Differences on Slicing
//(requires Systems Operator)//
Can be used to break into secured computer systems. You can bypass and subvert them to fit your own needs. For example, you can slice into a the secured door system of a military base and override the lockdown protocol.