Sei sulla pagina 1di 43

The story of K.

roller - dangerous levels of deepweb was once a top secret document


that governments ban handed down, the secret has been temporarily seal floor to the
8th of deep web network was a Russian hacker launched surprise unknown purpose.
What is the 8th floor there is only 1 way to call the level of difficulty to access
the deep web network only. Really deep layering web without layering are also,
depending on each person evaluate the difficulty level only. (Degree of difficulty
may be descript, add url page, find the key, grant authori, Bitcoin to access,
referral introduce ..v ... v)

K.roller a boy 18 years of business and air conditioning, in fine, but that's just
a temporary job, and in the morning. Roller's main job in computer networking, work
is a passion and it is similar to what his dear uncle did. The boy did not know his
uncle's exactly what jobs in the company, just know it is a very famous company in
technology. Temporarily stopping the story of this boy to learn about the
mysterious world on the internet, so-called deep Web

INTERNET dark - DEEP WEB

Extremely large amount of information contained in deepweb

Temporary experts in the world of technology analysis can survive up to 8 floors of


this network with many different security modes. you can access the 1st floor with
a nearly identical manner as normal if there is a dedicated software. On the 1st
floor can be found the black market sites such as drugs, marijuana, guns and
illegal services. All users here are anonymous and the currency used is copper
Bitcoin.

Continue the story with the 2nd floor of the deep web, can still be accessed using
dedicated software but need to have a range of characters symbolize the address you
want to access, the range of characters that we temporarily called deepweb website
can you earn through the sharing of acquaintances or the like.
From the 3rd floor 4 or more of the network has not put things more terrible, where
ordinary people can hardly reach, can only be accessed by changing the computer's
hardware or use techniques which access enough security to enter, in which the
horror stories, horror images, gruesome experiments and secret documents ....

The story is summarized from brochure

The last message Roller received from his uncle with the content:

Pay a business trip! Please keep brown leather briefcase (Quoting from the summary
in the document)

5 years from the date of receiving the message prompt, Roller can not be met or any
information from his uncle, police also totally not found, apparently he
disappeared entirely and no longer exists, data individuals Bureau of investigation
by the hacker stolen. All information visit trying to find information on this
service does not fail. Conclusion: Missing

Profile of 46.MX7: The hidden secret pair of secret internet

Should it not open the briefcase, the thought of roller wrote in his diary. finally
decided to open it the next day, did not understand why the police days before
newspapers churning roller forget this travel bag .....

Decided to open the briefcase 46.mx7


So he decided to sell conditioned open briefcase old records of his uncle. In case
files have recorded items in the briefcase instruments (its completely accurate
translation of documents)

+ A floppy
+ A stainless steel box
+ Gaming counters
+ A small book with strange characters, and email lists
+ A pen
+ An ATM card
The equipment like modems, but seems to have more exotic structures
+ A mobile phone

Also no indication what more Roller has also repeatedly opens the preview but
nothing special, no clue about this uncle. Perhaps the thing to do now is to find
the old floppy drive to open the other floppy disk. What might be in it.

Dated 05.12.2001 has been prepared floppy drive but run into a glitch, a special
encrypted disk with the message, as well as unique clues about uncles roller:

"If the roll uncle believed I could guess the password in three attempts, if the
other person! I advise you to stop"

Password my uncle know because once heard uncle tells it happy or drunk while.
virus just 3 strokes speculation their password, it can collect information about
the time to think of typing passwords, analyze the behavior of people are typing
your password if mistyped, only 2 times knock your speculations into the password
box, you probably already have a portrait erected somewhere in a ....
What are the possible password?
Speculation leads to the 1st floor of the deep roller web

3 days thinking roller still can not figure out what it is, uncle birthday .. not
because it's too easy to find, name or habit .... can not by how much, but the only
hint of the roller uncle, nephew could have guessed just 3 strokes. It could be
anything ........?

Focus, concentrate .....

May be it, my uncle enjoyed an occasional comedy and sing it at times difficult to
sleep at night or when they must ... Right lyrics, form long passwords are not the
character limit. Gleam and roller immediately implement idea (to this paragraph,
the document takes a page is deleted, can not be recovered or found, I will try to
recover it if it is).

Deep Web can have up to several floors.

According to the analysis of experts, can now have up to the 8th floor, but how do
you know for how this year they mistook it only has 7 floors only, maybe after some
time it to level 9 10 so what.

Sorry guys, there is a section where authors who share this document were to delete
or encrypt it, but can not read the section break pass the floppy disk. But then
Roller sort of open it up and see what disc contents inside. The next page of the
document says about the contents inside the plate, including 2 emails and a piece
of code, one of two email with login passwords encrypted form that roller was his
uncle show since before so he can decipher. Followed by roller send email with the
code to a floppy and wait in hope with 1 reply.
Email response from a sponsor (translated, have not understood the great places
people look temporarily offline)

Content e-mail response:

Hi Roller. I know exactly who you are and where you live, I had intended not answer
you, but for my friends, I warn you try to seal his fate if you want to continue.

Mail content that the person's answer roller surface:

Who are you, I just want to find out what happened to my uncle.
Leave a reply letter:

Out of the blue nephew. I send him things that may help include a special browser
can hide his identity, and how to decipher which may be used. I have to go, you can
continue but be stopped if deemed dangerous.

No one email from a stranger anymore, roller began reviewing files that you
receive. something like normal browser but with different connection mechanism (You
can check out here)

a file consisting of lines like a website address but full of strange characters.

adsfojniasdfasdofk.o .....
xjhgoiddmhshsmshgc.o ....

Ok so could understand part, complete address list on the odd browser and see
something special.

Start doing what he can be called guidance, even first page skillroad ...... looked
like the normal site at all, and only ..... but ebay page special thing here is
that its products .... Drugs, gun ....... and even human lives, here they call it
experimental specimens. all payments by Bitcoin.

The more frightening than going deep down list: pictures of pedophiles, of the
inhuman experiments. They soak the human image in the country only to each head
popped up to breathe, to see their flesh murmuring out how children die after how
many days and how long ..... adult roller stop because too disgusting, he continued
to send the 2nd file viewer, apparently it's how to decode something. (You can
check out by joining this group Deepweb)

The only clue from the 3rd floor deep web

The only clue of roller appearing from nowhere

In previous documents, the roller has to be the website on the first floor and see
what exactly it is often said about the deep web. The stranger warned him from the
3rd floor, a special browser can not safe anymore.

Roller continued thinking and know how to use decoders to be attached to the email
content analysis book that pay him to leave. Book content sent back to the roller
includes an account and password have been used to access the deep web, pay he
believes it could help him somehow. the remaining content links and downloading
files to access instructions of deep layer encryption web uncle Mike and upload the
particular server. must have special ways to find and read. So continue with the
3rd floor with some special things, which fortunately conditioning repair is just
his sideline. less he has a long time in the crotch grinding technology
universities.

Female model inside the mysterious briefcase

In the next section roller learned that what seemed to be the model that turned out
to be a decoding and encoding special information, connected via its data
transmissions and send will be encrypted whole to combat the hackers, whether
obtained data from your computer, then transfer can not analyze it. Ok the rest
simply adding it to the network router behind so that it encrypts the data only.

After completion of the stages roller continue his work. With a link highlighted in
the list of links that strangers send him. The first one out was a request login
interface. Ok sure the decoder protect yourself, you must first register an account
has it ...

+ Strangely no part to register so how that account to login here. Roller quickly
remembered accounts in a little book and use it to login.

Notification from Communities HKW:


Hi Blue Back! Wish you keep your network

Clues from strangers

Interface login to look like a giant chat room but had only two parts

Deal
World

Roller decision to the world, even as he has just loaded into the room, the first
line of the chat:

He has returned to Blue game.


I thought he was gone.
.................

Rubbing his uncle turned out to have been quite popular in the forum are to
hide ......

Underground world of technology

The chat line appears on the computer on which the roller used him squirm. Roller
answer these questions:

- I'm not the blue I was the grandson of him

he did not expect air may sagged alarmingly like, not a piece of any acrid also
sent to ... just a strange thing only, the figure notice how many people are
accessing the room rise quickly. 1000. 2000 ...... 10000, (which I also did not
expect that there may be many people know how on the 3rd floor like). are wondering
whether we should handle how, suddenly a pop out chat line with popup notification.

- Roller unplug the computer's power socket immediately, I will contact you later.

No other way, perhaps there is also a last resort you should do at this time.
Roller unplug and put to bed thinking ..... can only ever been emailing roller, who
owns the email in notebook (this passage I read like a story told from party 3,
perhaps this is also the sharing of documents written in the form of logs).

This segment clipped for lengthy partitions. summary is next roller receive an
email warning him not to go back, or go to equip themselves with adequate methods
to protect themselves.

It takes about a week for him to understand how to protect themselves and tricks as
well as the prevention of hazards through his book that attach to the back.

Back to the deep web

This section describes how to access confidential information or exchange of


bizarre things that you do not know it is the truth or make up. Roller knows how to
access the floor 4 5 6 using a network aggregate many servers voluntarily to
transmit data cry circle, the purpose of this to disappear Air all traces of you on
Internet. (In the world there are millions, even millions of computers voluntary or
hacked to transmit such data, perhaps so that whether your network though a very
pretty but load a normal web page there is also quite a long time. so deep in the
web site looks very simple).

Roller other takes a long time to find out information about their pay but can not,
because the people here very rarely answered others if it does not make them
curious, amused or bring money to them. Only one left in the mailbox automatically
on the network's Web deep mike uncle was a letter from a person named. DL content:

+ Blue we need him in the project Kis.TT6

Perhaps it came after the uncle disappeared by previously did not have an e mail
any other, can be users this network has a habit of deleting all after reading it,
or this is a trap final list for the anyone can hack this account. But can not be a
trap, if uncle mike confidently leave the password for the roller, it means him
believe it can not be hacked.

What remains in the anonymous world giant

Roll clues about his uncle only, the name of the main projects that somehow he
probably does not know it is real or not. Try searching on the search engine's
see ..... "No results found" that's all. His crazy roller think, how the hell does
it appear on the few tools are rather silly, huh. Try searching on local search
networks in the 4th floor to see why.

Continued looking at local search, the results are quite satisfactory returns with
two search results and information fully encrypted, can only know the kind of
content on it. What projects Kiss.TT6 something silly about a group of white hat
hackers are investigating the activities of a group of hackers XXXX (we asked not
to be named here) This group is planning to sell a 60-terabit data, too large, with
80 million dollars, the data on biotechnology or chemical something to stimulate
growth (I roughly translated from English like, maybe this is the drug that we
Chinese sprayed on vegetables in Vietnam, but after a night of big seeds, markets
are always sold him ....).

Too late, it has been sold, this information is too old .....

In August, it was sold in August, almost crying roller uttered, because .... time
is the time his uncle disappeared .... It's a clue. Surely there must be some way
to contact the hacker group. To find them.

Hacker group XXXX: Be Faster


Immediately roller learn more about the project biological hacker groups have for
sale, luckily they were too obvious as they announce it on the fourth floor, which
can then Deep Web has only grown to the 4th floor only . Evidence that someone is
trying to erase the remnants of it. Roller can still get a little information.

This section summarizes: Roller know this group acts like MLM type, have the
highest guy had a bad month of pregnancy, members around the world, perhaps the
name XXXX just let them hide. Evidence is still the bad guy took nominal sill this
group to sell three of stuff, and that's something unknowingly sacrificed guy for
the character behind never show his face. To find the guy is trying to clear the
other biological material. It was the guy with little information (This paragraph I
guess is due to large amounts of money should be a guy that has little degree than
the other four new 80 million measurements to me, that is also terrible, but
certainly with us this is also in line in normal).

