So, I believe I have a decent grasp on how a network encounter works. But, I would like to ask y'all for verification and refinement. I'm asking for someone to write up how the encounter would go, action for action, if a hacker was hacking into the Haas Bioroid system that is shown in the Beanstalk book. I'm not looking for anything regarding advantage or threat or triumphs or despairs. For the sake of this request assume there is only the hacker and the sysop(defender). I want to see how it looks when the hacker breaks one of the subsystems that has 1 layer of ice as well as the sub that has 2 layers. No # of successes. Just the hacker either succeeds or fails and what a resulting action would/could be. Thanks.