.
* The RCC is totally bricked, and still smoking. It is physically impossible to jump into this vehicle (both of these points took place in earlier IC posts! But Dogmeat wouldn't have known.)
What I need (besides more knowledge of the hacking rules!):
I see all those rolls at the end just labeled "hacking".
Do you mean the Hack on the Fly action, or are you referring to whatever the next three tests you might need to make (there are a great number of different hacking actions).
I really need to know what you are specifically hoping to achieve?
Is it to get into the T-bird's systems to activate the autopilot (which should in theory prevent a crash?)
Or did you have some other action in mind?
For the Fork, yes, you can use the same roll, but keep in mind that all the negative modifiers that would apply to each target separately will then apply to each action (ex. if there is a -1 die mod on the T-bird and a -4 mod for the deck, the single roll you make to affect both is at -5). The cyberdeck is much better defended than the T-bird, so I will need to know if you go ahead with the fork to attack the dead decker's deck.
And if so, again, what exact actions and, more importantly, what are you trying to achieve?