How the hell is that guy find one now

No way, how to find an anonymous guy in the world ...... anonymously Thinking,
thinking ..... Must dig deeper about the monstrous biotechnology this roller
scratching learn, there must be something to it worth to 80 million instead. Roller
continue searching in floors 4 and 5 where perhaps at that time the number of
members is only a few hundred to several thousand is the same. Search by names such
projects Kiss.TT6 known technology it is promoting the development of human cells
when exposed to the skin can make it aging, grassy plant fast-growing crisis
terrible ...... (Just as the drug of Chinese men, looking to go roller)

(A Du) It turns out they bought the technology to develop the contrary, slow the
growth of cells, which helps extend the life (like style is an elixir of
immortality) ...... . roller reading the next line

It read that content by translating letters bit binary code such.

In the article there will be rate of occurrence of the letters appear with
different%. eg letters tee L1,001% 1.2% 3.12% V O 1,333% 1,566% E 0.44% Y U
0.1322%, the owner I Love you step 1 is encrypted. 1.2 1,001 3.12 1,333 0.44 1,566
3.12 0.1322. Continuing the line of code that is encoded into hexadecimal network
or another form of binary code something, this is what doctors learn about
electronics and telecommunications are aware of this. This is updated each day, so
the contents of the old days, if there is no original post that day can not be
translated. Thus any translating something goes through the decoder as far this
time, the more difficult. In addition it also has some of the code is loaded for
some action as native code when talking to the same organization or the like ......
(Perhaps the native code is what roller used to translate the book, I think not
know right)

Continue with the hacker xxxx

Mo forever without more information about what such panacea, Without knowing the
buyer, also in excess. Seeking information from the files of this document is
trying to be erased, it is not possible to do ..... way, using any way. Roller can
not concentrate on his work, all day I just find ourselves somehow found the guys
that might have information of his uncle. There must be some way to use. No
subsequent information can not mean that they're successful, what ... why can not
perform or they lack something. Surely we can not succeed. The last country to go
all alone, by all means to find his uncle.

A crazy ideas pop out in his brain!

Bait and big fish

(This title is that the wind slashing it written that it is easy to remember which
sounded seemed more dramatic to natural). It is possible that they are missing
something, I try. That night roller continue his crazy ideas. encrypted information
sent on the internet and local search on the 4th floor in the hope who owns this
technology previously could read and roller will collect information.

Profile missing Kiss.TT6 and things I want 200 million

Crazy, really crazy yourself crazy, roller think a lot of guys will be able to
find. Now just know hopefully their security systems up sure enough. now could only
wait alone .......

Faster if not dead

After sending a message at a local search on the net floor roller 4 and 5 are still
thinking whether it is certainly not true. I hope what they learned in the book
left her enough to help protect the body covered. This system properly is
dangerous, it makes people to think and worry, the faint of heart might have a
stroke before someone looking to lose then.

1 Day, 2 Day still nothing new .... just think roller can not succeed, suddenly
received a notice in the account on the Internet anonymously. messages sent from an
address is Matt. Should not try to open the letter immediately. "It's too
dangerous, one wrong click can make you never longer hold the mouse and press the
2nd shot." roller decided create a virtual machine from one of the machines in the
system of sharing the ring network (which looks like a hack some of the machine
there and then let it cross connection or ring to hide their tracks ) carefully
opened the letter after checking quite carefully. Mail content scarcely a line:

Who are you ! Where can I buy it if it's true, but I think not

Not easy to overtake them with the silly story, but perhaps the ACC that he used to
sign this notice period is what is causing their mail Matt. So frank or continue
with fabricated stories. Maybe so frankly, need to finish it fast if not add a lot
of trouble again. "Check out the security system, approximately 2% of the machines
in the hidden system of roller was defeated, be restored if you want to secure." To
do before answering Matt is restoring security system. 2% is probably small numbers
only, roller asleep while thinking.

Placard

Roller startled awake because of the strange warning signal ... you rush back to
your computer, dammit, I fell asleep without closing the connection of the security
system when downloading pictures of Matt mail and over, system of notifications
under attack increased to 35% in just 4 hours. Someone discovered the transmission
line is open and has installed software that detects IP. There's no time to find it
... It was sticking to the system. disconnect the remaining 65% can not because it
still remains the ip he had connections to download images onto mail. Must find
some way to cheat it ..... Now or never again. Roller decided to open another 20%
in systems connected to prolong that hackker stranger can find his real address.
Reset connections of 20% is probably lasted about 3 hours more .....

I have the strength to defend myself

Hour roller forced to find ways to fool the insects and makes it go into permanent
space, need to create the false connection. Fortunately, not too hard, so this time
his uncle had said, the best security system is probably the transmission system
between a circular pattern millions of machines. The machines that are connected
and transmit to each other in a ring network, there is no beginning and no end
point, the system that will make it but the software automatically detects never
read all the connected therein. Ok so just create a virtual connection to the
machine was stick his virus and then connect it to the network giant anonymous
millions of machines which he often used in anonymous web is. Roller immediately
embarking on work, 2 hours he has finished processing the mistake he had just made,
number of computer viruses to stop sticking newspaper. His system now only 45% of
the machine longer safe .... Roller sigh of relief, "I'm still safe"

Honest and protect yourself

Over from the last dangerous, roller still wondering whether to continue with the
story "The lack of documentation Kiss.TT6 was" not so candid about what he did not
have information about the booklet this record, his goal is to will find little
information about his uncle.

(This paragraph to cut but still put on)

Abstract thinking and reasoning of the roller (based on speculations of the writer
of this record)

- Maybe if the roller continues the story with the record, he will be exposed as
lying, because the transactions on this system, in a way that people can still
verify it is real or you trying to trick money. Damn it may have one of the two
cases, the first person on the side of the organization has sold these documents.
Monday belong to the organization of people who mail for Blue Note.

- If the people of the organization was selling kits for $ 80 million, they contact
the ratio is too low, because certainly the transaction was successful, based on
what the roller said. If they get back, it is like they already considers herself
has sold a document is missing, and they may be a danger by those who have
purchased that material.

- Case No. 2 is probably more reasonable, the roller has sent a notification by ACC
of blue, Content in the mail also stressed the real question is who more roller.

Content mail:

Who are you? I can buy it, if true?

Obviously people are looking to verify who owns the ACC of blue is one more really
want to buy, because in this world if you want to buy something you have to verify
whether it is true or not and Should do not spend money to buy, things like, I can
buy it, if it is completely superfluous, feeling like two sentences that contain
the other one. Warning, or contain information ..... roller may think this person
is under the organization did mail through his help and his uncle decided to send
the reply to the content.

I was not Blue. blue is gone, and now I want to search.

Maybe it is true

In two weeks, absolutely no information from Matt. On the local network without the
monkeys also dry anything, apart from the little information about the project or
stolen things like that but he was not much interested. (This paragraph just as I
explained, at a time when access to this concept which floor is probably not clear
just by posing to easily identify the security level only, but the roller does not
know anything about dive or which floor you're on). Roller still trying to work in
the daytime and at night he groped, try searching on some other network, but maybe
he made a mistake or not be able to access those networks. He particularly noticed
a huge connection, and absolutely no password but can not be accessed. Each time
intend to connect to that is the decoder to signal temperature warning.

The secret of the old computer

When the roller is baffling to find ways to access what we tentatively called the
huge room they have email notifications from matt.

Meet me in the multi-dimensional computer network (which roughly translated like


yourself)

Damn roller think, make the connection that's huge multi-dimensional computer
network already. How the hell on with this one rather old computer. He thought,
"Did uncle never on the network from here back, make sure to have but can not
update the information from this network continuity if not accessing from home",
and he was sure that the I am using this computer is the computer where you use
notes. But roller ditched all that can be useful in the computer before that.

Several text files, music files and clear ..... just normal files. I tried
searching for hidden files and hard drive capacity is clearly notice the hidden
files do not have that facility. There may be something I have not found not ....
roller using the software again searching hidden files that you think might be the
best because he created .... sat waiting. He sat looking at the software running,
moving a% a. Try reading what you think is important in language booklet ....
sounds coming from the next room made him uneasy. "Noisy and uncomfortable too, the
family did not do their day easiness is à".

Suddenly small coin fell to the ground and rolled to go away. Back to grope, roller
just looking mumbled verses or singing songs that pay him each time alone. This
coin then hell, he threw it in the drawer and check again when the report 100%
software. Still no anything. He tried everything, try to access the network
connection, but can not, cpu processor can not respond, he shut down and retest the
old computer. I need a more powerful processor ..... roller and start thinking of
taking apart the old computer to check .... old machine but obviously the latest
processor which, perhaps his uncle inserted added convenience for work. But then
why .... not perhaps for the last time multidimensional network has upgraded to a
new version to the higher processing speed. If the Notes are also possible ways to
enhance the processor to a higher speed,

Secret was discovered


Roller continues to find documents related to the manufacture of processor, I think
is crazy, but still have to try. The first is the structural outline its view
should be the hell do. Roller drawing on paper, dammit I need a new pen, this one's
gone out of ink. It is not the pen of paying back? Where the ink bottle and then
try pumping in and make the work of this crazy public view. unexpected .... why not
think, what is a usb pen correct it, almost shouting roller. Turn on the computer,
check immediately and always see it that useful yet.

- The password to open the file, and the message is still the uncle smileys. Let's
do the opposite! Ok that is the reverse of the old password. Great success. roller
continue with the data inside, as well as encode the same shape as the mechanism of
the decoder. the outer file with content.

13.4.19xx

Surely it is the name of the paper can be loaded in order to decipher this
document. Roller to search the content of the article, is not difficult to find it
published in a major newspaper, has for quite some time but still easily found. He
loaded content articles and content files in USB which he had carefully copied out
a part as well. waiting for it for a complete file with content ..............

Great! the computer can be upgraded

Roller wait long to decipher what is in USB, the first page has been decoded.
Carefully he used mode automatically extract content under partial restore, to
ensure not to lose notes the last hope of this.

- Yes it is! roller exclaimed. As secrets about the mysterious chip that uncle you
use every time you access the computer network giant multidimensional data ........
100% completely decoded.

Roller mulled read the document in the old usb. A disappointment, again well up on
his face. Technology, with tables outline in hand .... But still too hard, can not
find out what is needed to make. Search online local search of floors 4 5 nor more
optimistic, perhaps nobody wants to sell the key to enter the 6th floor this must
be.

Roller still thinking ... But obviously he has to pay the multi-dimensional network
with the computer that this ... Was the last time it is true that multi-dimensional
network security level raised?

So those who have been in this 6-story, How the hell can they do this to the
processor so fast eh .... genius! Roller genius ..... they are mumbling. (Roller
though understand how and mechanisms of action but was unable to find a viable way
to manufacture, too sad!). Drilling, drilling! If uncle has left these documents he
certainly must know, it is too difficult or take too much time for the roller. Must
have suggestions instead.

+ He continued reviewing the document file that pay him to leave. There may be a
kind of information that is encoded in it .....

3 days via roller still can not seek anything more in the document file that he had
read and reread it a hundred times.

It really works
No information will be encrypted though he used all means, perhaps this is the
original files and information. But what makes him special attention is the seal is
closed on the last page of the document. seal with a symbol in the eyes and Acronym
BL. may be the seal of the Blue Notes. It was not too special, but still feels like
his roller forgot something. It made him feel very strange feeling to have seen it
in a dream or something like that .....

