61 0 118KB
The story of K.roller - dangerous levels of deepweb was once a top secret document that governments ban handed down, the secret has been temporarily seal floor to the 8th of deep web network was a Russian hacker launched surprise unknown purpose. What is the 8th floor there is only 1 way to call the level of difficulty to access the deep web network only. Really deep layering web without layering are also, depending on each person evaluate the difficulty level only. (Degree of difficulty may be descript, add url page, find the key, grant authori, Bitcoin to access, referral introduce ..v ... v) K.roller a boy 18 years of business and air conditioning, in fine, but that's just a temporary job, and in the morning. Roller's main job in computer networking, work is a passion and it is similar to what his dear uncle did. The boy did not know his uncle's exactly what jobs in the company, just know it is a very famous company in technology. Temporarily stopping the story of this boy to learn about the mysterious world on the internet, so-called deep Web INTERNET dark - DEEP WEB Extremely large amount of information contained in deepweb Temporary experts in the world of technology analysis can survive up to 8 floors of this network with many different security modes. you can access the 1st floor with a nearly identical manner as normal if there is a dedicated software. On the 1st floor can be found the black market sites such as drugs, marijuana, guns and illegal services. All users here are anonymous and the currency used is copper Bitcoin. Continue the story with the 2nd floor of the deep web, can still be accessed using dedicated software but need to have a range of characters symbolize the address you want to access, the range of characters that we temporarily called deepweb website can you earn through the sharing of acquaintances or the like. From the 3rd floor 4 or more of the network has not put things more terrible, where ordinary people can hardly reach, can only be accessed by changing the computer's hardware or use techniques which access enough security to enter, in which the horror stories, horror images, gruesome experiments and secret documents .... The story is summarized from brochure The last message Roller received from his uncle with the content: Pay a business trip! Please keep brown leather briefcase (Quoting from the summary in the document) 5 years from the date of receiving the message prompt, Roller can not be met or any information from his uncle, police also totally not found, apparently he disappeared entirely and no longer exists, data individuals Bureau of investigation by the hacker stolen. All information visit trying to find information on this service does not fail. Conclusion: Missing
Profile of 46.MX7: The hidden secret pair of secret internet Should it not open the briefcase, the thought of roller wrote in his diary. finally decided to open it the next day, did not understand why the police days before newspapers churning roller forget this travel bag ..... Decided to open the briefcase 46.mx7
So he decided to sell conditioned open briefcase old records of his uncle. In case files have recorded items in the briefcase instruments (its completely accurate translation of documents) + A floppy + A stainless steel box + Gaming counters + A small book with strange characters, and email lists + A pen + An ATM card The equipment like modems, but seems to have more exotic structures + A mobile phone Also no indication what more Roller has also repeatedly opens the preview but nothing special, no clue about this uncle. Perhaps the thing to do now is to find the old floppy drive to open the other floppy disk. What might be in it. Dated 05.12.2001 has been prepared floppy drive but run into a glitch, a special encrypted disk with the message, as well as unique clues about uncles roller: "If the roll uncle believed I could guess the password in three attempts, if the other person! I advise you to stop" Password my uncle know because once heard uncle tells it happy or drunk while. virus just 3 strokes speculation their password, it can collect information about the time to think of typing passwords, analyze the behavior of people are typing your password if mistyped, only 2 times knock your speculations into the password box, you probably already have a portrait erected somewhere in a .... What are the possible password? Speculation leads to the 1st floor of the deep roller web 3 days thinking roller still can not figure out what it is, uncle birthday .. not because it's too easy to find, name or habit .... can not by how much, but the only hint of the roller uncle, nephew could have guessed just 3 strokes. It could be anything ........? Focus, concentrate ..... May be it, my uncle enjoyed an occasional comedy and sing it at times difficult to sleep at night or when they must ... Right lyrics, form long passwords are not the character limit. Gleam and roller immediately implement idea (to this paragraph, the document takes a page is deleted, can not be recovered or found, I will try to recover it if it is). Deep Web can have up to several floors. According to the analysis of experts, can now have up to the 8th floor, but how do you know for how this year they mistook it only has 7 floors only, maybe after some time it to level 9 10 so what. Sorry guys, there is a section where authors who share this document were to delete or encrypt it, but can not read the section break pass the floppy disk. But then Roller sort of open it up and see what disc contents inside. The next page of the document says about the contents inside the plate, including 2 emails and a piece of code, one of two email with login passwords encrypted form that roller was his uncle show since before so he can decipher. Followed by roller send email with the code to a floppy and wait in hope with 1 reply.
Email response from a sponsor (translated, have not understood the great places people look temporarily offline) Content e-mail response: Hi Roller. I know exactly who you are and where you live, I had intended not answer you, but for my friends, I warn you try to seal his fate if you want to continue. Mail content that the person's answer roller surface: Who are you, I just want to find out what happened to my uncle. Leave a reply letter: Out of the blue nephew. I send him things that may help include a special browser can hide his identity, and how to decipher which may be used. I have to go, you can continue but be stopped if deemed dangerous. No one email from a stranger anymore, roller began reviewing files that you receive. something like normal browser but with different connection mechanism (You can check out here) a file consisting of lines like a website address but full of strange characters. adsfojniasdfasdofk.o ..... xjhgoiddmhshsmshgc.o .... Ok so could understand part, complete address list on the odd browser and see something special. Start doing what he can be called guidance, even first page skillroad ...... looked like the normal site at all, and only ..... but ebay page special thing here is that its products .... Drugs, gun ....... and even human lives, here they call it experimental specimens. all payments by Bitcoin. The more frightening than going deep down list: pictures of pedophiles, of the inhuman experiments. They soak the human image in the country only to each head popped up to breathe, to see their flesh murmuring out how children die after how many days and how long ..... adult roller stop because too disgusting, he continued to send the 2nd file viewer, apparently it's how to decode something. (You can check out by joining this group Deepweb) The only clue from the 3rd floor deep web The only clue of roller appearing from nowhere In previous documents, the roller has to be the website on the first floor and see what exactly it is often said about the deep web. The stranger warned him from the 3rd floor, a special browser can not safe anymore. Roller continued thinking and know how to use decoders to be attached to the email content analysis book that pay him to leave. Book content sent back to the roller includes an account and password have been used to access the deep web, pay he believes it could help him somehow. the remaining content links and downloading files to access instructions of deep layer encryption web uncle Mike and upload the particular server. must have special ways to find and read. So continue with the 3rd floor with some special things, which fortunately conditioning repair is just
his sideline. less he has a long time in the crotch grinding technology universities. Female model inside the mysterious briefcase In the next section roller learned that what seemed to be the model that turned out to be a decoding and encoding special information, connected via its data transmissions and send will be encrypted whole to combat the hackers, whether obtained data from your computer, then transfer can not analyze it. Ok the rest simply adding it to the network router behind so that it encrypts the data only. After completion of the stages roller continue his work. With a link highlighted in the list of links that strangers send him. The first one out was a request login interface. Ok sure the decoder protect yourself, you must first register an account has it ... + Strangely no part to register so how that account to login here. Roller quickly remembered accounts in a little book and use it to login. Notification from Communities HKW: Hi Blue Back! Wish you keep your network Clues from strangers Interface login to look like a giant chat room but had only two parts Deal World Roller decision to the world, even as he has just loaded into the room, the first line of the chat: He has returned to Blue game. I thought he was gone. ................. Rubbing his uncle turned out to have been quite popular in the forum are to hide ...... Underground world of technology The chat line appears on the computer on which the roller used him squirm. Roller answer these questions: - I'm not the blue I was the grandson of him he did not expect air may sagged alarmingly like, not a piece of any acrid also sent to ... just a strange thing only, the figure notice how many people are accessing the room rise quickly. 1000. 2000 ...... 10000, (which I also did not expect that there may be many people know how on the 3rd floor like). are wondering whether we should handle how, suddenly a pop out chat line with popup notification. - Roller unplug the computer's power socket immediately, I will contact you later. No other way, perhaps there is also a last resort you should do at this time. Roller unplug and put to bed thinking ..... can only ever been emailing roller, who owns the email in notebook (this passage I read like a story told from party 3,
perhaps this is also the sharing of documents written in the form of logs). This segment clipped for lengthy partitions. summary is next roller receive an email warning him not to go back, or go to equip themselves with adequate methods to protect themselves. It takes about a week for him to understand how to protect themselves and tricks as well as the prevention of hazards through his book that attach to the back. Back to the deep web This section describes how to access confidential information or exchange of bizarre things that you do not know it is the truth or make up. Roller knows how to access the floor 4 5 6 using a network aggregate many servers voluntarily to transmit data cry circle, the purpose of this to disappear Air all traces of you on Internet. (In the world there are millions, even millions of computers voluntary or hacked to transmit such data, perhaps so that whether your network though a very pretty but load a normal web page there is also quite a long time. so deep in the web site looks very simple). Roller other takes a long time to find out information about their pay but can not, because the people here very rarely answered others if it does not make them curious, amused or bring money to them. Only one left in the mailbox automatically on the network's Web deep mike uncle was a letter from a person named. DL content: + Blue we need him in the project Kis.TT6 Perhaps it came after the uncle disappeared by previously did not have an e mail any other, can be users this network has a habit of deleting all after reading it, or this is a trap final list for the anyone can hack this account. But can not be a trap, if uncle mike confidently leave the password for the roller, it means him believe it can not be hacked. What remains in the anonymous world giant Roll clues about his uncle only, the name of the main projects that somehow he probably does not know it is real or not. Try searching on the search engine's see ..... "No results found" that's all. His crazy roller think, how the hell does it appear on the few tools are rather silly, huh. Try searching on local search networks in the 4th floor to see why. Continued looking at local search, the results are quite satisfactory returns with two search results and information fully encrypted, can only know the kind of content on it. What projects Kiss.TT6 something silly about a group of white hat hackers are investigating the activities of a group of hackers XXXX (we asked not to be named here) This group is planning to sell a 60-terabit data, too large, with 80 million dollars, the data on biotechnology or chemical something to stimulate growth (I roughly translated from English like, maybe this is the drug that we Chinese sprayed on vegetables in Vietnam, but after a night of big seeds, markets are always sold him ....). Too late, it has been sold, this information is too old ..... In August, it was sold in August, almost crying roller uttered, because .... time is the time his uncle disappeared .... It's a clue. Surely there must be some way to contact the hacker group. To find them. Hacker group XXXX: Be Faster
Immediately roller learn more about sale, luckily they were too obvious can then Deep Web has only grown to trying to erase the remnants of it.
the project biological hacker groups have for as they announce it on the fourth floor, which the 4th floor only . Evidence that someone is Roller can still get a little information.
