Hacker
55 pages
English

Vous pourrez modifier la taille du texte de cet ouvrage

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
55 pages
English

Vous pourrez modifier la taille du texte de cet ouvrage

Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Mike discovers that all computers are being secretly infiltrated. His investigation into the source of the infiltration results in his normal life being destroyed. His fightback then causes life-threatening danger to him and others.

Sujets

Informations

Publié par
Date de parution 28 août 2020
Nombre de lectures 1
EAN13 9781528962971
Langue English

Informations légales : prix de location à la page 0,0175€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

Hacker
John Pimley
Austin Macauley Publishers
2020-08-28
Hacker About the Author Dedication Copyright Information © Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14
About the Author
The author is a chartered engineer and has worked and travelled extensively in Asia. His interest in writing sprang from the many technical papers he wrote for the technical journals of his industry. Although, originally from Newcastle upon Tyne, he has lived in South Wales with his wife and three children for many years.
Dedication
To my wife, Sylvia.
The nicest person I know.
Copyright Information ©
John Pimley (2020)
The right of John Pimley to be identified as author of this work has been asserted by him in accordance with section 77 and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publishers.
Any person who commits any unauthorised act in relation to this publication may be liable to criminal prosecution and civil claims for damages.
This is a work of fiction. Names, characters, businesses, places, events, locales, and incidents are either the products of the author’s imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.
A CIP catalogue record for this title is available from the British Library.
ISBN 9781528920087 (Paperback)
ISBN 9781528962971 (ePub e-book)
www.austinmacauley.com
First Published (2020)
Austin Macauley Publishers Ltd
25 Canada Square
Canary Wharf
London
E14 5LQ
Chapter 1
When Mike was asked why he was a Hacker, he always said he felt that he was improving ordinary people’s security by showing how poor the banks and other organisations were at protecting the information they had stored. He also commented that it was up to these institutions to improve their security and they should be thanking him for showing them the error of their ways, or that is what he thought until he went one step too far. Then his life disintegrated.
He had become bored with the usual “let’s infiltrate this bank or that bank or some government department.” He thought there must be something more testing. So delving deeper into coding and looking way beyond the normal level he found a strange anomaly; in fact, he found evidence of another type of programming language that was infiltrating the languages normally used. He could not ‘read’ what this odd code was saying, but it was clear that it entered our all the codes he was acquainted with unhampered and bypassed all the security blocks that were present.
Who was writing this code? Was it an enemy nation? That was unlikely as he was knowledgeable about their infiltration methods from his early days at GCHQ and he would have recognised them.
Little headway was made even after working steadily for months trying to decipher this strange language as the whole basis of its design was way beyond anything he had seen before. Then one day, his life changed as he sat at the computer tapping away trying another angle to enter the code and actually making some progress. Suddenly, the computer screen went blank and as he looked at it, it seemed as if he was staring into a void. It also seemed to be drawing him towards the screen. At that moment, his phone rang and luckily, it was almost out of reach, as he leant over to reach it the computer screen exploded. Razor-sharp material from the screen rocketed past him through the exact location his head had been a fraction of a second earlier. When he looked at the parts of the screen embedded in the wall behind him, he knew that if he had not moved, then the debris would have killed him. How did it happen? Why did it happen? He had never even heard of a computer exploding. To say he was shaken up would be an understatement.
Realising that the phone was still ringing, he shakily picked it up from where it had fallen. Before he could ask who was calling, a female voice screamed, “Get away from your computer. They are on to you. If you want to survive, meet me at 2 p.m. which is in two hours’ time at the place where you and your band first played music in public. Disguise yourself and walk there, don’t use public transport, don’t use your phone again and don’t carry it with you.” She then ended the call.
Mike’s mind was still struggling with his closeness to death, so he did not to even try to comprehend the ‘how and the why’ of the message. He sat there stunned for quite a while.