Roller ourselves looking at the small mirror on the desk, in his recently withered
away too much, the internet is taking his mysterious life too much. Are thinking
about silly things, then suddenly see a roller, one thing that helped him explain
the feeling like in dreams of the seal it. Reflection through a mirror clear symbol
of the seal which is something all too familiar to him. Notes pennies left in the
briefcase .... Because it is in the reverse order to print it out a complete icon.
No wonder the feeling of having the sign that was where he had popped up around his
head, it's not a dream, that is the truth.

Roller picked up and examined the coin, it takes a little peeling when he dropped
it yesterday. But wait, he felt like the coins are assembled from two separate
parts must .... a thought flashed in my head, try a small knife roller to separate
the coin is 2 parts.

Cup ! the coin split in two.

Roller sweating, hands not mastered joy .... As chips, it's chips .....

It has been in operation

Roller took strange calm, to do now is to insert this into the computer chip roller
..... do what needs to be done immediately. Not too hard, 10 minutes is more than
enough.

ok

All work has been completed, now try it. roller on the connector, creating a
protective wall safest that he could.

Loading 10% to 20%.

Great this time no longer crashes the machine again, trying to just a little
longer. Login screen just show up, no time to look closely roller see what the hell
it is outside a bizarre shapes, in such a winged demon. The machine hangs (Read
this passage also bothered me, hanging machine all day, but I remember what to cut
back the doctor completes). What the hell Roller think. It really works muscles
that .... Try to think about how I have missed something. Heat, temperature,
engrossed in the virtual world is probably made him crazy, the most basic thing
that is forgotten. New chips with higher clock certainly create more heat.
Radiators older were probably no longer fit it again.

New radiators and multidimensional network

Ok not difficult, I will do a separate radiators for it ....... (This paragraph is


about how something manufactured radiators, so I go forward ngoang diluted always)

It takes 2 days to complete roller manufacturing radiators for it. Enclosed


radiator thermometer watches always fresh rather cool. This time, make sure get
myself turning on the roller computer. Always the highest security mode. This time
he had to get the login screen, the picture turned out to be the devil and angel.
In the game as if the screen to log a certain horror game. Continuing with the
account has to be blue .... roller special world. On the screen appears the notice
board:

Hello blue! Welcome back to the multi-dimensional network.

On the screen appeared a wonderful scene, perhaps the first time roller saw
something like that. all of which are modeled as a miniature world with characters
who are traveling, and all the characters are standing still. the 3-D imaging
technology à ..... (this paragraph I guess it's like you inside the room Game
Audition old days, to make the idea of the game room from here). Are also busy
around to discover something interesting inside this world, suddenly you see
someone talking to you, too terrible to communicate in both letters and sounds and
gestures always .....

+ You have to be who want information about the blue.


+ Roller to reply but suddenly realized that I also do not know how to answer ....
This, then use the code to control gestures and voice. Roller answered, looking
movements of the image that symbolizes his being somewhat heavy movement.
+ How do you know, roller answered when looking at shape and guess what other
people make is 3d man, with a mask character animation and rendering in a very sad

Just saw the man put his hand up just above his head. - press the Unhide command on
the keyboard

Roller follow, strange characters on the head are present in the frame đểu out the
names.

Roller looked. Matt, Matt was the one who sent him an email ...

Continues with strange voice through head phones. and includes the text

- Here we recognize each other by the mask, they are symbolic and can not be the
same individual. You do get used to it.
- Open his white wings and follow me if you do not want anyone doubt and attack.

Symbol of the greatness

White wings

Roller still remain cruising, the wings are what the hell. Never seen an end roller
thoughts show up on the right arm of Matt shows up symbol white wings, the wings as
his pigeons, he smiled. But how to do that ....

The man's voice again:

Use the password that you use to sign in here again in small red box on the right
side.

Ok roller follow, he amused when the icon that appears on his right arm, but it was
something, just to stop imposing à .....

+ When it pops up that is he is connected to the firewall system best white hat
hacker community created exclusively for the specific area. When it does that is he
has connections and can be attacked. Look man the other side with black wings icon
and spooky masks, it also represents a system where the black hat hackers created
to remove traces well as us.
+ Here is the intermediate area focused enough all kinds of people, they come to
find information, to do something ..... If you know how, a black hat hacker can
still have a white like this way and we can create a black wings ...... so be
always careful.
....
Roller curious:

+ There are some who seem estate?

- It is because they are accessing multidimensional server to search for


information or the like, you can manipulate the keyboard to create a virtual
computer ..

Strange virtual world

Virtual world always has its own charm

Roller follow what matt instructions, take a night so he can control and manipulate
the symbolic characters themselves more easily. Retrieving information where
perhaps as you sit and work on the computer was normal, but the key is that it is
completely encrypted and levels of security may be no one can break was .

Roller begin accessing information systems especially in the virtual world,


projects Kiss.TT6 appear more in this particular search. It is true that it has
been sold but before that it is true that a war between trying transactions,
concealed information and one side is trying to stop and inquire. A big line in the
final pages with that information:

Successfully sold, people try to prevent failure

So they've failed, the failed email to blue. So where were you paying when the
battle took place, may yet have realized that he might be a danger to the war on
the internet and ..... can not, if he is a relatively dangerous, they would not
know who he was, who had been the hope of the organization that they have to email
to turn to him for help, it can not easily disclose their information as
substituents. So where were you ..... uncle started Roller retrace time email sent
to his uncle and time disappear. Emails sent to shortly after he disappeared.
Surely it is related .....

Clues opened a story

Roller to think and speculate in silence. On the internet when the organization
still emailing thanks to his uncle mean they do not know when that uncle he had
disappeared, and also means that the uncle he could not show up on the network
anonymous, just might be someone very the information grasp something. Roller
retrace the nearest period before he disappeared. He also never asked specific job
at his company is, just know it's a big company in technology, the way home about
30 minutes by car.

There may be clues there, must go there "Roller thinking" can not remain in the
house that groping in vain like this. Maybe there are not just the look on the
internet to be (This I feel is right, not just what google is the end of it).
Tomorrow I have to see how the new site is. Roller disconnect and got up from the
computer, also has two today he has not showered, and what helped him to sustain
life for two whole is today also cakes and mineral water already. Bathing and
eating to prepare for tomorrow, but .......

All night whether to bed very early, but he still could not sleep, thoughts kept
hovering around his head (How many today not feel mention any relationship of this
young man, probably as well as an FA main brand) the next day he woke up at 4 am
and prepare to hit the road, now is still too early, long time since he has eaten a
proper breakfast .... right up the road roller 6h ..... .

Uncle Mike's company is located in a small and fairly deserted road, nothing
strange at all, everyone was rushing to his work. Roller find parking spot and
walked to the gate, the old guard walked over to ask:

He has something that, boys?

In less than 0,5s roller paints a story.

- Hello sir, I came to find a job, I hope this is the correct address.

The guard looked at him with strange eyes:

- Maybe he got it wrong, I do here quite some time but have never seen them looking
for people both ....

Uncle Mike's company

Strange indeed, never find someone, then those who are underground and out where
the hell the other does the same. Perhaps his attention was never protected only
enrollment, not no way to enter that company, roller decided to return home after
observing a moment longer ... Must find a way somehow in the company, surely there
must be ways ...

Roller return home, The companies that exist in a real world, not a virtual world,
make sure to have information about it. Roller back side of your computer and start
searching for "Company Technology R .....".

It is true that information, but that information is completely normal, company


specializing in software development and network installation. Nothing strange on
google. Try to Search Network multidimensional network information see anything
better not (I feel like on the multidimensional networks also what must be).

Technology company R .....

Nothing, roller disappointed. it is true that it does not exist here so or it


exists with a different name. Now perhaps should find Matt and asked him whether
the information does not, seems to be a believer to be .... Roller search where he
thinks is a plaza in the multi-dimensional computer network, where but the first
time he logged on, he appeared here. Still is the man with the mask of sadness,
sitting in what looks like a chair, but completely unable to move, maybe Matt is
accessing something ... Granted information wait so.

Is new friends

30 minute wait, with Roller at this time seems more prolonged period, they must, he
enlisted pulse quannh review. It seems today, the black wings appear more must be
sitting here in as if the carnival halowen somehow.

Suddenly, Matt seemed to move, you need to meet Matt immediately. Roller control
your character interacts with Matt:

+ Sir, I want to ask you a few problems it seems he explained.

Do not see the characters that move, but in the message box below your screen
flashes the message. Please enable information security, we will be safer if you
use it. Roller said through compounds that matt said. I want to ask him about the
technology company R ...

A chat notification period again.

Come back tomorrow at 12.45, gate number 9, search and do not ask anyone, now I
have to go

Roller asked to add a few things, but Matt is gone, sure he was disconnected from
the computer network already.

Roller still think, should go back to the place that is not strange.

There can be no danger.

Maybe, but still have to try it, if they want to find themselves, it probably did
from the moment that the first time connected to the network and anonymous. Perhaps
who has sent his thanks uncle help must also have a certain relationship. Roller
again disconnected from the network and go lie on the bed. Now we need to sleep, be
alert to it as possible. He fell asleep, but until midnight startled awake, feeling
nervous as he could not sleep. Roller to the cabinet and click a little wine, he
felt a little better ..

New staff

The next day, prepare to roller .. I do not have any other clothes seemed polite at
all, only temporarily shirt wearing uncle so, slightly wider but also okay .......

30 minutes later came roller door company, no numbers, but what the hell do have to
9 gate anyway. Matt has the connotation that what what ah. He watched it only has 4
ports on the side only. Gate 9 is what the hell.

12h40 five minutes remaining roller watch. In his mind flashed a thought, 12 45,
the minute hand points to 9 perhaps it is directed. port is the gate number 9 on
the left side (Correct rated Empire style, mouth cried scenic corner darling 9h)
roller down the car and walked to the gate, to 2 minutes ....

Test

12.45 clock properly. Roller feeling slightly nervous. Suddenly the gate is opened,
stood before him as a man reach 50 years old, gray hair and white shirt rumpled,
sad face still looks friendly.

+ Hi Roller man said.

Deep voice and slow, it made him feel more comfortable.

+ I'm Matt, it seems I do not look in the virtual world, right there. He looks a
lot like Mike, it made me more confident.

Roller ask again:

+ He knows my uncle? Really worked him here?


Matt just nodded and motioned for him to follow inward. Two men went to the room,
it is true that the room looks pretty weird, machines that he has never been seen,
apart from a few chairs and a table, nothing else.

He sat down while matt slowly at him.

+ Do you really want to pay him, although it can make you be disappointed

Roller nodded without thinking, perhaps he himself knowing she accepted this job
and embarks on until the place, as well as for pay.

Matt said while his eyes half closed, looking like vaguely into space:

- Mike is a great man, both in real life and in the virtual world. The story also
from too long ago, from the day that I still belong with him held "temporarily
called organizations like preventing threats from the internet". We did not know
that was wrong, Mike can not reveal his identity to be, no one betrayed, yet still
have guys come .... In that night, perhaps I was sewing Luckily .... car flip and
when I found myself waking up unconscious in a bush nearby, also not seen Mike was
there .... there is absolutely no information ..... Place of safety most probably
in here. Actually technology company R ... is a headquarters of the Assembly, I
feel that only here I can safely and continue to find out what happened to us.

The new lessons

After Matt Roller tells the story happened to his uncle, Matt led him into another
room, looks leaner. It is the room his uncle worked, still photographs with a smile
...

+ Do you want to do the jobs that do not pay him each

Roller nodded silently.