This section summarizes: Roller know this group acts like MLM type, have the highest guy had a bad month of pregnancy, members around the world, perhaps the name XXXX just let them hide. Evidence is still the bad guy took nominal sill this group to sell three of stuff, and that's something unknowingly sacrificed guy for the character behind never show his face. To find the guy is trying to clear the other biological material. It was the guy with little information (This paragraph I guess is due to large amounts of money should be a guy that has little degree than the other four new 80 million measurements to me, that is also terrible, but certainly with us this is also in line in normal). How the hell is that guy find one now No way, how to find an anonymous guy in the world ...... anonymously Thinking, thinking ..... Must dig deeper about the monstrous biotechnology this roller scratching learn, there must be something to it worth to 80 million instead. Roller continue searching in floors 4 and 5 where perhaps at that time the number of members is only a few hundred to several thousand is the same. Search by names such projects Kiss.TT6 known technology it is promoting the development of human cells when exposed to the skin can make it aging, grassy plant fast-growing crisis terrible ...... (Just as the drug of Chinese men, looking to go roller) (A Du) It turns out they bought the technology to develop the contrary, slow the growth of cells, which helps extend the life (like style is an elixir of immortality) ...... . roller reading the next line It read that content by translating letters bit binary code such. In the article there will be rate of occurrence of the letters appear with different%. eg letters tee L1,001% 1.2% 3.12% V O 1,333% 1,566% E 0.44% Y U 0.1322%, the owner I Love you step 1 is encrypted. 1.2 1,001 3.12 1,333 0.44 1,566 3.12 0.1322. Continuing the line of code that is encoded into hexadecimal network or another form of binary code something, this is what doctors learn about electronics and telecommunications are aware of this. This is updated each day, so the contents of the old days, if there is no original post that day can not be translated. Thus any translating something goes through the decoder as far this time, the more difficult. In addition it also has some of the code is loaded for some action as native code when talking to the same organization or the like ...... (Perhaps the native code is what roller used to translate the book, I think not know right) Continue with the hacker xxxx
Mo forever without more information about what such panacea, Without knowing the buyer, also in excess. Seeking information from the files of this document is trying to be erased, it is not possible to do ..... way, using any way. Roller can not concentrate on his work, all day I just find ourselves somehow found the guys that might have information of his uncle. There must be some way to use. No subsequent information can not mean that they're successful, what ... why can not
perform or they lack something. Surely we can not succeed. The last country to go all alone, by all means to find his uncle. A crazy ideas pop out in his brain! Bait and big fish (This title is that the wind slashing it written that it is easy to remember which sounded seemed more dramatic to natural). It is possible that they are missing something, I try. That night roller continue his crazy ideas. encrypted information sent on the internet and local search on the 4th floor in the hope who owns this technology previously could read and roller will collect information. Profile missing Kiss.TT6 and things I want 200 million Crazy, really crazy yourself crazy, roller think a lot of guys will be able to find. Now just know hopefully their security systems up sure enough. now could only wait alone ....... Faster if not dead
After sending a message at a local search on the net floor roller 4 and 5 are still thinking whether it is certainly not true. I hope what they learned in the book left her enough to help protect the body covered. This system properly is dangerous, it makes people to think and worry, the faint of heart might have a stroke before someone looking to lose then. 1 Day, 2 Day still nothing new .... just think roller can not succeed, suddenly received a notice in the account on the Internet anonymously. messages sent from an address is Matt. Should not try to open the letter immediately. "It's too dangerous, one wrong click can make you never longer hold the mouse and press the 2nd shot." roller decided create a virtual machine from one of the machines in the system of sharing the ring network (which looks like a hack some of the machine there and then let it cross connection or ring to hide their tracks ) carefully opened the letter after checking quite carefully. Mail content scarcely a line: Who are you ! Where can I buy it if it's true, but I think not Not easy to overtake them with the silly story, but perhaps the ACC that he used to sign this notice period is what is causing their mail Matt. So frank or continue with fabricated stories. Maybe so frankly, need to finish it fast if not add a lot of trouble again. "Check out the security system, approximately 2% of the machines in the hidden system of roller was defeated, be restored if you want to secure." To do before answering Matt is restoring security system. 2% is probably small numbers only, roller asleep while thinking. Placard Roller startled awake because of the strange warning signal ... you rush back to your computer, dammit, I fell asleep without closing the connection of the security system when downloading pictures of Matt mail and over, system of notifications under attack increased to 35% in just 4 hours. Someone discovered the transmission line is open and has installed software that detects IP. There's no time to find it ... It was sticking to the system. disconnect the remaining 65% can not because it still remains the ip he had connections to download images onto mail. Must find
some way to cheat it ..... Now or never again. Roller decided to open another 20% in systems connected to prolong that hackker stranger can find his real address. Reset connections of 20% is probably lasted about 3 hours more ..... I have the strength to defend myself Hour roller forced to find ways to fool the insects and makes it go into permanent space, need to create the false connection. Fortunately, not too hard, so this time his uncle had said, the best security system is probably the transmission system between a circular pattern millions of machines. The machines that are connected and transmit to each other in a ring network, there is no beginning and no end point, the system that will make it but the software automatically detects never read all the connected therein. Ok so just create a virtual connection to the machine was stick his virus and then connect it to the network giant anonymous millions of machines which he often used in anonymous web is. Roller immediately embarking on work, 2 hours he has finished processing the mistake he had just made, number of computer viruses to stop sticking newspaper. His system now only 45% of the machine longer safe .... Roller sigh of relief, "I'm still safe" Honest and protect yourself
Over from the last dangerous, roller still wondering whether to continue with the story "The lack of documentation Kiss.TT6 was" not so candid about what he did not have information about the booklet this record, his goal is to will find little information about his uncle. (This paragraph to cut but still put on) Abstract thinking and reasoning of the roller (based on speculations of the writer of this record) - Maybe if the roller continues the story with the record, he will be exposed as lying, because the transactions on this system, in a way that people can still verify it is real or you trying to trick money. Damn it may have one of the two cases, the first person on the side of the organization has sold these documents. Monday belong to the organization of people who mail for Blue Note. - If the people of the organization was selling kits for $ 80 million, they contact the ratio is too low, because certainly the transaction was successful, based on what the roller said. If they get back, it is like they already considers herself has sold a document is missing, and they may be a danger by those who have purchased that material. - Case No. 2 is probably more reasonable, the roller has sent a notification by ACC of blue, Content in the mail also stressed the real question is who more roller. Content mail: Who are you? I can buy it, if true? Obviously people are looking to verify who owns the ACC of blue is one more really want to buy, because in this world if you want to buy something you have to verify whether it is true or not and Should do not spend money to buy, things like, I can buy it, if it is completely superfluous, feeling like two sentences that contain the other one. Warning, or contain information ..... roller may think this person is under the organization did mail through his help and his uncle decided to send
the reply to the content. I was not Blue. blue is gone, and now I want to search. Maybe it is true
In two weeks, absolutely no information from Matt. On the local network without the monkeys also dry anything, apart from the little information about the project or stolen things like that but he was not much interested. (This paragraph just as I explained, at a time when access to this concept which floor is probably not clear just by posing to easily identify the security level only, but the roller does not know anything about dive or which floor you're on). Roller still trying to work in the daytime and at night he groped, try searching on some other network, but maybe he made a mistake or not be able to access those networks. He particularly noticed a huge connection, and absolutely no password but can not be accessed. Each time intend to connect to that is the decoder to signal temperature warning. The secret of the old computer When the roller is baffling to find ways to access what we tentatively called the huge room they have email notifications from matt. Meet me in the multi-dimensional computer network (which roughly translated like yourself) Damn roller think, make the connection that's huge multi-dimensional computer network already. How the hell on with this one rather old computer. He thought, "Did uncle never on the network from here back, make sure to have but can not update the information from this network continuity if not accessing from home", and he was sure that the I am using this computer is the computer where you use notes. But roller ditched all that can be useful in the computer before that. Several text files, music files and clear ..... just normal files. I tried searching for hidden files and hard drive capacity is clearly notice the hidden files do not have that facility. There may be something I have not found not .... roller using the software again searching hidden files that you think might be the best because he created .... sat waiting. He sat looking at the software running, moving a% a. Try reading what you think is important in language booklet .... sounds coming from the next room made him uneasy. "Noisy and uncomfortable too, the family did not do their day easiness is à". Suddenly small coin fell to the ground and rolled to go away. Back to grope, roller just looking mumbled verses or singing songs that pay him each time alone. This coin then hell, he threw it in the drawer and check again when the report 100% software. Still no anything. He tried everything, try to access the network connection, but can not, cpu processor can not respond, he shut down and retest the old computer. I need a more powerful processor ..... roller and start thinking of taking apart the old computer to check .... old machine but obviously the latest processor which, perhaps his uncle inserted added convenience for work. But then why .... not perhaps for the last time multidimensional network has upgraded to a new version to the higher processing speed. If the Notes are also possible ways to enhance the processor to a higher speed, Secret was discovered
Roller continues to find documents related to the manufacture of processor, I think is crazy, but still have to try. The first is the structural outline its view should be the hell do. Roller drawing on paper, dammit I need a new pen, this one's gone out of ink. It is not the pen of paying back? Where the ink bottle and then try pumping in and make the work of this crazy public view. unexpected .... why not think, what is a usb pen correct it, almost shouting roller. Turn on the computer, check immediately and always see it that useful yet. - The password to open the file, and the message is still the uncle smileys. Let's do the opposite! Ok that is the reverse of the old password. Great success. roller continue with the data inside, as well as encode the same shape as the mechanism of the decoder. the outer file with content. 13.4.19xx Surely it is the name of the paper can be loaded in order to decipher this document. Roller to search the content of the article, is not difficult to find it published in a major newspaper, has for quite some time but still easily found. He loaded content articles and content files in USB which he had carefully copied out a part as well. waiting for it for a complete file with content .............. Great! the computer can be upgraded Roller wait long to decipher what is in USB, the first page has been decoded. Carefully he used mode automatically extract content under partial restore, to ensure not to lose notes the last hope of this. - Yes it is! roller exclaimed. As secrets about the mysterious chip that uncle you use every time you access the computer network giant multidimensional data ........ 100% completely decoded. Roller mulled read the document in the old usb. A disappointment, again well up on his face. Technology, with tables outline in hand .... But still too hard, can not find out what is needed to make. Search online local search of floors 4 5 nor more optimistic, perhaps nobody wants to sell the key to enter the 6th floor this must be. Roller still thinking ... But obviously he has to pay the multi-dimensional network with the computer that this ... Was the last time it is true that multi-dimensional network security level raised? So those who have been in this 6-story, How the hell can they do this to the processor so fast eh .... genius! Roller genius ..... they are mumbling. (Roller though understand how and mechanisms of action but was unable to find a viable way to manufacture, too sad!). Drilling, drilling! If uncle has left these documents he certainly must know, it is too difficult or take too much time for the roller. Must have suggestions instead. + He continued reviewing the document file that pay him to leave. There may be a kind of information that is encoded in it ..... 3 days via roller still can not seek anything more in the document file that he had read and reread it a hundred times. It really works
