One of my new players last night reminded me just how long it's been since I've looked at how slicing works, and I've realized that I need to refresh myself on the process and limitations.
Without digging out my old d20 notes, this is how I've been handing it:
==Requirements==
1) A computer to interface with (a datapad, for example)
2) A computer that you are targeting (a bank, a weapon system, etc)
3) A means of communication between them (comms and/or HoloNet).
==Special Considerations==
1) Finding information isn't nearly as hard as altering that information (i.e. checking an account is must harder than draining that account).
2) Accessing the means to communicate is often half the battle (as some information, like military secrets, are only accessible on site).
That said, am I far off my rocker here?
The player in question was trying to use an illegal HoloNet transmitter that he was borrowing from an NPC to look up information on a pirate they captured to see if he was worth a bounty to anyone and then to look into that pirate's accounts with the sole purpose of draining the account dry (he was too late, of course, as members of his crew beat him to it).
Unless I'm mistaken, it IS possible to do work like this remotely, but isn't the majority of slicing done on-site due to tracing and/or the information in question isn't accessible remotely?
On the other hand, one other thing to consider is the typical "Anything a PC can do, an NPC can do in return." I'm saving this one for the time the slicer decides to get greedy via remote access and have things trace back to him, but I like to make sure I'm not missing something within Star Wars technobabble somewhere that may make more sense.
Any input, favorite stories, or how other tables are treating slicing would be helpful!