+ Then study enough knowledge so he could protect himself, in which all that you
need. The other side is cold cellar, bathroom, and all ....... from now you can
forget about your own house.

But I still need some stuff at my house.

+ I will wait for his return trip. Then you need to be here until the end of the
test, if completed it you can stay or work anywhere you like, as long as it's safe
enough for him.

Roller drive back home, he needed to clean up fixtures need. roller home and
replace the old computer chip, all the furniture of his uncle and must carry.
Disconnect the decoder and computer, so can be assured then. Roller rush
belongings, and move the vehicle back to the R ....

New technologies

(This paragraph matt roller meet and stay in company R ...) Matt roller only new
technologies, what ever he could hardly imagine that without recourse to the
document in the USB uncle mike leave, the new chip manufacturing technology, how it
works of an anonymous network ....... Roller need to master them all. Until the
moment he first saw the pants ass grinding day in school it is also quite useful.
Take 3 months to roller can understand the basic components of computer networks
here, have not mastered it, but also not bad.

In the words Matt said it today he can reconnect to the multi-dimensional computer
network and started his first job .........

A new day, it seems that many things with roller ...

First job of roller

Matt 8:30 properly appear at the office, today he looked cleaner than usual, (make
bathing).

+ We begin its work only roller

Roller sat before the computer ... The computer system here is much stronger than
what was used in your home, even when he mounted the new chip is probably just as
well as compare a child with a boxer punching.

Roller started logging into multidimensional computer system, also has a few months
since the last time he escape this virtual world. Feeling slightly nervous also
long days like this do not come home.
Matt shows him how to access the data network of white hat hackers on computer
networks multidimensional, roller consider the content in the box of his personal
mail .... All these projects, designed the security for a certain network. Roller
surprise turned to ask ...

+ I thought we were looking for my uncle.

Still staring at the computer Matt replied:

+ We need to have the money before doing it instead.

No questions were posed. Roller returned to his mail box ..... Well work rather
than to use, you can make a hundred thousand dollars if completed pile This email
was rather .... (draft does not see business what, every day facing a computer
without fear of starvation)

One day, not so bad .... that was new as a moment before 4pm, roller just sipping a
glass of milk and bread, just thinking blankly.

Matt still intently do something .... maybe is important, because the roller see
the sweat on the forehead of this man.

Trace .....

Roller table hurried to see Matt motioned him back to the table to work
immediately. Exiting the data network of white hat hackers and back to the plaza.

Matt turned to him and said:

All documents and clues about the project Kiss.TT6 I was encrypted and sent to your
mailbox, it seems that this group is implementing a new plan aimed at a certain
economic organization, in two days , read and remember what can he deems important.

Roller reading material, especially names, maybe that is an alias that the other
people in your organization to use when joining and multidimensional network.

Roller continued to seek information related to those names, think about how they
had been used to beat a website or penetrate certain systems.

British special attention to a name: the method of use of this less detailed
technical security. Using these methods often involves habits of audiences and take
advantage of his weaknesses. (This method was used by a famous hacker world. Each
statement will cause traffic congestion of a large website with a single fine in
the phone, this thing ..... There I also know this when the time What to watch
trial was successful, the technique could be prompted to spend more than in the
later)

This character rarely occur in small projects, community is quite respectable black
hat hackers (not without the use of technology that are less light oil).

2nd character he noticed it seems that a female hackers, roller-based names to


guess, pretty much the cult service, but a target is not money .... (probably want
to grab the grab cheek in hacker circles)

At least 12 cases of theft of data of large financial companies suspected palace


guards to (tentatively called) female hacker. Stolen, but only announced the first
page, the rest should not be sold, nor be returned.

The other characters seem closed and do things just for money. They hide themselves
and less involved in what they supposedly do not bring benefits.

Only 24 hours .....

Two days, Roller did not do anything other than to read and learn something in the
document that Matt sent him, Matt also does nothing more than to dwell on something
Network Query multi-dimensional computer system, still the sweat rolling down his
forehead .... roller felt about as there is something very important was going to
happen, it must, I just sit quietly and not thinking any further questions ....

Matt suddenly turned to excitement roller with a voice like a new man picked up a
large amount:

+ Roller begin! We have work to do in this world and hell ......

Ghosts on the internet

Roller immediately return to your desk, on the matt screen being connected to the
main screen of his communication.

Here is a map simulate the connection and security of the global Internet network,
although it is not perfect but it helps a lot of things. Matt explained.

+ The white area blue expression means the connection is normal, white is
temporarily interrupted, the red is being all work and black is completely
disconnected. Do you see areas where there are not signaling attack. I have two
days to track the signal.

Roller ask again:

+ The signals, on which no attacks?

- I recently upgraded signaling system new, attacks small scale does not show,
however now it has not reached too big for us to worry, but he has seen something
special , all small-scale attacks on ... It yesterday are aimed at the subsidiaries
of the same organization.

+ Offensive style roller grade climbing think. it familiar (this period his
services as such, but in general this is the type of attack that you find ways to
exploit from the computer with the lowest security, for example, in a company guy
Directors is the highest security but it must contact the head boy, head straight
back to communicate with staff guy like that ...... According levels. Attacks of
this type are aimed at computer security staff have degrees low density, hijack it
and use computer hacking tricks to higher floors, until there is information, or
take control). This attack has a high success rate but requires more time.

- It's like attacking a man in profile.

Time to collect all information of the machine has been attacked.

Roller and Matt statistics all machines have been attacked, but the figure is quite
large almost no positive for encroachment to the next floor, also small quantities
only.

Roller test his new program development, it has the ability to protect and save the
IP address connected or trying to connect to your computer in any way.

New program

So I must hack, roller thought in my head. Work now guys like Anonymous did. He
needed to hack all the remaining computers in the system that hackers anonymous're
attacking. Make sure your program works well on all those machines, it must lie
there quietly and save addresses and hacker attack methods. Now need to go faster
if do not want to miss the opportunity. Roller began its work, to evening he
finished installed on almost all the remaining computers. The rest are waiting for
the results reported on longer. He turned to Matt, still face pensive as're
thinking something.

In a few days later, nothing unusual (Roller still waiting and doing work on the
multi-dimensional network) Fortunately the evening began with the first incoming
signal. These computer software are being installed simultaneously receive an email
with the address of the same as the company they work (for example, the mail is
gamemater.volam old days it was fake into gamermater.voIam). Mail carefully open to
check email content, not the virus, just a mail with the web address spoofing is a
hacker to do with the purpose of getting someone who is have company email truth,
if not attention , maybe they will take account and data connection.

All emails are sent from a public server, anyone can rent it to email all. Roller
block all emails that do not show up in this network, I have a better idea. Roller
creates connection with the reverse fake website which pretends that hackers have
succeeded and collected plenty account information.

Roller then create a virtual network like the company's network which hackers
penetrate the nail and the false information on it.

He thought to himself, "To penetrate well, then infiltrate my computer this here,"
he hoped everything he would help him get prepared partial information from
intruders.

Haker trap
8:30 pm True, computer signals roller notice someone is logged into the system
virtual network he created, bastard, you're caught in the trap of creating and
roller you thought. He immediately learn about information security criminals are
trying to break the wall of his virtual creation. He connected via a ring network,
the IP can not find out, but he was expected to be the situation. Roller created a
series of dummy data at the next floor to look it seems to be real.

Unknown hackers are trying to download that data on ...... it is loaded too many
public servers, hard to find out the real address. But his attempt was
different ...

All data have been transmitted completed:

(This paragraph has nothing special, roller connected computer online local search,
his aim is to wait for who it sells the information he has obtained on the local
network, and you will acquire. ..)

New information has been published, the document that appeared to name the seller
are recorded as DAVE price for this material is $ 200,000. DAVE try roller contact,
a letter of reply .... All information controlled by you, every decision is your
decision, you just send money for me and all ends. Bitcoin transactions
entirely ...

Roller send $ 200,000 to get the DAVE documents accompanying message, $ 4 million
for a document that I want to get at Company X. If it is correct all the Bitcoin
currency.

(Actually the company X that is due to roller up with technology, forged


information, do as it exists actually, in the system of company X that Roller has
installed a trap to arrest those who sign into it to show up.)

Now just waiting for the fish to bite again as done.

Dave Hacker name after two days, presumably to explore and validate the company X
had replied Roller, I need 2 weeks.

Roller thought: bastard, but I'm just 2 days ....... and email back to DAVE

+ Shorten time, 1 week and it was $ 8 million

No email reply, perhaps Dave has started to work.

(This paragraph Roller track DAVE via virtual networks that you create) 2 week is
enough to Roller detect IP addresses really Dave thanks and a special code which he
installed in the document that DAVE downloaded . $ 200,000 does not go in vain.

Catch hackers

Dave reveal true identity, an engineer 25 years old of a technology corporation


headquartered in Russia. A picture of his mail Send to Dave.

His identity has been revealed, I want all the information you have about the
person called Blue online multi-dimensional, or information, and the attacks he
will be sent to the network of local searches, make DAVE knew, send the information
on it is synonymous with complete disappearance or death.
(This paragraph ngoang diluted once, roller learned about his uncle, was an
organization find and supervision, he must accept the complete disappearance or all
die, including roller, relatives Mike only)

Roller does not know that his uncle was alive or not, but if as it disappeared,
that is not dead, and that means Mike make himself disappear as perfect as the
safety roller.

There must be some way to find the uncle Mike

What remains

Uncle Mike was gone in exchange for the safety of all, family and friends, can not
disclose all the imperfections can make all worsened.

No other information from Russian hacker.

He could have disappeared completely, but no, things left to Roller seem to want
him to look for something, maybe his uncle wanted him, it was him and not someone
else solve the mess this. Speaking of his uncle's belongings which, the box looks
like a milled stainless steel the other pepper, if you leave a note, which means it
must have a purpose instead.

Roller held the box in his hands, nothing but photographs and two of them children
pose together during roller achieved the contest computerization young
undergraduate days level 2 (this period roughly translated sure the correct level 2
then)
Damn, it's heavier than the weight of a normal box

(This paragraph roller discover the box is made from stainless steel ones that make
recovery hard drive ... hard drive capacity to do much less so. The information is
only for roller organization know how big . pay him alive and remain hidden,
everything exposed when not found a way to ensure safety for everyone are too
dangerous, his uncle still has to disappear completely until may ...

Roller take weeks to grasp the authoring of the preliminary structural


organization, so perfect .... too large and government networks around the world
wide.

Roller temporarily return to the work on the local network, you need the money ....
maybe need a lot for the intended future)

Intended roller

One year has passed since the date of roller knew about the secret of his uncle, in
addition to work on the local network to help him earn a decent money, roller also
in the name of Matt to set up a company specializing in network computer based in
another country. Roller need to do something enough to confront the other giant
organizations ......

The information on the local network and what uncle Mike to the help he learned
that, although the organization has huge but it does not work like a normal
company, it has no head clear, only as an organization, some of the characters head
commanded and organized scale attacks for bad sill below, they join and get paid,
so it is difficult to catch the conspirators ... But weakness, despite large
organization to some must have weaknesses, Roller need enough people, enough money
to be able to find a way.
Decision on sugar

Roller decided to where is said to be the ringleader of the organization is active,


the signal from the attacks that the British track throughout the year can be
emitted from Russia, must hit the road, not all have important information on the
internet, you need something stronger, more convincing.