No information will be encrypted though he used all means, perhaps this is the original files and information. But what makes him special attention is the seal is closed on the last page of the document. seal with a symbol in the eyes and Acronym BL. may be the seal of the Blue Notes. It was not too special, but still feels like his roller forgot something. It made him feel very strange feeling to have seen it in a dream or something like that ..... Roller ourselves looking at the small mirror on the desk, in his recently withered away too much, the internet is taking his mysterious life too much. Are thinking about silly things, then suddenly see a roller, one thing that helped him explain the feeling like in dreams of the seal it. Reflection through a mirror clear symbol of the seal which is something all too familiar to him. Notes pennies left in the briefcase .... Because it is in the reverse order to print it out a complete icon. No wonder the feeling of having the sign that was where he had popped up around his head, it's not a dream, that is the truth. Roller picked up and examined the coin, it takes a little peeling when he dropped it yesterday. But wait, he felt like the coins are assembled from two separate parts must .... a thought flashed in my head, try a small knife roller to separate the coin is 2 parts. Cup ! the coin split in two. Roller sweating, hands not mastered joy .... As chips, it's chips ..... It has been in operation Roller took strange calm, to do now is to insert this into the computer chip roller ..... do what needs to be done immediately. Not too hard, 10 minutes is more than enough. ok All work has been completed, now try it. roller on the connector, creating a protective wall safest that he could. Loading 10% to 20%. Great this time no longer crashes the machine again, trying to just a little longer. Login screen just show up, no time to look closely roller see what the hell it is outside a bizarre shapes, in such a winged demon. The machine hangs (Read this passage also bothered me, hanging machine all day, but I remember what to cut back the doctor completes). What the hell Roller think. It really works muscles that .... Try to think about how I have missed something. Heat, temperature, engrossed in the virtual world is probably made him crazy, the most basic thing that is forgotten. New chips with higher clock certainly create more heat. Radiators older were probably no longer fit it again. New radiators and multidimensional network
Ok not difficult, I will do a separate radiators for it ....... (This paragraph is about how something manufactured radiators, so I go forward ngoang diluted always) It takes 2 days to complete roller manufacturing radiators for it. Enclosed radiator thermometer watches always fresh rather cool. This time, make sure get myself turning on the roller computer. Always the highest security mode. This time
he had to get the login screen, the picture turned out to be the devil and angel. In the game as if the screen to log a certain horror game. Continuing with the account has to be blue .... roller special world. On the screen appears the notice board: Hello blue! Welcome back to the multi-dimensional network. On the screen appeared a wonderful scene, perhaps the first time roller saw something like that. all of which are modeled as a miniature world with characters who are traveling, and all the characters are standing still. the 3-D imaging technology à ..... (this paragraph I guess it's like you inside the room Game Audition old days, to make the idea of the game room from here). Are also busy around to discover something interesting inside this world, suddenly you see someone talking to you, too terrible to communicate in both letters and sounds and gestures always ..... + You have to be who want information about the blue. + Roller to reply but suddenly realized that I also do not know how to answer .... This, then use the code to control gestures and voice. Roller answered, looking movements of the image that symbolizes his being somewhat heavy movement. + How do you know, roller answered when looking at shape and guess what other people make is 3d man, with a mask character animation and rendering in a very sad Just saw the man put his hand up just above his head. - press the Unhide command on the keyboard Roller follow, strange characters on the head are present in the frame đểu out the names. Roller looked. Matt, Matt was the one who sent him an email ... Continues with strange voice through head phones. and includes the text - Here we recognize each other by the mask, they are symbolic and can not be the same individual. You do get used to it. - Open his white wings and follow me if you do not want anyone doubt and attack. Symbol of the greatness White wings Roller still remain cruising, the wings are what the hell. Never seen an end roller thoughts show up on the right arm of Matt shows up symbol white wings, the wings as his pigeons, he smiled. But how to do that .... The man's voice again: Use the password that you use to sign in here again in small red box on the right side. Ok roller follow, he amused when the icon that appears on his right arm, but it was something, just to stop imposing à ..... + When it pops up that is he is connected to the firewall system best white hat hacker community created exclusively for the specific area. When it does that is he has connections and can be attacked. Look man the other side with black wings icon and spooky masks, it also represents a system where the black hat hackers created to remove traces well as us.
+ Here is the intermediate area focused enough all kinds of people, they come to find information, to do something ..... If you know how, a black hat hacker can still have a white like this way and we can create a black wings ...... so be always careful. .... Roller curious: + There are some who seem estate? - It is because they are accessing multidimensional server to search for information or the like, you can manipulate the keyboard to create a virtual computer .. Strange virtual world Virtual world always has its own charm Roller follow what matt instructions, take a night so he can control and manipulate the symbolic characters themselves more easily. Retrieving information where perhaps as you sit and work on the computer was normal, but the key is that it is completely encrypted and levels of security may be no one can break was . Roller begin accessing information systems especially in the virtual world, projects Kiss.TT6 appear more in this particular search. It is true that it has been sold but before that it is true that a war between trying transactions, concealed information and one side is trying to stop and inquire. A big line in the final pages with that information: Successfully sold, people try to prevent failure So they've failed, the failed email to blue. So where were you paying when the battle took place, may yet have realized that he might be a danger to the war on the internet and ..... can not, if he is a relatively dangerous, they would not know who he was, who had been the hope of the organization that they have to email to turn to him for help, it can not easily disclose their information as substituents. So where were you ..... uncle started Roller retrace time email sent to his uncle and time disappear. Emails sent to shortly after he disappeared. Surely it is related ..... Clues opened a story
Roller to think and speculate in silence. On the internet when the organization still emailing thanks to his uncle mean they do not know when that uncle he had disappeared, and also means that the uncle he could not show up on the network anonymous, just might be someone very the information grasp something. Roller retrace the nearest period before he disappeared. He also never asked specific job at his company is, just know it's a big company in technology, the way home about 30 minutes by car. There may be clues there, must go there "Roller thinking" can not remain in the house that groping in vain like this. Maybe there are not just the look on the internet to be (This I feel is right, not just what google is the end of it). Tomorrow I have to see how the new site is. Roller disconnect and got up from the computer, also has two today he has not showered, and what helped him to sustain life for two whole is today also cakes and mineral water already. Bathing and
eating to prepare for tomorrow, but ....... All night whether to bed very early, but he still could not sleep, thoughts kept hovering around his head (How many today not feel mention any relationship of this young man, probably as well as an FA main brand) the next day he woke up at 4 am and prepare to hit the road, now is still too early, long time since he has eaten a proper breakfast .... right up the road roller 6h ..... . Uncle Mike's company is located in a small and fairly deserted road, nothing strange at all, everyone was rushing to his work. Roller find parking spot and walked to the gate, the old guard walked over to ask: He has something that, boys? In less than 0,5s roller paints a story. - Hello sir, I came to find a job, I hope this is the correct address. The guard looked at him with strange eyes: - Maybe he got it wrong, I do here quite some time but have never seen them looking for people both .... Uncle Mike's company
Strange indeed, never find someone, then those who are underground and out where the hell the other does the same. Perhaps his attention was never protected only enrollment, not no way to enter that company, roller decided to return home after observing a moment longer ... Must find a way somehow in the company, surely there must be ways ... Roller return home, The companies that exist in a real world, not a virtual world, make sure to have information about it. Roller back side of your computer and start searching for "Company Technology R .....". It is true that information, but that information is completely normal, company specializing in software development and network installation. Nothing strange on google. Try to Search Network multidimensional network information see anything better not (I feel like on the multidimensional networks also what must be). Technology company R ..... Nothing, roller disappointed. it is true that it does not exist here so or it exists with a different name. Now perhaps should find Matt and asked him whether the information does not, seems to be a believer to be .... Roller search where he thinks is a plaza in the multi-dimensional computer network, where but the first time he logged on, he appeared here. Still is the man with the mask of sadness, sitting in what looks like a chair, but completely unable to move, maybe Matt is accessing something ... Granted information wait so. Is new friends 30 minute wait, with Roller at this time seems more prolonged period, they must, he enlisted pulse quannh review. It seems today, the black wings appear more must be sitting here in as if the carnival halowen somehow. Suddenly, Matt seemed to move, you need to meet Matt immediately. Roller control
your character interacts with Matt: + Sir, I want to ask you a few problems it seems he explained. Do not see the characters that move, but in the message box below your screen flashes the message. Please enable information security, we will be safer if you use it. Roller said through compounds that matt said. I want to ask him about the technology company R ... A chat notification period again. Come back tomorrow at 12.45, gate number 9, search and do not ask anyone, now I have to go Roller asked to add a few things, but Matt is gone, sure he was disconnected from the computer network already. Roller still think, should go back to the place that is not strange. There can be no danger. Maybe, but still have to try it, if they want to find themselves, it probably did from the moment that the first time connected to the network and anonymous. Perhaps who has sent his thanks uncle help must also have a certain relationship. Roller again disconnected from the network and go lie on the bed. Now we need to sleep, be alert to it as possible. He fell asleep, but until midnight startled awake, feeling nervous as he could not sleep. Roller to the cabinet and click a little wine, he felt a little better .. New staff The next day, prepare to roller .. I do not have any other clothes seemed polite at all, only temporarily shirt wearing uncle so, slightly wider but also okay ....... 30 minutes later came roller door company, no numbers, but what the hell do have to 9 gate anyway. Matt has the connotation that what what ah. He watched it only has 4 ports on the side only. Gate 9 is what the hell. 12h40 five minutes remaining roller watch. In his mind flashed a thought, 12 45, the minute hand points to 9 perhaps it is directed. port is the gate number 9 on the left side (Correct rated Empire style, mouth cried scenic corner darling 9h) roller down the car and walked to the gate, to 2 minutes .... Test 12.45 clock properly. Roller feeling slightly nervous. Suddenly the gate is opened, stood before him as a man reach 50 years old, gray hair and white shirt rumpled, sad face still looks friendly. + Hi Roller man said. Deep voice and slow, it made him feel more comfortable. + I'm Matt, it seems I do not look in the virtual world, right there. He looks a lot like Mike, it made me more confident. Roller ask again: + He knows my uncle? Really worked him here?
Matt just nodded and motioned for him to follow inward. Two men went to the room, it is true that the room looks pretty weird, machines that he has never been seen, apart from a few chairs and a table, nothing else. He sat down while matt slowly at him. + Do you really want to pay him, although it can make you be disappointed Roller nodded without thinking, perhaps he himself knowing she accepted this job and embarks on until the place, as well as for pay. Matt said while his eyes half closed, looking like vaguely into space: - Mike is a great man, both in real life and in the virtual world. The story also from too long ago, from the day that I still belong with him held "temporarily called organizations like preventing threats from the internet". We did not know that was wrong, Mike can not reveal his identity to be, no one betrayed, yet still have guys come .... In that night, perhaps I was sewing Luckily .... car flip and when I found myself waking up unconscious in a bush nearby, also not seen Mike was there .... there is absolutely no information ..... Place of safety most probably in here. Actually technology company R ... is a headquarters of the Assembly, I feel that only here I can safely and continue to find out what happened to us. The new lessons After Matt Roller tells the story happened to his uncle, Matt led him into another room, looks leaner. It is the room his uncle worked, still photographs with a smile ... + Do you want to do the jobs that do not pay him each Roller nodded silently. + Then study enough knowledge so he could protect himself, in which all that you need. The other side is cold cellar, bathroom, and all ....... from now you can forget about your own house. But I still need some stuff at my house. + I will wait for his return trip. Then you need to be here until the end of the test, if completed it you can stay or work anywhere you like, as long as it's safe enough for him. Roller drive back home, he needed to clean up fixtures need. roller home and replace the old computer chip, all the furniture of his uncle and must carry. Disconnect the decoder and computer, so can be assured then. Roller rush belongings, and move the vehicle back to the R .... New technologies
(This paragraph matt roller meet and stay in company R ...) Matt roller only new technologies, what ever he could hardly imagine that without recourse to the document in the USB uncle mike leave, the new chip manufacturing technology, how it works of an anonymous network ....... Roller need to master them all. Until the moment he first saw the pants ass grinding day in school it is also quite useful.
