comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
60<br />
. . . systeM security . . .<br />
The dragon is bored.<br />
As she steps through yet another doorway made of rice paper and a richly dark wood, her eyes<br />
settle on a scene that would awe any other person. Before her stretches a beautiful garden, surrounded<br />
by groves of trees. Stone bridges arch artfully across arranged water features, while small<br />
creatures rustle their way through a lush array of flowers, ferns, and other plant life. To the dragon,<br />
it is possibly the dullest thing she’s ever seen. Uncoiling her digital scales, the emerald green dracoform<br />
rises, floating above the imagery of nature tamed.<br />
She catalogs the symbols as she glides past them. A heron wading through the datastream river is a<br />
piece of noisy alarm software. A raccoon snuffling for food beneath a bush is a trace program. The dragon<br />
inclines her head to look down at a large statue of a samurai, its blade outstretched, a particularly nasty<br />
intrusion countermeasure intended to slice and dice anything the other software doesn’t like.<br />
As the great dragon moves from one node to the next, she notes a change. Her commlink filters<br />
the signal as a scent on the air, a pungent musk that tells her that something is out of place. Diving<br />
toward the ground, the creature’s emerald scales shift, blending into the rich color of a bed of ferns<br />
near an ornate teahouse.<br />
There is another user in the system, a user that has absolutely no reason to be here. Even now he<br />
is showing the Kitsune® program a virtual ID. The dragon can smell it, even from where she is hiding.<br />
Hacking. Fakery. She sidles around the building to get a better view of what the man is doing.<br />
The man, little more than a dark silhouette in a suit, has just settled down to work the controls<br />
set into a table in the middle of the teahouse. His fingers spin across the readings and coolly press<br />
buttons with the ease of a pro. The Kitsune® has not disengaged, the small fox-man stands staring<br />
at the suited visitor. Something about the user’s badge has tipped the software. The dragon snorts:<br />
this man is an amateur.<br />
Amateur or not, he is about to disable some sensitive safety equipment in one of the lab’s most<br />
secure areas. The dragon rears a bit, and flexes her ears. All around her, she feels the lush setting<br />
changing to suit her whims. Programs across the system are now active, and none of them servile to<br />
any but her. Before her eyes, the Kitsune® becomes more <strong>alert</strong>. It seems to realize its earlier mistake<br />
and leaps at the hacker’s exposed back. Leaning out of the underbrush, the dragon aids the fox-man<br />
by calmly biting off the man’s head.<br />
Spraying bits and bytes, the man’s form slumps to the ground, dissolving into digital symbols<br />
slipping between wooden slats. Wary, the dragon looks around the teahouse again. The Kitsune®<br />
bows low to the security hacker and fades away. The dragon nods, satisfied.<br />
Boring, the garden may be. But the garden is still hers.<br />
Unwired<br />
Simon Wentworth (order #1132857) 9