After Russia, Roller works for a company specializing in network security is quite
large in Russia, in addition to work during the day, night online local search,
Roller established an organized set of White Hat Hackers from around the world with
the name, Blue A. (forgot this paragraph roller uses its own code name, no longer
use the name of his uncle again) Zier is codenamed hours of head of Blue A .....
But officials ..... Uncle Mike still can not return .... Organization has yet to be
defeated, and life is still ahead, the mystery has not yet been revealed to
open ..... The adventure is still waiting at the front roller.

Boy wandering

After Roller secret organization founded Blue A. The work in the evenings or spare
time is his search for information about the uncle Mike and seeking membership for
their organization.

Roller tired, still had no information about his uncle, he just wandered the alley
leading to the building just thinking. Oh! a boy. About 15 years old, it is next to
the theater passionately at ATMs. It's doing something right .... Roller wonder
when you see him with the laptop near the ATM. "The little guy is trying to somehow
make withdrawals from this machine."

Gently approached, Roller suddenly came up behind and grabbed his arm, scrawny kid
too.

It startled looked back at him with a look that he felt a little uncomfortable. not
angry, but as something that it can not speak.

+ He is trying to withdraw money from the ATM this. That could make him go to jail.

Arm boy threw up, it bowed not say, "In contrast to the attitude of a thief being
caught".

It mumble:

+ Can you let me go, we'll split the money.

+ Ah! I do not need the money .... Roller said with a sigh.

Transient sadness on his face, perhaps many years living in a virtual world full of
pitfalls that often that you can pedal to make him more sensitive, they must.

+ But my sister needs it, it should have something to eat and to wear warm. I want
to sell the machine, but no one paid me the price that would be it be like
that .... And further it is my father. Eyes it directly like crying. It was a guy
wandering, with a sister and one old computer ...

Somehow Roller again remorse:

+ Which leads me to my place of him, I'll buy his computer with the price that it
deserves to pay ... Roller followed him to where he calls home. An old drain pipe
with bulkhead. Which is a 7 year old girl about 6 eyes looked at him with panic.
"It tells the truth"

+ Do you think a price worthy for this computer is.

After some thought, he hesitated: 200 dollars, why.

+ Roller gave him $ 200 and take the old machine, the boy still watched with sad
eyes.

+ I used to see him go through this, I will find him and acquisition machine.

Roller smilingly:

+ I have a different standard, you can be in my warehouse, she can not stand
anywhere, anyway I also need to find someone to help some errands.

Boy excited, hastily carrying it and I tagged along Roller

In the beginning he had an idea. That made him feel elated ....

Relatives of Roller

From day two kids come in, Roller felt more cheerful, kid actually very smart for
his age. It can construct a security system is quite good, which is probably at his
age it was never done. Roller boy helps the odd jobs, sometimes the network system
is not too complicated, he let it. He also let it go to a school nearby ...

Signal attack

The boy did not look as always, (à forget this boy named kai) it looked like he was
worried something, roller asked him whether what happened, probably in what the
school has reasonable ....

(Roller began to kai learn the techniques of security, in this section, kai has
created a software that can go unnoticed by management software of students at the
school. The mechanism of it may be fake the actions of the computer and through the
management software, whether sitting in the classroom, but to access something on
the outside and not be detected. but it forgot that it is using a public computer,
and someone has discovered this software and duplicate it, at school full of those
who anonymously and destruction of school system)

Roller hearing the story of the boy. Rub! kid pretty too (he thought) ... But a guy
wants to be a hacker or something like that, to know himself what his control cause
... Roller advised the boy try something something to prevent what the software
does. He also tried to access the school's network and check what the kid how to
create it .... "Well good? I mean" kid using a multidimensional cross connection
and connect all all the computers in the school into a spiderweb, (this almost
anonymous network but smaller scale) like IP address can hardly be detected ....
but if the scale is too small network , can install software that records the
signal is transmitted on each machine, aggregate and analyze what the file can
still know what it did,

Surprise Roller received a message from the network .... multidimensional signals
are of an attack on the company that you suspect it has anything to do with the
other giant organizations ...

Unknown hackers are trying to access the company's intranet via the connection S
system, computer hackers are reported using the software detect key pass. This
connection type if fast it took about 4 hours to complete, if the wireless network,
which means he must be nearby ... 2 more hours, he rushed jacket coat and rushed
out to the car.

Unknown attackers

Roller drive in thoughts, what made him want to seek information from the company
right. How to search for information is too dangerous, must be in radius can catch
that wave of internal network, or it can be someone of companies trying to test
security. Just go there to see why,

He stopped at a viewing location is about 500 meters radius of the broadcast of


this machine is probably about 100m. So where could he be right .... Fortunately
for Roller is what companies have fairly large campus, also at home around people.
Roller walking on the sidewalk tiles .... He walked and observed silence .... Do
not see anyone. He may be right ..... anywhere Roller continue searching but can
not find. over two hours, maybe he broke the lock and then ....

After searching for about 30 minutes more and nothing suspicious, he returned home
to see. Do not know who he is.
Roller check on the local network .... Damn, I forgot what game is still connected
to the signal internal network that ..... but did not see anyone around that .
Suddenly roller blame yourself:

+ Damn, the communications system indirectly, can he installed it in the


surrounding area, then ......

He took computer and your tuner back to the company ...... Roller sitting in the
car and start to use tuner to determine the device's location data .... This
then .... I was looking for and finally found, it is encased in a plastic bags and
tied on a tree ....

+ Should wait until he returned to take, or ......

Roller just thought, he decided to connect his computer to the transmission of


data, with this indirect way communication, it will only increase by adding
approximately 1 km only .... information for Roller knows about credits brand is
transmitted to a computer is approximately 800 meters toward the hidden substandard
housing on the trails behind the company .....

He drove slowly carried on that way .........

Cottages behind the trees

Roller stop about 100 meters from the building, the signal has indicated that other
hackers just in this neighborhood, too difficult for him to search the house,
roller devised another way ... around here just there is a way to get out, probably
better to wait there, Roller think and stop after a bush, he waited ... signal was
emitted ...

9.30 am .... the signal was disconnected, Roller suspense. Surely that hackers have
to go through this place.

A shadow came out from the house, he quietly observed, his gait as he felt a little
strange, maybe you've seen somewhere
Dim lights from the houses in the distance is not enough to clearly see his face
roller ... He walked down to the car and approached the stranger:

The road only a few balls passersby:

+ Sorry you could lend me a little fire not,

The man turned around ...

Dim light, but enough to let him get out, that's kai ....

They did look at each other silently.

Roller Kai according to the car and returned home, the atmosphere remained silent,
sister of kai slept long. Roller asked ..

+ Why are you doing that!

Kai hesitated:

(The story of kai on the family, on the father the boy worked at the company, which
is an engineer in information technology, but on a day ago about 2 years he will
never return, man J name, Ron)

2 years, it was not much difference as compared to the period uncle Mike
disappeared.

Kai asked:

Note also, so how to know that the world was there.

Roller quietly answered, then one day I will get to know, and now, all of her
actions, talk with my uncle, who can help me. I can be detected today by a
different person, and it's too dangerous.

First game

The roller first student

After what had happened, Roller decisions need to teach kai know how to protect
myself, techniques, ways and some attacks are his analysis in detail, Kai proved
smart , what he said it will acquire quite good, but .... there is something you
always sign ... that's the anonymity network. Then one day it will be known, but
not right now.

3 more months passed, so the time he moved to a new place is quite a long time,
Roller miss his room ..... Every day he talked with Matt on the local network
should also be part held what information there, no attacks too large, probably
have something that makes more sense in the hacker scene this time. Now kai may
also help him work some small, some network design security for small
companies ......

Perhaps the time has come ..... Roller also need someone who can help him.

Like test that Matt for him, and it's time to go through it Kai.

Kai's tests
Roller start thinking about the content of that test, it must be the closest to
reality ..... but first must resolve what remains of Kai software in schools.

It takes about 2 hours to Roller grasp the entire school management software it.
This program runs in parallel with the operating system but does not let you off.
Including making algorithms such as trojans, record keystrokes, the list of blocked
web. Kai software disables this algorithm and making two computer installed with
invisible management software. To solve this problem, just update the filtering
algorithm and record keyboard and update the entire machine in the field is to
be .....

Not too difficult, make Kai do

After the decision for a test Kai like you before, suddenly changed his mind Roller
for not much time left. Maybe, the main test is the job of the boy first, it may
help it search for information about his father.

Check .....

After thinking a lot, Roller decided to call Kai to:

+ We have work to do, I need to learn how to defend myself more if not detected ...
Get on that company, and the set of signals from the inside
.
+ But I can not! Their security system is quite good. Kai told Roller

So to use a new way, please tell him of her plans, not to arbitrarily act now.

Roller had lost yesterday to study the security system of the company. Seems as you
guessed, it is related to a certain organization, a company that normally might not
require such security systems, but ..... he is a pro.

Security system consisting of basic parts:

+ Wrap the outside of the system and protect the corridor. The camera is also
pretty much quantity.

2nd + system when to be in the cards from identifying the name and number. then the
fingerprint. on this floor, each with an id and access data with different rights.

+ After more is password protected computer

All these things are controlled by a local computer, with absolutely no connection
to the outside .... Cachcua Kai is taking advantage of wireless connectivity waves
spread outwards to connect and companies, but it is unsafe and too dangerous,
Roller has more great thoughts.

He suggested to Kai:

+ If I want to open an attack, or something ..... please understand the goal as


possible. This holds true in all cases, thoroughly understand the work lights are
going to do more and better protect themselves. He wanted me to learn all the staff
are present in it, work .... name or email .. in a certain way.

Kai! start acting ....

Kai began to find ways to collect information in the company of those strange. Must
somehow force them to say information as well as your email, but, to do whatever
possible ... Kai told Roller of intent once again want to connect to the wireless
network of the company but the roller does not agree, it is too dangerous to be
detected and countered. Kai continues to think, if there is no way to connect to,
they must direct their questions well ... Kai smiled mischievously.

Yesterday after the boy was awake roller out from time to time, around 8 am, it
comes back with a snack car, the face cheerful

+ Of my friends .... I borrowed him to carry her own plan.

Kai and Roller drove snack approaching strange company, in this position can be
observed very well .... And more importantly to snack ..

First guests approached:

+ Give me two Bread ham and water ....

Water just bread Kai said:

+ Ok sir! He said bothered name and email to the boss I can make him the payment
slip ...

The man did so, wait and take your meals ...

He worked in that company. (This passage is recorded for this area at the company
and places where fast food is quite good observer should recognize Kai). Continue
like animals, until the end of the day, he had in hand about 20 names and emails of
employees in it. Roller smiling "He pretty too".

The need to do now is to turn the newly collected information into something
usable.

Kai plan

Kai began work like spy program management software of different school but an
uncle. Completely hidden away on the operating system, or remove ......
unquenchable And special features and is the key to planning algorithm kai is
outside help save the information and the manipulation of the machine infections
have it open a secret connection port, help hackers gain control of network access
and freedom through that port without the user even knowing.

The need to do now is to send it to the other guests and I hope it works well ...

The connection is open

Network connection is opened by Kai?

All day long waiting for, today is 7, has made the first computer installed
software that Kai created, but the purpose of this program, other than collect
information from computers that Roller and Kai .... guess that nothing that's just
ordinary employees. Their aim is different, the computer these employees to serve
other purposes.

Sunday still nothing other than three of those silly emails employees of the
company strange. Probably have to wait until tomorrow, when they started working at
the company.

The next day, and two children got up early and look at the computer screen, hoping
one of the infected computer connected software out .... (Computers infected with
software that can be used as a roller the indirect communication, it helps you from
that computer can take control or access information from within the company
intranet without making direct part in wave wireless sector).