Take 3 months to roller can understand the basic components of computer networks here, have not mastered it, but also not bad. In the words Matt said it today he can reconnect to the multi-dimensional computer network and started his first job ......... A new day, it seems that many things with roller ... First job of roller Matt 8:30 properly appear at the office, today he looked cleaner than usual, (make bathing). + We begin its work only roller Roller sat before the computer ... The computer system here is much stronger than what was used in your home, even when he mounted the new chip is probably just as well as compare a child with a boxer punching. Roller started logging into multidimensional computer system, also has a few months since the last time he escape this virtual world. Feeling slightly nervous also long days like this do not come home. Matt shows him how to access the data network of white hat hackers on computer networks multidimensional, roller consider the content in the box of his personal mail .... All these projects, designed the security for a certain network. Roller surprise turned to ask ... + I thought we were looking for my uncle. Still staring at the computer Matt replied: + We need to have the money before doing it instead. No questions were posed. Roller returned to his mail box ..... Well work rather than to use, you can make a hundred thousand dollars if completed pile This email was rather .... (draft does not see business what, every day facing a computer without fear of starvation) One day, not so bad .... that was new as a moment before 4pm, roller just sipping a glass of milk and bread, just thinking blankly. Matt still intently do something .... maybe is important, because the roller see the sweat on the forehead of this man. Trace .....
Roller table hurried to see Matt motioned him back to the table to work immediately. Exiting the data network of white hat hackers and back to the plaza. Matt turned to him and said: All documents and clues about the project Kiss.TT6 I was encrypted and sent to your mailbox, it seems that this group is implementing a new plan aimed at a certain economic organization, in two days , read and remember what can he deems important. Roller reading material, especially names, maybe that is an alias that the other
people in your organization to use when joining and multidimensional network. Roller continued to seek information related to those names, think about how they had been used to beat a website or penetrate certain systems. British special attention to a name: the method of use of this less detailed technical security. Using these methods often involves habits of audiences and take advantage of his weaknesses. (This method was used by a famous hacker world. Each statement will cause traffic congestion of a large website with a single fine in the phone, this thing ..... There I also know this when the time What to watch trial was successful, the technique could be prompted to spend more than in the later) This character rarely occur in small projects, community is quite respectable black hat hackers (not without the use of technology that are less light oil). 2nd character he noticed it seems that a female hackers, roller-based names to guess, pretty much the cult service, but a target is not money .... (probably want to grab the grab cheek in hacker circles) At least 12 cases of theft of data of large financial companies suspected palace guards to (tentatively called) female hacker. Stolen, but only announced the first page, the rest should not be sold, nor be returned. The other characters seem closed and do things just for money. They hide themselves and less involved in what they supposedly do not bring benefits. Only 24 hours ..... Two days, Roller did not do anything other than to read and learn something in the document that Matt sent him, Matt also does nothing more than to dwell on something Network Query multi-dimensional computer system, still the sweat rolling down his forehead .... roller felt about as there is something very important was going to happen, it must, I just sit quietly and not thinking any further questions .... Matt suddenly turned to excitement roller with a voice like a new man picked up a large amount: + Roller begin! We have work to do in this world and hell ...... Ghosts on the internet Roller immediately return to your desk, on the matt screen being connected to the main screen of his communication. Here is a map simulate the connection and security of the global Internet network, although it is not perfect but it helps a lot of things. Matt explained. + The white area blue expression means the connection is normal, white is temporarily interrupted, the red is being all work and black is completely disconnected. Do you see areas where there are not signaling attack. I have two days to track the signal. Roller ask again: + The signals, on which no attacks? - I recently upgraded signaling system new, attacks small scale does not show,
however now it has not reached too big for us to worry, but he has seen something special , all small-scale attacks on ... It yesterday are aimed at the subsidiaries of the same organization. + Offensive style roller grade climbing think. it familiar (this period his services as such, but in general this is the type of attack that you find ways to exploit from the computer with the lowest security, for example, in a company guy Directors is the highest security but it must contact the head boy, head straight back to communicate with staff guy like that ...... According levels. Attacks of this type are aimed at computer security staff have degrees low density, hijack it and use computer hacking tricks to higher floors, until there is information, or take control). This attack has a high success rate but requires more time. - It's like attacking a man in profile. Time to collect all information of the machine has been attacked. Roller and Matt statistics all machines have been attacked, but the figure is quite large almost no positive for encroachment to the next floor, also small quantities only. Roller test his new program development, it has the ability to protect and save the IP address connected or trying to connect to your computer in any way. New program So I must hack, roller thought in my head. Work now guys like Anonymous did. He needed to hack all the remaining computers in the system that hackers anonymous're attacking. Make sure your program works well on all those machines, it must lie there quietly and save addresses and hacker attack methods. Now need to go faster if do not want to miss the opportunity. Roller began its work, to evening he finished installed on almost all the remaining computers. The rest are waiting for the results reported on longer. He turned to Matt, still face pensive as're thinking something. In a few days later, nothing unusual (Roller still waiting and doing work on the multi-dimensional network) Fortunately the evening began with the first incoming signal. These computer software are being installed simultaneously receive an email with the address of the same as the company they work (for example, the mail is gamemater.volam old days it was fake into gamermater.voIam). Mail carefully open to check email content, not the virus, just a mail with the web address spoofing is a hacker to do with the purpose of getting someone who is have company email truth, if not attention , maybe they will take account and data connection. All emails are sent from a public server, anyone can rent it to email all. Roller block all emails that do not show up in this network, I have a better idea. Roller creates connection with the reverse fake website which pretends that hackers have succeeded and collected plenty account information. Roller then create a virtual network like the company's network which hackers penetrate the nail and the false information on it. He thought to himself, "To penetrate well, then infiltrate my computer this here," he hoped everything he would help him get prepared partial information from intruders. Haker trap
8:30 pm True, computer signals roller notice someone is logged into the system virtual network he created, bastard, you're caught in the trap of creating and roller you thought. He immediately learn about information security criminals are trying to break the wall of his virtual creation. He connected via a ring network, the IP can not find out, but he was expected to be the situation. Roller created a series of dummy data at the next floor to look it seems to be real. Unknown hackers are trying to download that data on ...... it is loaded too many public servers, hard to find out the real address. But his attempt was different ... All data have been transmitted completed: (This paragraph has nothing special, roller connected computer online local search, his aim is to wait for who it sells the information he has obtained on the local network, and you will acquire. ..) New information has been published, the document that appeared to name the seller are recorded as DAVE price for this material is $ 200,000. DAVE try roller contact, a letter of reply .... All information controlled by you, every decision is your decision, you just send money for me and all ends. Bitcoin transactions entirely ... Roller send $ 200,000 to get the DAVE documents accompanying message, $ 4 million for a document that I want to get at Company X. If it is correct all the Bitcoin currency. (Actually the company X that is due to roller up with technology, forged information, do as it exists actually, in the system of company X that Roller has installed a trap to arrest those who sign into it to show up.) Now just waiting for the fish to bite again as done. Dave Hacker name after two days, presumably to explore and validate the company X had replied Roller, I need 2 weeks. Roller thought: bastard, but I'm just 2 days ....... and email back to DAVE + Shorten time, 1 week and it was $ 8 million No email reply, perhaps Dave has started to work. (This paragraph Roller track DAVE via virtual networks that you create) 2 week is enough to Roller detect IP addresses really Dave thanks and a special code which he installed in the document that DAVE downloaded . $ 200,000 does not go in vain. Catch hackers Dave reveal true identity, an engineer 25 years old of a technology corporation headquartered in Russia. A picture of his mail Send to Dave. His identity has been revealed, I want all the information you have about the person called Blue online multi-dimensional, or information, and the attacks he will be sent to the network of local searches, make DAVE knew, send the information on it is synonymous with complete disappearance or death.
(This paragraph ngoang diluted once, roller learned about his uncle, was an organization find and supervision, he must accept the complete disappearance or all die, including roller, relatives Mike only) Roller does not know that his uncle was alive or not, but if as it disappeared, that is not dead, and that means Mike make himself disappear as perfect as the safety roller. There must be some way to find the uncle Mike What remains Uncle Mike was gone in exchange for the safety of all, family and friends, can not disclose all the imperfections can make all worsened. No other information from Russian hacker. He could have disappeared completely, but no, things left to Roller seem to want him to look for something, maybe his uncle wanted him, it was him and not someone else solve the mess this. Speaking of his uncle's belongings which, the box looks like a milled stainless steel the other pepper, if you leave a note, which means it must have a purpose instead. Roller held the box in his hands, nothing but photographs and two of them children pose together during roller achieved the contest computerization young undergraduate days level 2 (this period roughly translated sure the correct level 2 then) Damn, it's heavier than the weight of a normal box (This paragraph roller discover the box is made from stainless steel ones that make recovery hard drive ... hard drive capacity to do much less so. The information is only for roller organization know how big . pay him alive and remain hidden, everything exposed when not found a way to ensure safety for everyone are too dangerous, his uncle still has to disappear completely until may ... Roller take weeks to grasp the authoring of the preliminary structural organization, so perfect .... too large and government networks around the world wide. Roller temporarily return to the work on the local network, you need the money .... maybe need a lot for the intended future) Intended roller One year has passed since the date of roller knew about the secret of his uncle, in addition to work on the local network to help him earn a decent money, roller also in the name of Matt to set up a company specializing in network computer based in another country. Roller need to do something enough to confront the other giant organizations ...... The information on the local network and what uncle Mike to the help he learned that, although the organization has huge but it does not work like a normal company, it has no head clear, only as an organization, some of the characters head commanded and organized scale attacks for bad sill below, they join and get paid, so it is difficult to catch the conspirators ... But weakness, despite large organization to some must have weaknesses, Roller need enough people, enough money to be able to find a way.
Decision on sugar Roller decided to where is said to be the ringleader of the organization is active, the signal from the attacks that the British track throughout the year can be emitted from Russia, must hit the road, not all have important information on the internet, you need something stronger, more convincing. After Russia, Roller works for a company specializing in network security is quite large in Russia, in addition to work during the day, night online local search, Roller established an organized set of White Hat Hackers from around the world with the name, Blue A. (forgot this paragraph roller uses its own code name, no longer use the name of his uncle again) Zier is codenamed hours of head of Blue A ..... But officials ..... Uncle Mike still can not return .... Organization has yet to be defeated, and life is still ahead, the mystery has not yet been revealed to open ..... The adventure is still waiting at the front roller. Boy wandering After Roller secret organization founded Blue A. The work in the evenings or spare time is his search for information about the uncle Mike and seeking membership for their organization. Roller tired, still had no information about his uncle, he just wandered leading to the building just thinking. Oh! a boy. About 15 years old, it the theater passionately at ATMs. It's doing something right .... Roller when you see him with the laptop near the ATM. "The little guy is trying make withdrawals from this machine."
the alley is next to wonder to somehow
Gently approached, Roller suddenly came up behind and grabbed his arm, scrawny kid too. It startled looked back at him with a look that he felt a little uncomfortable. not angry, but as something that it can not speak. + He is trying to withdraw money from the ATM this. That could make him go to jail. Arm boy threw up, it bowed not say, "In contrast to the attitude of a thief being caught". It mumble: + Can you let me go, we'll split the money. + Ah! I do not need the money .... Roller said with a sigh. Transient sadness on his face, perhaps many years living in a virtual world full of pitfalls that often that you can pedal to make him more sensitive, they must. + But my sister needs it, it should have something to eat and to wear warm. I want to sell the machine, but no one paid me the price that would be it be like that .... And further it is my father. Eyes it directly like crying. It was a guy wandering, with a sister and one old computer ... Somehow Roller again remorse: + Which leads me to my place of him, I'll buy his computer with the price that it deserves to pay ... Roller followed him to where he calls home. An old drain pipe with bulkhead. Which is a 7 year old girl about 6 eyes looked at him with panic.
"It tells the truth" + Do you think a price worthy for this computer is. After some thought, he hesitated: 200 dollars, why. + Roller gave him $ 200 and take the old machine, the boy still watched with sad eyes. + I used to see him go through this, I will find him and acquisition machine. Roller smilingly: + I have a different standard, you can be in my warehouse, she can not stand anywhere, anyway I also need to find someone to help some errands. Boy excited, hastily carrying it and I tagged along Roller In the beginning he had an idea. That made him feel elated .... Relatives of Roller From day two kids come in, Roller felt more cheerful, kid actually very smart for his age. It can construct a security system is quite good, which is probably at his age it was never done. Roller boy helps the odd jobs, sometimes the network system is not too complicated, he let it. He also let it go to a school nearby ... Signal attack The boy did not look as always, (à forget this boy named kai) it looked like he was worried something, roller asked him whether what happened, probably in what the school has reasonable .... (Roller began to kai learn the techniques of security, created a software that can go unnoticed by management school. The mechanism of it may be fake the actions of management software, whether sitting in the classroom, the outside and not be detected. but it forgot that it and someone has discovered this software and duplicate who anonymously and destruction of school system)
in this section, kai has software of students at the the computer and through the but to access something on is using a public computer, it, at school full of those
Roller hearing the story of the boy. Rub! kid pretty too (he thought) ... But a guy wants to be a hacker or something like that, to know himself what his control cause ... Roller advised the boy try something something to prevent what the software does. He also tried to access the school's network and check what the kid how to create it .... "Well good? I mean" kid using a multidimensional cross connection and connect all all the computers in the school into a spiderweb, (this almost anonymous network but smaller scale) like IP address can hardly be detected .... but if the scale is too small network , can install software that records the signal is transmitted on each machine, aggregate and analyze what the file can still know what it did, Surprise Roller received a message from the network .... multidimensional signals are of an attack on the company that you suspect it has anything to do with the other giant organizations ... Unknown hackers are trying to access the company's intranet via the connection S system, computer hackers are reported using the software detect key pass. This
connection type if fast it took about 4 hours to complete, if the wireless network, which means he must be nearby ... 2 more hours, he rushed jacket coat and rushed out to the car. Unknown attackers Roller drive in thoughts, what made him want to seek information from the company right. How to search for information is too dangerous, must be in radius can catch that wave of internal network, or it can be someone of companies trying to test security. Just go there to see why, He stopped at a viewing location is about 500 meters radius of the broadcast of this machine is probably about 100m. So where could he be right .... Fortunately for Roller is what companies have fairly large campus, also at home around people. Roller walking on the sidewalk tiles .... He walked and observed silence .... Do not see anyone. He may be right ..... anywhere Roller continue searching but can not find. over two hours, maybe he broke the lock and then .... After searching for about 30 minutes more and nothing suspicious, he returned home to see. Do not know who he is. Roller check on the local network .... Damn, I forgot what game is still connected to the signal internal network that ..... but did not see anyone around that . Suddenly roller blame yourself: + Damn, the communications system indirectly, can he installed it in the surrounding area, then ...... He took computer and your tuner back to the company ...... Roller sitting in the car and start to use tuner to determine the device's location data .... This then .... I was looking for and finally found, it is encased in a plastic bags and tied on a tree .... + Should wait until he returned to take, or ...... Roller just thought, he decided to connect his computer to the transmission of data, with this indirect way communication, it will only increase by adding approximately 1 km only .... information for Roller knows about credits brand is transmitted to a computer is approximately 800 meters toward the hidden substandard housing on the trails behind the company ..... He drove slowly carried on that way ......... Cottages behind the trees
Roller stop about 100 meters from the building, the signal has indicated that other hackers just in this neighborhood, too difficult for him to search the house, roller devised another way ... around here just there is a way to get out, probably better to wait there, Roller think and stop after a bush, he waited ... signal was emitted ... 9.30 am .... the signal was disconnected, Roller suspense. Surely that hackers have to go through this place. A shadow came out from the house, he quietly observed, his gait as he felt a little strange, maybe you've seen somewhere
Dim lights from the houses in the distance is not enough to clearly see his face roller ... He walked down to the car and approached the stranger: The road only a few balls passersby: + Sorry you could lend me a little fire not, The man turned around ... Dim light, but enough to let him get out, that's kai .... They did look at each other silently. Roller Kai according to the car and returned home, the atmosphere remained silent, sister of kai slept long. Roller asked .. + Why are you doing that! Kai hesitated: (The story of kai on the family, on the father the boy worked at the company, which is an engineer in information technology, but on a day ago about 2 years he will never return, man J name, Ron) 2 years, it was not much difference as compared to the period uncle Mike disappeared. Kai asked: Note also, so how to know that the world was there. Roller quietly answered, then one day I will get to know, and now, all of her actions, talk with my uncle, who can help me. I can be detected today by a different person, and it's too dangerous. First game The roller first student After what had happened, Roller decisions need to teach kai know how to protect myself, techniques, ways and some attacks are his analysis in detail, Kai proved smart , what he said it will acquire quite good, but .... there is something you always sign ... that's the anonymity network. Then one day it will be known, but not right now. 3 more months passed, so the time he moved to a new place is quite a long time, Roller miss his room ..... Every day he talked with Matt on the local network should also be part held what information there, no attacks too large, probably have something that makes more sense in the hacker scene this time. Now kai may also help him work some small, some network design security for small companies ...... Perhaps the time has come ..... Roller also need someone who can help him. Like test that Matt for him, and it's time to go through it Kai. Kai's tests
Roller start thinking about the content of that test, it must be the closest to reality ..... but first must resolve what remains of Kai software in schools. It takes about 2 hours to Roller grasp the entire school management software it. This program runs in parallel with the operating system but does not let you off. Including making algorithms such as trojans, record keystrokes, the list of blocked web. Kai software disables this algorithm and making two computer installed with invisible management software. To solve this problem, just update the filtering algorithm and record keyboard and update the entire machine in the field is to be ..... Not too difficult, make Kai do After the decision for a test Kai like you before, suddenly changed his mind Roller for not much time left. Maybe, the main test is the job of the boy first, it may help it search for information about his father. Check ..... After thinking a lot, Roller decided to call Kai to: + We have work to do, I need to learn how to defend myself more if not detected ... Get on that company, and the set of signals from the inside . + But I can not! Their security system is quite good. Kai told Roller So to use a new way, please tell him of her plans, not to arbitrarily act now. Roller had lost yesterday to study the security system of the company. Seems as you guessed, it is related to a certain organization, a company that normally might not require such security systems, but ..... he is a pro. Security system consisting of basic parts: + Wrap the outside of the system and protect the corridor. The camera is also pretty much quantity. 2nd + system when to be in the cards from identifying the name and number. then the fingerprint. on this floor, each with an id and access data with different rights. + After more is password protected computer All these things are controlled by a local computer, with absolutely no connection to the outside .... Cachcua Kai is taking advantage of wireless connectivity waves spread outwards to connect and companies, but it is unsafe and too dangerous, Roller has more great thoughts. He suggested to Kai: + If I want to open an attack, or something ..... please understand the goal as possible. This holds true in all cases, thoroughly understand the work lights are going to do more and better protect themselves. He wanted me to learn all the staff are present in it, work .... name or email .. in a certain way. Kai! start acting .... Kai began to find ways to collect information in the company of those strange. Must somehow force them to say information as well as your email, but, to do whatever possible ... Kai told Roller of intent once again want to connect to the wireless
network of the company but the roller does not agree, it is too dangerous to be detected and countered. Kai continues to think, if there is no way to connect to, they must direct their questions well ... Kai smiled mischievously. Yesterday after the boy was awake roller out from time to time, around 8 am, it comes back with a snack car, the face cheerful + Of my friends .... I borrowed him to carry her own plan. Kai and Roller drove snack approaching strange company, in this position can be observed very well .... And more importantly to snack .. First guests approached: + Give me two Bread ham and water .... Water just bread Kai said: + Ok sir! He said bothered name and email to the boss I can make him the payment slip ... The man did so, wait and take your meals ... He worked in that company. (This passage is recorded for this area at the company and places where fast food is quite good observer should recognize Kai). Continue like animals, until the end of the day, he had in hand about 20 names and emails of employees in it. Roller smiling "He pretty too". The need to do now is to turn the newly collected information into something usable. Kai plan Kai began work like spy program management software of different school but an uncle. Completely hidden away on the operating system, or remove ...... unquenchable And special features and is the key to planning algorithm kai is outside help save the information and the manipulation of the machine infections have it open a secret connection port, help hackers gain control of network access and freedom through that port without the user even knowing. The need to do now is to send it to the other guests and I hope it works well ... The connection is open Network connection is opened by Kai? All day long waiting for, today is 7, has made the first computer installed software that Kai created, but the purpose of this program, other than collect information from computers that Roller and Kai .... guess that nothing that's just ordinary employees. Their aim is different, the computer these employees to serve other purposes. Sunday still nothing other than three of those silly emails employees of the company strange. Probably have to wait until tomorrow, when they started working at the company. The next day, and two children got up early and look at the computer screen, hoping one of the infected computer connected software out .... (Computers infected with
software that can be used as a roller the indirect communication, it helps you from that computer can take control or access information from within the company intranet without making direct part in wave wireless sector). To 10.30 still no signal of a connected computer out, perhaps in the company that are not used signaling network or access the external network?. Roller try to send commands to the computer test was infected software ... strange, there are signs signaling connected computer off, then there is the problem of software affordable. Can not, yesterday you yourself check it carefully after all. That company can use one door security system, ie the connections want to spread out, must be checked through a master server. No problem.... Yesterday he added a software algorithm to Kai. He turned to ask if it has ways to try anything before activating the system. It is silent for a moment .... Then start to the computer .... Sweat face it. An hour passed, kai still can not activate the mechanism helped him escape through the filter of that company communications. Still have to learn more, "Maybe he was too hasty when pressed him to do this." Unexpected signal on the computer indicating that Kai was successful .... Not by the Roller ... It uses a different way, she knows if the signal sent to and still be able to get a response back though do not tell us what information other than to say that, can connect to resubmit, ie outbound connections .... It does not try to activate the machine being monitored by a host signal filter .... it! ..... Attack is always the same server, excellent "Roller think" great kid too. He smiled contentedly. Offensive way of Kai Cyber attacks by kai The boy seems to focus, let it use its way, Roller silent observer behind. It looks like it has been the host to trick him. Connection mode has been activated ... Kai downloaded file records all employees within the company. The documents and records are downloading, download mode has ended, open a connection port can be easily hidden to access the internal network at any time, that's it ... They did spend an entire afternoon to pick out the important parts of the document is downloaded, the boy is still learning about his father, also missing as his uncle, and the roller is different ... He checked again but this company's connection to a network ... the network that he was so familiar .... multidimensional computer network. Do not know the boy can recognize changes in the transmitted signal seems so natural in fact this is the virtual connection is not ..... It is true that someone is connected to a multi-dimensional computer networks however can not detect the connection should look like, to have a different way to know that. That also means that ... If you have ever been connected to computer networks then this is probably not the game lasted longer, must take the time .. There must be a way to find out if the guys connect to multidimensional computer network that is who and what he is looking for. Roller visual data files of employees in the company, he has in this or somehow be avoided. Need to find ways to hack CCTV (security camera format as in Vietnam)
New information on CCTV Roller sought to hack through the CCTV data server that Kai opened outbound connections. Sure people connected to the network anonymously to the extent not unintentionally expose what he is accessing entered the CCTV, but there must be something other than. Download data via the CCTV took 4 hours, he read through the files enlisted personnel records that boy Kai downloaded .... still looking for something. something related to its father, looks tense. John, the father named John mysterious disappearance and police could not find. Show up in the memories it is a man yoke 45, gentle and loves it and sister ... It still remember the last day, he looked tense after seeing something on the computer that he used to work .... Kai do not mind it much thought, perhaps too busy job in the company made him tense, until one week later .... He suddenly disappeared without leaving a thing ... Police conclude missing due to the psychological state is not stable, but it does not believe ... There must be something he had seen on the day that day. Only a mere pen strokes on paper ngoang diluted ..... As the company name strange that Kai is looking for information. A few years ago it always seeks to collect information from companies that vain, nothing but silly stuff document. Who are they ? Data loading process has finished, many CCTV recorded segment from that company, Kai hurried back to Roller to view the CCTV segment there. They did take more than 2 hours to see the small part of the recording, still have not seen anything special, angles and only scenes employees who go into the company, working and chatting as usual . Perhaps there is a special area, or a particular port Camera. Probably should have some way. Roller is still thinking, he can not sleep with these thoughts in mind, around 2am, roller turn up, there may be a certain part of the camera can not be loaded. He counted the number of cameras on the screen ... a total of 24 female with different angles .... Roller hit the road the next morning early to the company strange. Roller pretended a morning exercise, he observed outside. 2 camera angles, which means there may be people in from the back door, and they can not be recorded ... Roller continued to observe rear, it is true that the camera does not have here all ... Wait! What traffic cameras on the road is approximately 200 recorded material can not, he walked across the lawn to the road and gone .... With this angle, you can. Roller record number. 1092 digital camera line tr ..... Ok! with this type of traffic cameras is not that difficult to get data from it. The strange thing on CCTV No. 1092 Roller returned home, Kai woke up, his little sister was still asleep ... It continued to search the private ones loaded CCTV company. Roller sit down at the table and began to search the server containing the data of the camera in 1092 .... Again take about 4 hours to download his data in the last 3 months ... can just load the data was browsing through a section to save time.
It is true that there are people in the back door ... not less but also not more ..... Roller special attention to the man, he walked to the gate and looked like he was in a hurry. .. date 24/5 days back was reported on CCTV. He hurriedly told Kai synthesize all the CCTV related to the 24th and start watching ..... Strange man The man was wearing a light blue shirt, it seems he is rushing something. Kai still collecting all the CCTV segment related to day 24. All possible angles are Roller and Kai scrutinize. No ..... Absolutely not see the man appear in any corner of the machine on the CCTV again. They did continue to watch the whole tape, they take several more hours for the next day ..... Still completely not see him come out ... No way, not perhaps including research parks à spot. The man looks in a hurry, he dressed not seem to be there all the research ... But why did he disappear entirely so. If there is another door to make sure they still have caught the traffic cameras. Roller make sure that he was in there, did not appear in any one CCTV does, then only in case he looked out there and not because of a certain reason There can only be the case! Find more evidence Need more evidence, Roller continued to wear the old cloak and drove his car to the company strange. Impossible for them there so long, it must have something to use. Roller mount a camera on the corners but still enough for you to observe the entire back home, but to go home ...... roller continue to monitor the tapes several days later, he completely see strange man come out or, appear in any public CCTV installation ... Only two cases only + Maybe he was killed in it + Or that's it, and we know how to himself never to expose Roller continued to observe more days. absolutely nothing remains other than the image of the normal staff. That drilling .... In footage this evening, it seems there are people in companies strange and evening, CCTV from the transport system but out problems he dimly realized, had the ball a woman and a ball again it seems that children are in that company, the car goes away soon ..... Those in the company
Roller was thinking, did not see any evidence showing that people who have left the company, has completely disappeared as the strange man. That can make sure that those people are still present in the company. Roller should have access to them somehow .... Must be closer to the Tiger Cave. The next day, he had to prepare for a new plan, you must be inside the company, find information Roller of CCTV installation companies that often hire companies that install ...... Just few tips, Roller add your picture on the profile of the company that mounted camera, auto mode canceled after 1 day, and he disconnected the camera inside a company. Ok now, wait until they call your number of machines that have prepared severance ......
Roller continues with the attempts of the invention. Maybe those people will forever never come out, once he read about the case experiments barbarian on humans in the local network, there are some who are willing to spend a lot of money to carry out the experiment experience brutal and inhumane. They tested these drugs, the methods of torture ..... on the human body ... Planning of roller
The phone rang, just as planned, the company's request to call to fix the camera. Roller workers dressed and hit the road, 30 minutes later he was in the company that weird. These offices do not have a sign outside is nothing special, it seems people just do the normal job ... Roller but still felt there was something unusual ... The room seemed little window. Yesterday he had installed to disable the camera in a position quite mischievous, to get to the location of some cameras have been very out goods that need to go through some areas, observations and calculations, roller find a position for him adding to it a few cameras ..... what he specifically noted that a room with a steel door, looks weird ... can not install in a any angle can give him enough vision .... can only observe about 3/4 corridor. Roller installing your camera, connect the computer to the camera and open it, now you can better observe both outside and inside the company. They can not come out Kai still sitting inside the computer when Roller back, the camera works well, and two grandchildren also need to eat something instead. This time you not have anything happen, with his back also has set the record mode and the camera on the whole. 6pm, both still sitting watching the camera screen, almost all employees had left off. Leaving only some of the staff at the inside, next to the room where the iron door, they're doing something ... It seems very focused. strange hallway lights still do not see it, maybe it's a shed or something like that. 8pm entire staff seemed to end, and two grandchildren disappointed with the results obtained ... Kai called to: + Note Roller stay here! The camera turns to the screen roller broadcast from the traffic cameras, there is a small van was stopped at the gate of the company later. Remains the car that the woman and child were transported to, but this time no one, outside the shadow man hi hui started something in the car, the car seems broken, they must ... .. The man on camera Factory air conditioning gree 9000BTU room was still operating normally but both uncle and nephew still feel the atmosphere is somewhat hot, man has entered the inside of the gate, he followed the path that would not have the camcorder. but this time was different .... Roller system works well, the image of a man 50 years old with 45 views and suffering people face gaunt, his face looming in the dim light, but still exudes a that makes it seem frightening ... he disappeared at the
end of the corridor, where there are strange metal door, cameras can not reach. Roller and Kai and continue to observe, did not see the man back out, press the camera remains stable regime ... .. 2 hours later, Kai fell asleep .... Roller also need to make yourself a cup of caffe to hold out, he a little tired these days, perhaps the company took some effort of him .... Incidentally, the computer signal indicating there is movement on the screen, Kai also woke the man also came out with a bundle in her hands, gait of old still unhurried, slow style make others be disgusting .... He appeared on the screen traffic, onto the small coffin car and disappeared ......... In the previous Roller saw a man out of the company at night, it looks like he was doing something in the room with the iron door. Murderer in strange company
Roller little eyestrain, but still enough to make him realize, in the bundle that man strangely brought out from the room with the steel door is an arm, Kai seems shocked, perhaps something like this still too new for it. It is true that it .... Roller think, projects inhumane experiments on the human body is real, what you often see on the local network is real, but he still feels strange really exposed to it ... That means, men, women and children ..... possibly Kai's father, has never can become out ..... He sure knows it, face tired and thought .... ultimately what he had read in that day, what do you to the company, as the man and the woman ... that's something. "That question itself around inside the head Kai, it must find the answers." That's what Roller'm thinking, maybe they were used to the way other people look to ..... Kai said his father had read something before disappearing ... It may be something to be right. Mysterious bulletin board Roller began searching for information about men and women in the company .... If you tell the police, maybe they will be caught, but not all, he needs to find out who is behind ... the time has come already. Roller log into the local network and send messages to members of Blue A, the member whom he has gathered during the past period ... all invisible, and good luck .... not all are doing for the money. Images in the video is loaded onto a local network, members are working to analyze and search, to make tomorrow's results are thinking ..... Roller, Kai still sitting inside the computer. Suddenly it asks Roller. The connection is so strange uncle! Roller silent, perhaps it's time to tell the boy about local network ..... He described it the bizarre world that the boy did not seem surprised, perhaps it foresaw anything.
Identified The next morning, reports from a member of the organization ... Picture too dim and can not clarify facial analysis, based on the characteristics, some details may be analyzed as, figure, clothing worn when disappeared, hairstyle or anything ....... But in that time only 2 men and 1 woman whose identity may be the same as those in the clip turns without information loss ... their living area all around the city area. But.....! what do they must go to that place. Can not be a bulletin board for very little number of people and a common characteristic is that they are living alone and had little contact with people outside the father of Kai ... Maybe he unplanned, accidental reading something should be forced to disappear ..... Roller return home. Kai! my father read the information on the computer so that we can try to restore the data .... Kai thought, suddenly it exclaimed .... back then! it remembers when he realized there .... strange attitude is what computer aunt aunt .... After the event it also moved to another place to live and also do not see any contact with brothers it all ..... it still think it and I it outcast after his father disappeared, but ... could it be ... Aunt of Kai It is true that day, his father led 2 brothers to the aunt play, and obviously when he saw he was sitting inside the old computer's aunt, after his father disappeared, Kai also look at home aunt across the city, now owned by a young couple, they said Kai moved aunt and now they own the apartment. Kai just think simply because too grief or for any reason that kai aunt and her family moved to somewhere else to live, leaving two brothers it ... Kai recalled, can do ....! it does not want to think more, it's really too horrible ... Maybe do what has been a family organization that abducted. His father accidentally read that thing should have to disappear ... The house where he lives now 3 father also owned by other people, the disappearance of the father is the police only conclusion. "The house is sold, Disappeared can move elsewhere due to live without notice". Who was in the apartment of his aunt and his family, they bought the house from someone ... Roller also has his own thoughts. Maybe aunt and father were arrested roller serve a certain experiment .... But what makes them reason to the company strange ... Must find out what content they read . + Is Money? + It is something? + Or due to control? Roller uncle is gone, but at least you know, uncle alive and must disappear completely to protect him. Perhaps because his uncle also grasp something that we can not kill him. Maybe there is a clue in this incident ...... Roller access the local network and on Blu own room A. online. A notification is given .... $ 200,000 for all valuable information from company xxx
Roller put a notice on the organization's own room he created, the hope does not make those who belong xxx other companies detect and remove traces. Cai aunt's old computer The next day, two on the road to pay her aunt's apartment, and the apartment where the family previously lived there Kai, pretty nice apartment ... Roller track and install a system to control information news from home. A week went by ..... Still nothing special. All information indicates that they are just normal people, a family business, shopping, a family law firm on the other side of the city, it looks like they bought a house from someone. ... guys that's whom Kai and Roller need to find out. Roller is looking at homes that previously Kai with you it lived with his father. It is for sale for $ 500,000 seems like the owner prepared to move somewhere. Roller call with: Kai! grandchildren want to buy back the house of my father, not it's somewhat unexpected ... rushed to read the private fire sale, but suddenly appeared a disappointed look on his face. + $ 500,000 to make me never dreamed that number. Roller look at it: + The work that you've made them pay, perhaps well over two hundred thousand, the deficit .... do not worry. Today I'll show I saw .... New life begins
Maybe it's time for Kai seen only on your local network, Roller call it and start pointing out the works and how it can protect themselves in the virtual world full of danger. The work on the local network, if you are good enough to do, the amount of $ 300,000 is not too hard to earn quick, sometimes just a few days ..... Just 3 months! Maybe have that much time to kai can learn to protect yourself. It began to read and just read what Roller recorded from a few years back. Time is not much time ... I've lost too much time already .... Roller decided to return to where he lived for about 2 weeks to Kai read all those documents .... Roller contact Matt to hit the road early the next morning. ......................... Return Date Kai Perhaps the acquisition of his father's house is what Kai had never thought of. He never thought he could get such a large sum. The work on the local network may help Kai do it quickly, the virtual currency often traded among Hacker here quickly be converted to cash. But like Roller, making money is not their goal, they need to
find their loved ones, whether they were alive or dead. The normal Hacker ... they can not go deeper into the local network, not because they are not qualified, but perhaps they feel that is more than enough if just here for the purpose of making money. New World said, those deep in the local network this is not for nothing ... maybe only because of a personal preference somehow weird. Tomorrow, tomorrow is the first day it and Roller return home that his family had lived from childhood. She also went to school children it seems it was not happy ... it does not want the house .. too many memories, it does not want to face it, but that's where it was born, where but it feels safest. The only trace The next morning she got up early 3 Notes cleanup belongings to move to the house, machinery and furniture quite well done but probably shortly .... Noon to 3 pay him nearly finished his work, just clean up and rearrange some things are OK now. To ensure safety, Roller has fitted some system cameras around the house ... She felt strange, but it still did not say anything, perhaps it was too familiar with things strange in his eyes , the two men are then slumped together. Kai walked out with an expression of sadness ... hand it is a small book, it said it was his father's diary, it seems that old pile of his father, who owned this house also did not bother to throw go, they put up in the attic in the house. They did reading the diary, nothing special ... family stories ... But strange things are in the last pages. A mere few words "Today, do not know what that is thankfully not, but give it a try .... Not, obviously something that I should go there or not. Without going well not be. " Two men sit, do not say, because they are busy thinking of that statement can be. It is possible that it was talking about the stuff that makes the strange visitor and his father, aunt it disappear .... Encrypted data The two men remained silent at each other, they're thinking about something else that made people turn to the company to find that strange, because money .... or for something else. Kai did not think his father to do something foolish, just for the money, but know where to be ..... something more important in causing him to think it? two brothers could be it. Roller did not say anything, he just quietly and attentively read the diary, right is nothing strange outside the site last diary, to find something that they are looking to the public strange company and become a victim to a conspiracy that ... Maybe when it is sent, not all will come ... will be those who read it and do not look to the company, they still alive, and who they are. Outdoor began dark ... They did still sitting quietly thinking, security system installation that Roller perhaps help them safely and observe everything around. Roller asleep in thought ... Suddenly he was startled awake when Kai softly called him, opened his eyes and looked roller towards it ... on screen No. 4 was installed overlooking the road side of the house, a car was stopped there, it's dark, but still enough to make him realize it was what the car was carrying the woman to companies strange and never back out there.
What the hell is it doing here, huh ... Roller silent thinking, about 15 minutes after the car running and disappeared. Continue intrusion Perhaps he was too subjective when no doubt that, maybe their victims are still closely monitored, although they may have chet.May luck is what his security system is also not too Highway willow, night difficult to recognize, roller need another plan. Roller called Kai and began seeking information from the server was hacked by the company ... all were encrypted, but need to find out something from the pile of information this syncretism. But it is almost impossible ... only one way eventually, adventurous, but time does not allow him to delay ... They did still work, The sweat rolled down his forehead. Still no useful information beyond a few bills from the inept encrypted files there. Plans outside the virtual world .. Only a day after the 3-uncle and nephew moved to a new home ... The next morning two Roller call back and say: - We need to move, I'll take two grandchildren over to Matt? Two children seems not quite understand but still quietly clean up the room and furnishings needed, maybe we got used to things like this weird. That evening, Matt texted He picked out two kids at the appointed place. House only hours left alone he plans too dangerous, not allowing Roller can adventure. He alone is more than enough. (This paragraph summary) Kai and sister to a place of Matt Roller connect all security cameras at home and rent a location secret include. Roller put a message on the multi-dimensional network: Things you probably never thought I would do before. Messages are sent to organizations Assassin is probably the most famous on the networks, all those dirty and dangerous ... These guys are willing to do everything for money. "2 Million $ for a plan to kidnap and to get information, but that's just the starting price" Messages are sent in the name of the organization of Roller, the name is enough to guarantee that for sure who will get back, but can also this letter will probably kill him if to them find out. Less than 30 minutes later had a reply: Oh hello! a famous white hat hackers should look to our game. I do not want to help you, but if you have money, you may request. Such means agree. Roller send information to organize assassin. Company Information strange and a photograph man swaggered upholstery mysterious corpse that he had taken from the clip content. 2 million $ to arrest this man, and another $ 2 million for an interrogation is transmitted directly through my communication systems on multidimensional network. ..........
Hide
Immediately after giving notice seeking information of strangers eye on CCTV, Roller received the message from a black hat hacker seeking information accepting of strangers with the initial price of 2 million dolla. But maybe, the move will lead to a danger he did not anticipate. Need to be prepared for any situation, what to do if indeed they can find the killer. Can not disclose any information that makes them able to guess or know information about you ..... The next day, Roller apply for a job at a food company that specializes in the new city. Here people are not interested in what their neighbors do, but a man with two small children around the house itself is probably not very good with the neighbors. His job is handling the system automatically calculates the warehouse for the company ... Preparation for becoming an exemplary man, morning commute, at home might have been prepared quite well. Now you need to connect the computer system at home with a laptop which you can bring to the company ... Can not miss, whether any one moment from your local network, but the connection , may create a vulnerability for hackers that they can find your information. (From this point, I will not say any more long lines, the story will be told right of the author) Suddenly a message is sent to the roller through local area network, a letter: If you have 3 million dolla I can bring the man you want to anywhere. Accompanied by an attachment. After handling a few security steps, Roller opening attachments from strangers. It was a picture of a man standing at a crossroads, but obviously that is whom roller looking man in paragraph CCTV, the picture is certainly true, every inspection technology that he has not shown any signs that photo was edited. Is this a trap not ....! Whether true or not is to be prepared. A plan was prepared roller ... Roller access to the organization's own system, which he created, a new notification is sent to a member in another country, (search and prepare a room, installation of camera systems so he can observe and talking to those present) Information revealed Roller answered letters from strangers: My money was for in the room. Please bring men to the room and take the money! Only about 20 minutes later had a message consent of strangers, it should take about two days to bring the man to the appointed place. That was the purpose of the Roller, if accurate timing and strangers do not know the real purpose of Roller, perhaps all will end ... Bomb Two days have elapsed from the date that the killer Roller and organizations to communicate scheduled to meet strange men on CCTV. Everything was ready, A room with full equipment can help you track the remote has been prepared by people in the organization. Whatever you want, can not face appears Roller appear at that location is. Those who exist at depth within the local network do things not just
because of money. Outdoor still pouring rain, heavy rain and wind slapped limited window space makes it become silent to the congestion period. Time seemed to move slower when closer to the appointment. What has yet to prove that signal, which Roller wait appears. I still believe that this organization will do the right thing with what they have promised, by some reason, even though such organizations on the local network can do all the things that we think is right. However, one of the principles is a top priority if it is to survive ensure everything goes as promised. Of course, with a contract from the head of a famous organization like Roller This group of assassins have no reason to be disappointed. There's something wrong? Only 5 minutes left until the time of appointment. What has not static. Trying wait see stars, I said to myself. The notification signal on the system remained steady rain outside the window is still no sign of stopping. .... Already more than 15 minutes, this time everything right out to the new place right on schedule. Roller looked at the computer screen, the images are transmitted directly from the house still does not have anything more static. Maybe we're wary ... Suddenly he realized something strange. No, I must say is a strange feeling it's more correct ... it's hard to explain the feeling, the feeling that something extraordinary. But he still can not think, it is nothing unusual. As mentioned earlier, Roller currently work may temporarily called the system administrator for a small company in the city. A perfect job for him immersed in the real world, every morning, he got up and, with his two nephews prepared for routine work, like any other normal person. But that's just "like normal people alone" since Roller decided to participate in the local network and the stories surrounding it, he can not be "normal". Someone is attacking? Time has quietly passed a hard, small room his only equipment Roller and dry, the children also have a safe time in a place far away. The safety of the children is that Roller top priority. Kai could help a lot of photos. However, it is still too dangerous if you leave it with you whenever a particular mission. And ensuring the safety of the two children is always the first thing he does whenever a certain plan. Roller sighed looking at the screen on the computer monitor of mine ... it seems he has given up hope on the organization of assassins on the local network will give him goals that he needed. Did they break the rules? the flies are flying up and down in the monitor screen, where he lives in the sky is pouring rain, but where Roller layout of the room, the temperature is quite humid and many flies ... Suddenly, as realize something, Roller stood up. He had seen strange things that he can not answer disturbed been saying until now. The attacker Roller blinked, he should have realized this long ago is true. Images on CCTV being repeated, he remembered that the glimmer entered from the door again just flashed bright, light obviously repeat, exactly the same 30 minutes ago he tracked screen . He hurriedly start the system scanning the entire network secure, it took 5 minutes to complete system scan. There may be someone trying to detect signals from CCTV collected, we know you are tracking remote screen ... Whether he was predictable, the assassin on the local network do not all just for the money. He still felt
anxious, whether the transmitted signal is encrypted and transferred through many ports. Fights back Security scanning system has announced that at least five attackers are trying to use the bot to detect the end of the signal from CCTV. Roller quickly find out how attackers are using. But the bot is not yet strong enough to be able to escape the roller ring network that has created, so was able to somewhat reassuring. There must be one counterattack, but without strong, can those who have information about his uncle. Roller Use a righteous way that they are attacking him to find his attackers. They also are using a computer, via hardware from the signal transmission of CCTV to upload the bots, so we are very close to the room in which he had prepared. With any luck, even those who are also valuable than the man in the company other strangers. Or maybe, it they're looking to see who care about what they are doing .... Can, who had disappeared in the strange other companies were victims of an organization certain peculiar (some organizations linked to religious heresy somehow). But that room is too far away, it's hard to track them down, even if it was a dangerous job. Temporarily, keep collecting all that is needed, just think Roller, Traces revealed It seems the attackers abandoned their intentions. Organizations rarely demolished killer underground laws on the local network can flip back to attack him, make sure to have something for us to do so. Roller just think, just a full review of the footage that he downloaded from the CCTV traffic around that area. 4 entrance, only a single path traverse forest cover is concerned there is no CCTV. Nor is there much traffic through this area much, but still nothing positive. England need to cover the road in the forest to search for all. The next day, Roller on the way, he disguised as a hunter, fumbling around the edge of the forest. Distance side is a small house, a small house very romantic side edge of the forest, with an old man sitting in front of the door, sipping wine, hand, face dim satisfaction. Roller approached. Hello sir! a very nice day is not it. The old man smiled back: What a beautiful day to hunt. Moment a thought in my mind, replied Roller - I almost get a little rabbit down yesterday, if not have a car horn pulled the trigger right now. Oh! Is the car with the bull logo and two men driving two crow looked like it not. - May! I was busy focusing on his hunt, wish him a good day. The old man smiled and then continued with his wine glass. So maybe, the two guys with the car that came to that room yesterday. A plan
Roller returned to the car via a small road close edge of the forest, the smell of flowers with water droplets on the leaves remaining photos made feel extremely comfortable. The far side, a few black still pull to signal a coming rain poured down. He slowly start the car engine and go towards the city ... maybe a little drink will make him feel more comfortable when it had begun to rain. Roller had the wine into a roadside, a pub decorated with hand proper domain of a few cowboy hat hanging on the wall. He chose a location in the same side, the small doorway, toward the highway ... ever this job ended, he should stop with the kids to live a peaceful life or not . Find out the mystery, what notes he left was probably absorbed too deeply into the blood, into the life of Roller makes him unstoppable. But to start, perhaps it's time to really go back Roller, he spent a lot of time to think, to be cautious because of concern for the children. Want a real life, Roller should get out of this single clock, the Internet never end points, increasingly encroaching on it, only one makes it more difficult to escape alone. Kai and his sister, too, everything has sunk into the past, is there really need to find out who made it miserable family. Those who make the lives of the brothers it becomes like now. It's too sad to not have children at the party, it's time we came back, picked up the phone Roller old friend called to prepare for the brothers Kai home. Perhaps, the battle is far from over, Roller need a more elaborate plan, Kai probably would be enough to make him stronger in this war. Weeks later, things still do not have much money on. Today, Roller and two brothers Kai had an appointment to see a movie, the movie about the guy who iron iron man in the movie theater downtown. True 7pm, three stems on the road leading from the suburbs to the cinema ...... kids seem happy to see the film, but perhaps Roller continuous line of thinking that he did not even remember a film about anything. But in the beginning he had a plan, a plan that even he himself did not believe that he has thought out well. Mystery in the virtual world
The plan is the plan, it should be set aside, anyone should have the silences in our lives. Today is the first time it's three grandchildren uncle go to the movies together, and also so long he did not have the silences. Roller sits quietly, whether he is a "man adept" in the technology world, but even the picture is not doubt that it is the pace of development so fast. Sometimes, he himself forgot himself he needed something that plunge into the never-ending war. It is true that the war on the local network will never end, the hacker gradually born and growing local network more powerful, whether it is invisible to many. Roller need to prepare some things for his plan, luckily he had a cover pretty sure, he looks no different from an ordinary office workers. Perhaps, the boss every day dragged him insulted busy few would have fell down there if he knew how bloody face in the virtual world, not the type of hero that style keyboard ... can use the internet to kill you if you wish. Uh, he will temporarily use the wireless transceiver card company that, anyway, it was not too long throw. Whether the average person the FIFD card mounted on this device will detect if you were trying to take it as it the company, but just a few simple steps for you to disable it. Suddenly the door open sharply as Roller startled for a moment. The old boss is upset, luck is what computer he turned the
opposite direction, but if elders approached, he would find out he was trying to reprogram the device FIFD card Broadcasting lost. But to implement Plan B only, Roller quietly clicks, You just use email activation system botnet itself, thousands of calls and messages randomly poured and machine old boss, he felt bad. But nobody told untimely aging appearance anyway. You just use the email system enabled its own botnet. Botnets are computers infected with viruses which live on the rest of its life. When infected with a computer worm or virus, your computer will send a message to a chat channels on IRC - Internet Relay Chat. A message will notify owners of the botnet - who have deployed computer worm that - that your computer is ready to comply with his orders. The botnet is extremely powerful, because they may contain thousands, even hundreds of thousands of computers, scattered throughout the Internet, connect to the high speed network and run on high profile home PC. Normally, the PC operates on behalf of his employer, but the employer botnet called them, they will rise as zombies to carry out his orders. IRC botnet illustrates In fact, you can also see a lot of computers are infected this format, and money to hire a botnet is not expensive, you simply know how to or not only. If not careful, your computer may also be one of the "ghost" on the internet. Roller has used over 10,000 servers, redirect calls and messages at some of the old factory boss in the 10s. Can see, the phone he was not equipped with the ability to resist situations like this, needless to say, first is the SMS refill machine memory, making it began clogging with activities normal as controlling the phone and record all incoming calls with virtual number (you know that is easy to assume a figure referred to it? there are about fifty different ways to do this - just need to type the keyword "spoof caller id" on Google). Roller stand, hastened to the staff as a caring boss: Let me solve, sir. Roller and friends The old red face kindled ratings, joint hands pounding the phone, it's probably a great old broken something. Roller and quickly bowed out of the room. You need to quickly complete the upgrade notes parts for his computer so it must be very strong and secure enough to serve a long way ahead of his. One of the most difficult elements this upgrade is a security chip. It is a mod chip is quite a lot about the structure and how it works, enough to protect the plant against attack by hackers on the local network. But of course, not everyone can do. But those who do it, with the information that he had been, he was not accessible at all. Of course, as mentioned, for those who like this, money is not the issue they care about ... but the problem always has a solution. Just find something that people are interested, you can chip in exchange for his machine. Roller opened the his personal computer, look up some information on the codenamed as K. Perhaps those who specialize in hardware is much information on the local network, because they did not anyway sinking too deep into this world. He sent an email requesting a new chip to K and also a long wait ... I do not work in a cafe, the lives of those around you real peace, which its 3 day-dreaming her uncle to wish. If only that fast.
Hovered with thoughts, the reply email from K to. "I know your uncle! He held secrets. I will talk to each other, the things you need in exchange for a coin to open the secret station area" Roller startled for a moment. Why do these people know about the coins in the pile that pay leave, impossible .... who knew his uncle, and said to the coins. Fortunately, he took it in to have to switch to a new place, but why does this man to ask in exchange for it. He sent back an email (of course, these people are sending mail to their own, prior to the recipient, it must go through a lot of security methods and encryption, enough so that no one can gain information and decode) (View over security in Deep Web mail) "Who are you ?. Do you have any information about my uncle, please tell me" A letter from K short answer: "A friend! These coins will give you answers" Summarize the story from the beginning to now. Roller, kai, granddaughter moved to a new city. Roller are hiding under the guise of an ordinary employee. Now he is looking for some items to upgrade your computer, making it capable of higher security for the upcoming work. England lack a special chip, and must look to people codenamed K to grab it. This person requires coin exchange of notes he left, the coin that Roller had forgotten long ago. He remembered that the coins did not have anything special, every time I miss home, or whenever spare time, he often took it observed. So what reason this man in exchange for it with the security chip. The question itself around head around Roller, Kai after being moved to the Dr. for a while came back, the two brothers it was great, the long war has not ended he has yet to bring two children a real family. Kai, the coin also has the letter K on its side, while the other contracts with the letter B, a fellow with the letter G ... Roller as awake, can do these letters is an abbreviation, is the alias someone, perhaps no coin has the letter K is the secret of the man. while the B, G does perhaps alluding to his uncle, and someone in the organization. But the secrets contained in the coins .... Temporary leave after that, you need the city to prepare dinner for her pay it, fight the fight must also fill the stomach, the new thinking is. Britain is preparing to hit the road, the car leapt up behind Kai: - I need to prepare some appliances street, give me a lift nhé! Roller Smiling! .........
They did sauntered over streets crowded market, the influx of people still crowded and noisy, uncomfortable, but also exciting ... until now, both uncle and nephew could not stand 1 meter inches up. How many visitors are flocking to the other discount stores are making a road was jammed.
Suddenly Kai whispered his name !. Left side of the boy with blood, people are still pushing, apparently someone in the crowd attacked it. Man named K What the hell's wrong? Everyone around seems not to realize Kai attack. The boy was trying to not collapsed, he motioned for everyone, people jostle line is gradually softened. Roller check the wound, it is quite heavy, but fortunately not been in a dangerous position. Roller noticed a shadow as her uncle was watching it when he put Kai up ambulances.
What the hell's right, why people attack it. He had skipped something ... Roller continent back his memory, all the access you have to be secured enough to secure only area 8th floor, I have not been able to that when no chip security, certainly he had to that ... But why one would go to get his mark anyway. Was, K is that person. If so, granddaughter were at home alone is facing real danger. Roller confirm with doctors and hurry back, hope it's okay ... Lucas Boucher