20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

80<br />

. . . hacker’s handbook . . .<br />

Pistons’s reality filter slipped and fizzled as she passed through the gateway, her perfect<br />

color-coded polygons giving way to a romantic programmer’s dream of a Japanese garden, her<br />

icon now wearing a black ninja gi. Fourteenth century stone bridges contrasted badly with the<br />

twenty-first century koi emulations swimming in the brooks beneath them. Sloppy work, or<br />

else they were more interested in security than historical accuracy.<br />

Whipping out a rice-paper fan, Pistons frowned as she analyzed the icons in the node.<br />

Intrusion countermeasures, but they haven’t detected her yet—and that fox with seven tails<br />

was the gatekeeper for the security controls she needed. Reaching into the satchel at her side,<br />

the hacker launched Tumblers. The agent appeared next to her as a man in a dark suit.<br />

Whispering instructions under her breath, Pistons sent Tumblers toward the fox construct.<br />

A little stiffly, his iconography not quite matching the surrounding node, the agent presented<br />

one of the passcodes she’d hacked for this run to the fox. The vulpine gatekeeper’s tails twitched<br />

in time as it processed the code before letting Tumblers pass.<br />

Once the agent was seated at the ornate tea table, Tumblers started to run through his<br />

script, moving the controls in a precise pattern. Pistons noted that the fox program was still<br />

watching the agent, but she didn’t care about that now—she needed to find out who else was<br />

lurking nearby.<br />

Right on cue, a polychromatic Eastern dragon slithered into view, its mimetic scales and<br />

fractal coloring a pale imitation of the real thing. A sudden wind rustled through the garden, and<br />

the gentle ping from her Analyze program told Pistons the system had moved to Active Alert.<br />

Tumblers didn’t even fight the IC construct that latched onto his back, paralyzing the<br />

agent so the draconic security hacker could give the lazy kill-shot with an Attack program.<br />

Pistons bid a silent adieu to the agent, its job well done. As the dragon passed by her again and<br />

the fox resumed its previous stance, Pistons waited patiently for the wind to die down and the<br />

Active Alert to pass.<br />

Cloaked by her Stealth program, Pistons took a knife—her Exploit program—and slipped it<br />

through the rice paper wall of the teahouse, bypassing the fox construct. A few minutes later, she<br />

slipped back out the same way, Tumblers’ work—and hers—now complete. She took a few minutes<br />

to patch up the rent in the rice paper—it was still there, but hidden from prying eyes.<br />

After all, she mused, you never know when you might be here again.<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!