To 10.30 still no signal of a connected computer out, perhaps in the company that
are not used signaling network or access the external network?. Roller try to send
commands to the computer test was infected software ... strange, there are signs
signaling connected computer off, then there is the problem of software affordable.
Can not, yesterday you yourself check it carefully after all. That company can use
one door security system, ie the connections want to spread out, must be checked
through a master server. No problem....

Yesterday he added a software algorithm to Kai. He turned to ask if it has ways to


try anything before activating the system.

It is silent for a moment .... Then start to the computer .... Sweat face it. An
hour passed, kai still can not activate the mechanism helped him escape through the
filter of that company communications.

Still have to learn more, "Maybe he was too hasty when pressed him to do this."

Unexpected signal on the computer indicating that Kai was successful .... Not by
the Roller ... It uses a different way, she knows if the signal sent to and still
be able to get a response back though do not tell us what information other than to
say that, can connect to resubmit, ie outbound connections .... It does not try to
activate the machine being monitored by a host signal filter .... it! ..... Attack
is always the same server, excellent "Roller think" great kid too. He smiled
contentedly.

Offensive way of Kai

Cyber attacks by kai

The boy seems to focus, let it use its way, Roller silent observer behind. It looks
like it has been the host to trick him. Connection mode has been activated ... Kai
downloaded file records all employees within the company. The documents and records
are downloading, download mode has ended, open a connection port can be easily
hidden to access the internal network at any time, that's it ...

They did spend an entire afternoon to pick out the important parts of the document
is downloaded, the boy is still learning about his father, also missing as his
uncle, and the roller is different ... He checked again but this company's
connection to a network ... the network that he was so familiar ....
multidimensional computer network.

Do not know the boy can recognize changes in the transmitted signal seems so
natural in fact this is the virtual connection is not .....

It is true that someone is connected to a multi-dimensional computer networks


however can not detect the connection should look like, to have a different way to
know that. That also means that ... If you have ever been connected to computer
networks then this is probably not the game lasted longer, must take the time ..

There must be a way to find out if the guys connect to multidimensional computer
network that is who and what he is looking for. Roller visual data files of
employees in the company, he has in this or somehow be avoided. Need to find ways
to hack CCTV (security camera format as in Vietnam)
New information on CCTV

Roller sought to hack through the CCTV data server that Kai opened outbound
connections. Sure people connected to the network anonymously to the extent not
unintentionally expose what he is accessing entered the CCTV, but there must be
something other than.

Download data via the CCTV took 4 hours, he read through the files enlisted
personnel records that boy Kai downloaded .... still looking for something.
something related to its father, looks tense.

John, the father named John mysterious disappearance and police could not find.
Show up in the memories it is a man yoke 45, gentle and loves it and sister ... It
still remember the last day, he looked tense after seeing something on the computer
that he used to work .... Kai do not mind it much thought, perhaps too busy job in
the company made him tense, until one week later ....

He suddenly disappeared without leaving a thing ... Police conclude missing due to
the psychological state is not stable, but it does not believe ... There must be
something he had seen on the day that day. Only a mere pen strokes on paper ngoang
diluted ..... As the company name strange that Kai is looking for information.

A few years ago it always seeks to collect information from companies that vain,
nothing but silly stuff document.

Who are they ?

Data loading process has finished, many CCTV recorded segment from that company,
Kai hurried back to Roller to view the CCTV segment there.

They did take more than 2 hours to see the small part of the recording, still have
not seen anything special, angles and only scenes employees who go into the
company, working and chatting as usual . Perhaps there is a special area, or a
particular port Camera. Probably should have some way.

Roller is still thinking, he can not sleep with these thoughts in mind, around 2am,
roller turn up, there may be a certain part of the camera can not be loaded. He
counted the number of cameras on the screen ... a total of 24 female with different
angles ....
Roller hit the road the next morning early to the company strange. Roller pretended
a morning exercise, he observed outside. 2 camera angles, which means there may be
people in from the back door, and they can not be recorded ...
Roller continued to observe rear, it is true that the camera does not have here all
... Wait!

What traffic cameras on the road is approximately 200 recorded material can not, he
walked across the lawn to the road and gone .... With this angle, you can. Roller
record number. 1092 digital camera line tr ..... Ok! with this type of traffic
cameras is not that difficult to get data from it.

The strange thing on CCTV No. 1092

Roller returned home, Kai woke up, his little sister was still asleep ... It
continued to search the private ones loaded CCTV company. Roller sit down at the
table and began to search the server containing the data of the camera in 1092 ....

Again take about 4 hours to download his data in the last 3 months ... can just
load the data was browsing through a section to save time.
It is true that there are people in the back door ... not less but also not
more ..... Roller special attention to the man, he walked to the gate and looked
like he was in a hurry. .. date 24/5 days back was reported on CCTV.

He hurriedly told Kai synthesize all the CCTV related to the 24th and start
watching .....

Strange man

The man was wearing a light blue shirt, it seems he is rushing something. Kai still
collecting all the CCTV segment related to day 24. All possible angles are Roller
and Kai scrutinize. No ..... Absolutely not see the man appear in any corner of the
machine on the CCTV again. They did continue to watch the whole tape, they take
several more hours for the next day ..... Still completely not see him come out ...

No way, not perhaps including research parks à spot. The man looks in a hurry, he
dressed not seem to be there all the research ... But why did he disappear entirely
so. If there is another door to make sure they still have caught the traffic
cameras. Roller make sure that he was in there, did not appear in any one CCTV
does, then only in case he looked out there and not because of a certain reason

There can only be the case!

Find more evidence

Need more evidence, Roller continued to wear the old cloak and drove his car to the
company strange. Impossible for them there so long, it must have something to use.
Roller mount a camera on the corners but still enough for you to observe the entire
back home, but to go home ...... roller continue to monitor the tapes several days
later, he completely see strange man come out or, appear in any public CCTV
installation ... Only two cases only

+ Maybe he was killed in it


+ Or that's it, and we know how to himself never to expose

Roller continued to observe more days. absolutely nothing remains other than the
image of the normal staff. That drilling ....

In footage this evening, it seems there are people in companies strange and
evening, CCTV from the transport system but out problems he dimly realized, had the
ball a woman and a ball again it seems that children are in that company, the car
goes away soon .....

Those in the company

Roller was thinking, did not see any evidence showing that people who have left the
company, has completely disappeared as the strange man. That can make sure that
those people are still present in the company. Roller should have access to them
somehow .... Must be closer to the Tiger Cave.

The next day, he had to prepare for a new plan, you must be inside the company,
find information Roller of CCTV installation companies that often hire companies
that install ...... Just few tips, Roller add your picture on the profile of the
company that mounted camera, auto mode canceled after 1 day, and he disconnected
the camera inside a company. Ok now, wait until they call your number of machines
that have prepared severance ......
Roller continues with the attempts of the invention. Maybe those people will
forever never come out, once he read about the case experiments barbarian on humans
in the local network, there are some who are willing to spend a lot of money to
carry out the experiment experience brutal and inhumane. They tested these drugs,
the methods of torture ..... on the human body ...

Planning of roller

The phone rang, just as planned, the company's request to call to fix the camera.
Roller workers dressed and hit the road, 30 minutes later he was in the company
that weird. These offices do not have a sign outside is nothing special, it seems
people just do the normal job ...

Roller but still felt there was something unusual ... The room seemed little
window. Yesterday he had installed to disable the camera in a position quite
mischievous, to get to the location of some cameras have been very out goods that
need to go through some areas, observations and calculations, roller find a
position for him adding to it a few cameras ..... what he specifically noted that a
room with a steel door, looks weird ... can not install in a any angle can give him
enough vision .... can only observe about 3/4 corridor. Roller installing your
camera, connect the computer to the camera and open it, now you can better observe
both outside and inside the company.

They can not come out

Kai still sitting inside the computer when Roller back, the camera works well, and
two grandchildren also need to eat something instead. This time you not have
anything happen, with his back also has set the record mode and the camera on the
whole.

6pm, both still sitting watching the camera screen, almost all employees had left
off. Leaving only some of the staff at the inside, next to the room where the iron
door, they're doing something ... It seems very focused. strange hallway lights
still do not see it, maybe it's a shed or something like that.
8pm entire staff seemed to end, and two grandchildren disappointed with the results
obtained ...

Kai called to:

+ Note Roller stay here!

The camera turns to the screen roller broadcast from the traffic cameras, there is
a small van was stopped at the gate of the company later. Remains the car that the
woman and child were transported to, but this time no one, outside the shadow man
hi hui started something in the car, the car seems broken, they must ... ..

The man on camera

Factory air conditioning gree 9000BTU room was still operating normally but both
uncle and nephew still feel the atmosphere is somewhat hot, man has entered the
inside of the gate, he followed the path that would not have the camcorder. but
this time was different .... Roller system works well, the image of a man 50 years
old with 45 views and suffering people face gaunt, his face looming in the dim
light, but still exudes a that makes it seem frightening ... he disappeared at the
end of the corridor, where there are strange metal door, cameras can not reach.
Roller and Kai and continue to observe, did not see the man back out, press the
camera remains stable regime ...
..
2 hours later, Kai fell asleep .... Roller also need to make yourself a cup of
caffe to hold out, he a little tired these days, perhaps the company took some
effort of him ....

Incidentally, the computer signal indicating there is movement on the screen, Kai
also woke the man also came out with a bundle in her hands, gait of old still
unhurried, slow style make others be disgusting ....

He appeared on the screen traffic, onto the small coffin car and
disappeared .........

In the previous Roller saw a man out of the company at night, it looks like he was
doing something in the room with the iron door.

Murderer in strange company

Roller little eyestrain, but still enough to make him realize, in the bundle that
man strangely brought out from the room with the steel door is an arm, Kai seems
shocked, perhaps something like this still too new for it. It is true that it ....
Roller think, projects inhumane experiments on the human body is real, what you
often see on the local network is real, but he still feels strange really exposed
to it ...

That means, men, women and children ..... possibly Kai's father, has never can
become out ..... He sure knows it, face tired and thought .... ultimately what he
had read in that day, what do you to the company, as the man and the woman ...
that's something. "That question itself around inside the head Kai, it must find
the answers."

That's what Roller'm thinking, maybe they were used to the way other people look to
..... Kai said his father had read something before disappearing ... It may be
something to be right.

Mysterious bulletin board

Roller began searching for information about men and women in the company .... If
you tell the police, maybe they will be caught, but not all, he needs to find out
who is behind ... the time has come already. Roller log into the local network and
send messages to members of Blue A, the member whom he has gathered during the past
period ... all invisible, and good luck .... not all are doing for the money.

Images in the video is loaded onto a local network, members are working to analyze
and search, to make tomorrow's results are thinking ..... Roller, Kai still sitting
inside the computer. Suddenly it asks Roller.

The connection is so strange uncle!

Roller silent, perhaps it's time to tell the boy about local network .....

He described it the bizarre world that the boy did not seem surprised, perhaps it
foresaw anything.
Identified

The next morning, reports from a member of the organization ... Picture too dim and
can not clarify facial analysis, based on the characteristics, some details may be
analyzed as, figure, clothing worn when disappeared, hairstyle or anything .......
But in that time only 2 men and 1 woman whose identity may be the same as those in
the clip turns without information loss ... their living area all around the city
area.

But.....! what do they must go to that place.

Can not be a bulletin board for very little number of people and a common
characteristic is that they are living alone and had little contact with people
outside the father of Kai ... Maybe he unplanned, accidental reading something
should be forced to disappear ..... Roller return home.

Kai! my father read the information on the computer so that we can try to restore
the data ....
Kai thought, suddenly it exclaimed .... back then! it remembers when he realized
there .... strange attitude is what computer aunt aunt .... After the event it also
moved to another place to live and also do not see any contact with brothers it all
..... it still think it and I it outcast after his father disappeared, but ...
could it be ...

Aunt of Kai

It is true that day, his father led 2 brothers to the aunt play, and obviously when
he saw he was sitting inside the old computer's aunt, after his father disappeared,
Kai also look at home aunt across the city, now owned by a young couple, they said
Kai moved aunt and now they own the apartment. Kai just think simply because too
grief or for any reason that kai aunt and her family moved to somewhere else to
live, leaving two brothers it ...

Kai recalled, can do ....! it does not want to think more, it's really too horrible
... Maybe do what has been a family organization that abducted. His father
accidentally read that thing should have to disappear ... The house where he lives
now 3 father also owned by other people, the disappearance of the father is the
police only conclusion. "The house is sold, Disappeared can move elsewhere due to
live without notice". Who was in the apartment of his aunt and his family, they
bought the house from someone ...

Roller also has his own thoughts. Maybe aunt and father were arrested roller serve
a certain experiment .... But what makes them reason to the company strange ...
Must find out what content they read .

+ Is Money?
+ It is something?
+ Or due to control?

Roller uncle is gone, but at least you know, uncle alive and must disappear
completely to protect him. Perhaps because his uncle also grasp something that we
can not kill him. Maybe there is a clue in this incident ......

Roller access the local network and on Blu own room A. online. A notification is
given ....

$ 200,000 for all valuable information from company xxx


Roller put a notice on the organization's own room he created, the hope does not
make those who belong xxx other companies detect and remove traces.

Cai aunt's old computer

The next day, two on the road to pay her aunt's apartment, and the apartment where
the family previously lived there Kai, pretty nice apartment ... Roller track and
install a system to control information news from home.

A week went by .....

Still nothing special. All information indicates that they are just normal people,
a family business, shopping, a family law firm on the other side of the city, it
looks like they bought a house from someone. ... guys that's whom Kai and Roller
need to find out.

Roller is looking at homes that previously Kai with you it lived with his father.
It is for sale for $ 500,000 seems like the owner prepared to move somewhere.

Roller call with:

Kai! grandchildren want to buy back the house of my father, not

it's somewhat unexpected ... rushed to read the private fire sale, but suddenly
appeared a disappointed look on his face.

+ $ 500,000 to make me never dreamed that number.

Roller look at it:

+ The work that you've made them pay, perhaps well over two hundred thousand, the
deficit .... do not worry. Today I'll show I saw ....

New life begins

Maybe it's time for Kai seen only on your local network, Roller call it and start
pointing out the works and how it can protect themselves in the virtual world full
of danger. The work on the local network, if you are good enough to do, the amount
of $ 300,000 is not too hard to earn quick, sometimes just a few days .....

Just 3 months!

Maybe have that much time to kai can learn to protect yourself. It began to read
and just read what Roller recorded from a few years back. Time is not much time ...
I've lost too much time already ....

Roller decided to return to where he lived for about 2 weeks to Kai read all those
documents .... Roller contact Matt to hit the road early the next morning.
.........................

Return Date Kai

Perhaps the acquisition of his father's house is what Kai had never thought of. He
never thought he could get such a large sum. The work on the local network may help
Kai do it quickly, the virtual currency often traded among Hacker here quickly be
converted to cash. But like Roller, making money is not their goal, they need to
find their loved ones, whether they were alive or dead. The normal Hacker ... they
can not go deeper into the local network, not because they are not qualified, but
perhaps they feel that is more than enough if just here for the purpose of making
money. New World said, those deep in the local network this is not for nothing ...
maybe only because of a personal preference somehow weird.

Tomorrow, tomorrow is the first day it and Roller return home that his family had
lived from childhood. She also went to school children it seems it was not
happy ... it does not want the house .. too many memories, it does not want to face
it, but that's where it was born, where but it feels safest.

The only trace

The next morning she got up early 3 Notes cleanup belongings to move to the house,
machinery and furniture quite well done but probably shortly ....

Noon to 3 pay him nearly finished his work, just clean up and rearrange some things
are OK now. To ensure safety, Roller has fitted some system cameras around the
house ... She felt strange, but it still did not say anything, perhaps it was too
familiar with things strange in his eyes , the two men are then slumped together.

Kai walked out with an expression of sadness ... hand it is a small book, it said
it was his father's diary, it seems that old pile of his father, who owned this
house also did not bother to throw go, they put up in the attic in the house. They
did reading the diary, nothing special ... family stories ... But strange things
are in the last pages. A mere few words

"Today, do not know what that is thankfully not, but give it a try ....

Not, obviously something that I should go there or not. Without going well not be.
"

Two men sit, do not say, because they are busy thinking of that statement can be.
It is possible that it was talking about the stuff that makes the strange visitor
and his father, aunt it disappear ....

Encrypted data

The two men remained silent at each other, they're thinking about something else
that made people turn to the company to find that strange, because money .... or
for something else. Kai did not think his father to do something foolish, just for
the money, but know where to be ..... something more important in causing him to
think it? two brothers could be it.

Roller did not say anything, he just quietly and attentively read the diary, right
is nothing strange outside the site last diary, to find something that they are
looking to the public strange company and become a victim to a conspiracy that ...

Maybe when it is sent, not all will come ... will be those who read it and do not
look to the company, they still alive, and who they are.

Outdoor began dark ... They did still sitting quietly thinking, security system
installation that Roller perhaps help them safely and observe everything around.
Roller asleep in thought ... Suddenly he was startled awake when Kai softly called
him, opened his eyes and looked roller towards it ... on screen No. 4 was installed
overlooking the road side of the house, a car was stopped there, it's dark, but
still enough to make him realize it was what the car was carrying the woman to
companies strange and never back out there.
What the hell is it doing here, huh ... Roller silent thinking, about 15 minutes
after the car running and disappeared.

Continue intrusion

Perhaps he was too subjective when no doubt that, maybe their victims are still
closely monitored, although they may have chet.May luck is what his security system
is also not too Highway willow, night difficult to recognize, roller need another
plan. Roller called Kai and began seeking information from the server was hacked by
the company ... all were encrypted, but need to find out something from the pile of
information this syncretism. But it is almost impossible ... only one way
eventually, adventurous, but time does not allow him to delay ...

They did still work, The sweat rolled down his forehead. Still no useful
information beyond a few bills from the inept encrypted files there.

Plans outside the virtual world ..

Only a day after the 3-uncle and nephew moved to a new home ... The next morning
two Roller call back and say:

- We need to move, I'll take two grandchildren over to Matt?

Two children seems not quite understand but still quietly clean up the room and
furnishings needed, maybe we got used to things like this weird.

That evening, Matt texted He picked out two kids at the appointed place. House only
hours left alone he plans too dangerous, not allowing Roller can adventure. He
alone is more than enough.
(This paragraph summary)

Kai and sister to a place of Matt Roller connect all security cameras at home and
rent a location secret include.

Roller put a message on the multi-dimensional network: Things you probably never
thought I would do before. Messages are sent to organizations Assassin is probably
the most famous on the networks, all those dirty and dangerous ... These guys are
willing to do everything for money.

"2 Million $ for a plan to kidnap and to get information, but that's just the
starting price"

Messages are sent in the name of the organization of Roller, the name is enough to
guarantee that for sure who will get back, but can also this letter will probably
kill him if to them find out.

Less than 30 minutes later had a reply:

Oh hello! a famous white hat hackers should look to our game. I do not want to help
you, but if you have money, you may request.

Such means agree. Roller send information to organize assassin. Company Information
strange and a photograph man swaggered upholstery mysterious corpse that he had
taken from the clip content. 2 million $ to arrest this man, and another $ 2
million for an interrogation is transmitted directly through my communication
systems on multidimensional network.
..........
Hide

Immediately after giving notice seeking information of strangers eye on CCTV,


Roller received the message from a black hat hacker seeking information accepting
of strangers with the initial price of 2 million dolla. But maybe, the move will
lead to a danger he did not anticipate. Need to be prepared for any situation, what
to do if indeed they can find the killer. Can not disclose any information that
makes them able to guess or know information about you .....

The next day, Roller apply for a job at a food company that specializes in the new
city. Here people are not interested in what their neighbors do, but a man with two
small children around the house itself is probably not very good with the
neighbors. His job is handling the system automatically calculates the warehouse
for the company ...

Preparation for becoming an exemplary man, morning commute, at home might have been
prepared quite well. Now you need to connect the computer system at home with a
laptop which you can bring to the company ... Can not miss, whether any one moment
from your local network, but the connection , may create a vulnerability for
hackers that they can find your information.

(From this point, I will not say any more long lines, the story will be told right
of the author)

Suddenly a message is sent to the roller through local area network, a letter:

If you have 3 million dolla I can bring the man you want to anywhere. Accompanied
by an attachment. After handling a few security steps, Roller opening attachments
from strangers. It was a picture of a man standing at a crossroads, but obviously
that is whom roller looking man in paragraph CCTV, the picture is certainly true,
every inspection technology that he has not shown any signs that photo was edited.
Is this a trap not ....!

Whether true or not is to be prepared. A plan was prepared roller ... Roller access
to the organization's own system, which he created, a new notification is sent to a
member in another country, (search and prepare a room, installation of camera
systems so he can observe and talking to those present)

Information revealed

Roller answered letters from strangers:

My money was for in the room. Please bring men to the room and take the money!

Only about 20 minutes later had a message consent of strangers, it should take
about two days to bring the man to the appointed place. That was the purpose of the
Roller, if accurate timing and strangers do not know the real purpose of Roller,
perhaps all will end ...

Bomb

Two days have elapsed from the date that the killer Roller and organizations to
communicate scheduled to meet strange men on CCTV. Everything was ready, A room
with full equipment can help you track the remote has been prepared by people in
the organization. Whatever you want, can not face appears Roller appear at that
location is. Those who exist at depth within the local network do things not just
because of money.

Outdoor still pouring rain, heavy rain and wind slapped limited window space makes
it become silent to the congestion period. Time seemed to move slower when closer
to the appointment. What has yet to prove that signal, which Roller wait appears. I
still believe that this organization will do the right thing with what they have
promised, by some reason, even though such organizations on the local network can
do all the things that we think is right. However, one of the principles is a top
priority if it is to survive ensure everything goes as promised. Of course, with a
contract from the head of a famous organization like Roller This group of assassins
have no reason to be disappointed.

There's something wrong?

Only 5 minutes left until the time of appointment. What has not static. Trying wait
see stars, I said to myself. The notification signal on the system remained steady
rain outside the window is still no sign of stopping.
....

Already more than 15 minutes, this time everything right out to the new place right
on schedule. Roller looked at the computer screen, the images are transmitted
directly from the house still does not have anything more static. Maybe we're
wary ... Suddenly he realized something strange. No, I must say is a strange
feeling it's more correct ... it's hard to explain the feeling, the feeling that
something extraordinary. But he still can not think, it is nothing unusual.

As mentioned earlier, Roller currently work may temporarily called the system
administrator for a small company in the city. A perfect job for him immersed in
the real world, every morning, he got up and, with his two nephews prepared for
routine work, like any other normal person. But that's just "like normal people
alone" since Roller decided to participate in the local network and the stories
surrounding it, he can not be "normal".

Someone is attacking?

Time has quietly passed a hard, small room his only equipment Roller and dry, the
children also have a safe time in a place far away. The safety of the children is
that Roller top priority. Kai could help a lot of photos. However, it is still too
dangerous if you leave it with you whenever a particular mission. And ensuring the
safety of the two children is always the first thing he does whenever a certain
plan.

Roller sighed looking at the screen on the computer monitor of mine ... it seems he
has given up hope on the organization of assassins on the local network will give
him goals that he needed. Did they break the rules? the flies are flying up and
down in the monitor screen, where he lives in the sky is pouring rain, but where
Roller layout of the room, the temperature is quite humid and many flies ...
Suddenly, as realize something, Roller stood up. He had seen strange things that he
can not answer disturbed been saying until now.

The attacker

Roller blinked, he should have realized this long ago is true. Images on CCTV being
repeated, he remembered that the glimmer entered from the door again just flashed
bright, light obviously repeat, exactly the same 30 minutes ago he tracked screen .
He hurriedly start the system scanning the entire network secure, it took 5 minutes
to complete system scan. There may be someone trying to detect signals from CCTV
collected, we know you are tracking remote screen ... Whether he was predictable,
the assassin on the local network do not all just for the money. He still felt
anxious, whether the transmitted signal is encrypted and transferred through many
ports.

Fights back

Security scanning system has announced that at least five attackers are trying to
use the bot to detect the end of the signal from CCTV. Roller quickly find out how
attackers are using. But the bot is not yet strong enough to be able to escape the
roller ring network that has created, so was able to somewhat reassuring. There
must be one counterattack, but without strong, can those who have information about
his uncle.

Roller Use a righteous way that they are attacking him to find his attackers. They
also are using a computer, via hardware from the signal transmission of CCTV to
upload the bots, so we are very close to the room in which he had prepared. With
any luck, even those who are also valuable than the man in the company other
strangers. Or maybe, it they're looking to see who care about what they are
doing .... Can, who had disappeared in the strange other companies were victims of
an organization certain peculiar (some organizations linked to religious heresy
somehow). But that room is too far away, it's hard to track them down, even if it
was a dangerous job. Temporarily, keep collecting all that is needed, just think
Roller,

Traces revealed

It seems the attackers abandoned their intentions. Organizations rarely demolished


killer underground laws on the local network can flip back to attack him, make sure
to have something for us to do so. Roller just think, just a full review of the
footage that he downloaded from the CCTV traffic around that area. 4 entrance, only
a single path traverse forest cover is concerned there is no CCTV. Nor is there
much traffic through this area much, but still nothing positive. England need to
cover the road in the forest to search for all.

The next day, Roller on the way, he disguised as a hunter, fumbling around the edge
of the forest. Distance side is a small house, a small house very romantic side
edge of the forest, with an old man sitting in front of the door, sipping wine,
hand, face dim satisfaction. Roller approached.

Hello sir! a very nice day is not it.

The old man smiled back:

What a beautiful day to hunt.

Moment a thought in my mind, replied Roller

- I almost get a little rabbit down yesterday, if not have a car horn pulled the
trigger right now.

Oh! Is the car with the bull logo and two men driving two crow looked like it not.

- May! I was busy focusing on his hunt, wish him a good day.

The old man smiled and then continued with his wine glass.

So maybe, the two guys with the car that came to that room yesterday.

A plan
Roller returned to the car via a small road close edge of the forest, the smell of
flowers with water droplets on the leaves remaining photos made feel extremely
comfortable. The far side, a few black still pull to signal a coming rain poured
down. He slowly start the car engine and go towards the city ... maybe a little
drink will make him feel more comfortable when it had begun to rain.

Roller had the wine into a roadside, a pub decorated with hand proper domain of a
few cowboy hat hanging on the wall. He chose a location in the same side, the small
doorway, toward the highway ... ever this job ended, he should stop with the kids
to live a peaceful life or not . Find out the mystery, what notes he left was
probably absorbed too deeply into the blood, into the life of Roller makes him
unstoppable. But to start, perhaps it's time to really go back Roller, he spent a
lot of time to think, to be cautious because of concern for the children. Want a
real life, Roller should get out of this single clock, the Internet never end
points, increasingly encroaching on it, only one makes it more difficult to escape
alone.

Kai and his sister, too, everything has sunk into the past, is there really need to
find out who made it miserable family. Those who make the lives of the brothers it
becomes like now. It's too sad to not have children at the party, it's time we came
back, picked up the phone Roller old friend called to prepare for the brothers Kai
home. Perhaps, the battle is far from over, Roller need a more elaborate plan, Kai
probably would be enough to make him stronger in this war.

Weeks later, things still do not have much money on. Today, Roller and two brothers
Kai had an appointment to see a movie, the movie about the guy who iron iron man in
the movie theater downtown. True 7pm, three stems on the road leading from the
suburbs to the cinema ...... kids seem happy to see the film, but perhaps Roller
continuous line of thinking that he did not even remember a film about anything.
But in the beginning he had a plan, a plan that even he himself did not believe
that he has thought out well.

Mystery in the virtual world

The plan is the plan, it should be set aside, anyone should have the silences in
our lives. Today is the first time it's three grandchildren uncle go to the movies
together, and also so long he did not have the silences. Roller sits quietly,
whether he is a "man adept" in the technology world, but even the picture is not
doubt that it is the pace of development so fast. Sometimes, he himself forgot
himself he needed something that plunge into the never-ending war. It is true that
the war on the local network will never end, the hacker gradually born and growing
local network more powerful, whether it is invisible to many.

Roller need to prepare some things for his plan, luckily he had a cover pretty
sure, he looks no different from an ordinary office workers. Perhaps, the boss
every day dragged him insulted busy few would have fell down there if he knew how
bloody face in the virtual world, not the type of hero that style keyboard ... can
use the internet to kill you if you wish.

Uh, he will temporarily use the wireless transceiver card company that, anyway, it
was not too long throw. Whether the average person the FIFD card mounted on this
device will detect if you were trying to take it as it the company, but just a few
simple steps for you to disable it. Suddenly the door open sharply as Roller
startled for a moment. The old boss is upset, luck is what computer he turned the
opposite direction, but if elders approached, he would find out he was trying to
reprogram the device FIFD card Broadcasting lost.

But to implement Plan B only, Roller quietly clicks, You just use email activation
system botnet itself, thousands of calls and messages randomly poured and machine
old boss, he felt bad. But nobody told untimely aging appearance anyway. You just
use the email system enabled its own botnet.

Botnets are computers infected with viruses which live on the rest of its life.
When infected with a computer worm or virus, your computer will send a message to a
chat channels on IRC - Internet Relay Chat. A message will notify owners of the
botnet - who have deployed computer worm that - that your computer is ready to
comply with his orders. The botnet is extremely powerful, because they may contain
thousands, even hundreds of thousands of computers, scattered throughout the
Internet, connect to the high speed network and run on high profile home PC.
Normally, the PC operates on behalf of his employer, but the employer botnet called
them, they will rise as zombies to carry out his orders.

IRC botnet illustrates

In fact, you can also see a lot of computers are infected this format, and money to
hire a botnet is not expensive, you simply know how to or not only. If not careful,
your computer may also be one of the "ghost" on the internet.

Roller has used over 10,000 servers, redirect calls and messages at some of the old
factory boss in the 10s. Can see, the phone he was not equipped with the ability to
resist situations like this, needless to say, first is the SMS refill machine
memory, making it began clogging with activities normal as controlling the phone
and record all incoming calls with virtual number (you know that is easy to assume
a figure referred to it? there are about fifty different ways to do this - just
need to type the keyword "spoof caller id" on Google).

Roller stand, hastened to the staff as a caring boss:

Let me solve, sir.

Roller and friends

The old red face kindled ratings, joint hands pounding the phone, it's probably a
great old broken something. Roller and quickly bowed out of the room. You need to
quickly complete the upgrade notes parts for his computer so it must be very strong
and secure enough to serve a long way ahead of his.

One of the most difficult elements this upgrade is a security chip. It is a mod
chip is quite a lot about the structure and how it works, enough to protect the
plant against attack by hackers on the local network. But of course, not everyone
can do. But those who do it, with the information that he had been, he was not
accessible at all. Of course, as mentioned, for those who like this, money is not
the issue they care about ... but the problem always has a solution. Just find
something that people are interested, you can chip in exchange for his machine.

Roller opened the his personal computer, look up some information on the codenamed
as K. Perhaps those who specialize in hardware is much information on the local
network, because they did not anyway sinking too deep into this world. He sent an
email requesting a new chip to K and also a long wait ... I do not work in a cafe,
the lives of those around you real peace, which its 3 day-dreaming her uncle to
wish. If only that fast.
Hovered with thoughts, the reply email from K to.

"I know your uncle! He held secrets. I will talk to each other, the things you need
in exchange for a coin to open the secret station area"

Roller startled for a moment. Why do these people know about the coins in the pile
that pay leave, impossible .... who knew his uncle, and said to the coins.
Fortunately, he took it in to have to switch to a new place, but why does this man
to ask in exchange for it.

He sent back an email (of course, these people are sending mail to their own, prior
to the recipient, it must go through a lot of security methods and encryption,
enough so that no one can gain information and decode) (View over security in Deep
Web mail)

"Who are you ?. Do you have any information about my uncle, please tell me"

A letter from K short answer:

"A friend! These coins will give you answers"

Summarize the story from the beginning to now. Roller, kai, granddaughter moved to
a new city. Roller are hiding under the guise of an ordinary employee. Now he is
looking for some items to upgrade your computer, making it capable of higher
security for the upcoming work. England lack a special chip, and must look to
people codenamed K to grab it. This person requires coin exchange of notes he left,
the coin that Roller had forgotten long ago.

He remembered that the coins did not have anything special, every time I miss home,
or whenever spare time, he often took it observed. So what reason this man in
exchange for it with the security chip.

The question itself around head around Roller, Kai after being moved to the Dr. for
a while came back, the two brothers it was great, the long war has not ended he has
yet to bring two children a real family.

Kai, the coin also has the letter K on its side, while the other contracts with the
letter B, a fellow with the letter G ... Roller as awake, can do these letters is
an abbreviation, is the alias someone, perhaps no coin has the letter K is the
secret of the man. while the B, G does perhaps alluding to his uncle, and someone
in the organization. But the secrets contained in the coins ....

Temporary leave after that, you need the city to prepare dinner for her pay it,
fight the fight must also fill the stomach, the new thinking is. Britain is
preparing to hit the road, the car leapt up behind Kai:

- I need to prepare some appliances street, give me a lift nhé!

Roller Smiling!
.........

They did sauntered over streets crowded market, the influx of people still crowded
and noisy, uncomfortable, but also exciting ... until now, both uncle and nephew
could not stand 1 meter inches up. How many visitors are flocking to the other
discount stores are making a road was jammed.
Suddenly Kai whispered his name !. Left side of the boy with blood, people are
still pushing, apparently someone in the crowd attacked it.

Man named K

What the hell's wrong?

Everyone around seems not to realize Kai attack. The boy was trying to not
collapsed, he motioned for everyone, people jostle line is gradually softened.
Roller check the wound, it is quite heavy, but fortunately not been in a dangerous
position. Roller noticed a shadow as her uncle was watching it when he put Kai up
ambulances.

What the hell's right, why people attack it. He had skipped something ...

Roller continent back his memory, all the access you have to be secured enough to
secure only area 8th floor, I have not been able to that when no chip security,
certainly he had to that ... But why one would go to get his mark anyway. Was, K is
that person. If so, granddaughter were at home alone is facing real danger. Roller
confirm with doctors and hurry back, hope it's okay ...
Lucas Boucher

Potrebbero piacerti anche