Slowly as his mind recovered, He realised that the telephone call implied that the explosion was not a freak accident, but intentional. But who was the caller? How did she know him? Who are the ‘they’ that are supposedly onto him? He was baffled. Also, how does she know about his playing in a band? That was when he was in his mid-teen years and apart from the other band members it was hard to image anyone else making a connection to the spot where they first played.
Should he meet with her? He asked himself . Is it safe? If the mysterious ‘they’ felt, they needed a backup plan to kill him then the proposed meeting might be part of that plan. His mind was in a whirl .
He slowly concluded that he had to attend the meeting, otherwise he would be completely in the dark as to what was happening to him. To be safe, he decided to arrive at the meeting place early and watch what was happening. He hurriedly put on a hoody, a cap to cover part of his face and dark glasses. Hoping he was suitably disguised, he slipped out the back door, scaled the fence at the back of the house and started walking to the location of his musical debut. Luckily, the route he took passed along a tree-lined path which he hoped would shield him from prying eyes. After 30 minutes, he entered the local park and approached the rendezvous which was an arena with a stage which had not been used for the last 15 to 20 years and was now derelict. He kept in the shadow of the trees and carefully examined the surrounding area; it was deserted. Tucking himself behind a bush, he waited and watched. The appointed meeting time came and went without a sight of anyone. After another 30 minutes frustration set-in and he left the shelter of the bush and approached the stage.
It was in poor shape and was avoided by most people. He then noticed what looked like a new paper envelope lying in the centre of its broken-down floor. He carefully made his way across the floor not only avoiding the more seriously damaged parts of the floor but also looking out for what could be a trap. As he got closer, he could see that the envelope was addressed to him. He gingerly lifted the envelope and retreated behind the bush. What was going on? Why all this cloak-and-dagger stuff? He asked himself .
He carefully opened the envelope ensuring nothing nasty was going to pop out. Inside was a note and a coach ticket to a small village some 30 miles away. The note said,
Wear a disguise. Put a stone in one of your shoes to give you a credible limp as you walk to the coach station. Use the coach ticket. Upon arrival, put the stone in your other shoe, leave the coach station and walk to the address given below, carefully following the route shown on the sketched map. Avoid cameras. Do not carry or use a phone. Do not use a credit card. We will meet you there.
The note was signed, The Sentinel.
What had he gotten himself into? He began to think it was a practical joke until he remembered the exploding computer screen, which convinced him, whether he liked it or not, that he had to follow the instructions.
Chapter 2
The stone certainly produced a limp as he walked to the Central Coach Station. He wondered if his foot would ever recover and hoped the pain, he was going through was for a good reason.
Mike boarded the coach without incident and spent the journey trying to put a logical reason to the incident that had almost killed him. It seemed that whoever was infiltrating the computer systems had caused the explosion. But even with his experience of programming, he could not see how they could possibly do it.
He alighted from the coach then switched the stone to his other shoe. He then followed the route shown on the map. This led him through the least populated parts of the village and up to a cottage surrounded by trees. He thought, as he took the stone out of his shoe, in time, he may forget this journey, but his feet would remember it.
He hesitated as he looked at the cottage. There was no sign of life outside and he wondered what awaited him in there.
The door of the cottage opened, and a young woman beckoned to him. “Please come in. I have been waiting for you,” she said with a wide smile on her face.
He noted, she only said, “she” and not “they”; maybe she was the only one there. He felt a little safer.
Mike approached and entered the cottage.
He was directed to what would be the living room. It had basic furnishings; a settee, two chairs and a table.
“My name is Amy and yours, I believe, is Mike. I see you are thinking that this place hardly looks lived-in, and you are correct,” Amy said as she gestured for him to sit down. “We only use this place to meet and interview newcomers.”
“Interview?” He said. “I am not applying for a job. I thought you could help explain what has happened to cause my computer to explode. Your phone call intimated you could help.”
“Your computer exploded?” She asked, her face registering shock. “We did not realise they were so advanced. To generate that amount of energy is astounding and frightening. All we expected was that they would warn you off by frying your computer drive in front of your eyes. It seems things are worse that we feared.”
“Well, that was

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents