American library books » Other » Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕

Read book online «Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕».   Author   -   Ipam



1 ... 3 4 5 6 7 8 9 10 11 ... 33
Go to page:
to lots of different medicalphysicians around Birmingham. Their only child isn’t getting marredwith marriage, babies, or bitches.

One high school chick claims pregnancy lateafternoon in English Lit class at school before the word, “baby” isout her mouth, Preston has her feet in O.B. stirrups in doctor’soffice. Chick lies, honestly.

Present day.

“I…” Pamela confesses, softly.

“You’re precious to me, Pamela.” Prestonkisses her forehead, nose, cheekbone, lips, neckline thenbeyond…

“I’m a virgin.”

“I’m a teacher.”

“I’m nervous, Preston.”

“I’m going to hold your wrists, here.” Hekisses, tenderly her wrists. She gasps, lightly. “You’re in goodcare. Just believe me, Pamela.”

Pamela whispers, softly, closes eyelids. “Ido, Preston.” He kisses, tenderly lips.

Thursday. 7:01am. Two weeks later.

Preston feels, differently about Pamela. Heloves, preciously her scent, sweet smile & sexy legs. She’s theone, girl of his past, present & future dreams and desires. Hesmiles, slightly studying her sleeping profile as Marilyn’s altosings from clock.

“Alarm, Preston.” Pamela whispers, softly,open eyelids, grins, toothy, tilts, angularly skull at Preston.

“Few more minutes.” Preston leans, heavily onelbows viewing her beautiful body.

“I must get dressed for work, Preston.” Sheuprights on elbows viewing his handsome features.

“Few more minutes.” He rolls, completely onher body, not moving. Pamela giggles, lightly.

“Preston?” “Yes.” He chuckles, lightly in herear.

“I need to get up and get dressed.”

“You should work for me then, we can betogether 24/7.”

“Conflict of interest, master.”

“I was almost your boss.”

“My…boss?”

“Offered to head Cyber Crimes side along withFBI but suggested it separated. I can’t stand that bitch.”

“Geneva.”

“Just told ya…that bitch.” Preston whispers.Pamela giggles.

“You’re not a nice guy.”

“…not to them bitches, snitches orsnakes.”

“I presume I do not fall into one of yourspecific riddling categories.”

“You’re babes, beauties and…mine.” He kissessoft lips, tenderly.

“You’re so sweet.”

“Only to you, princess.” He kisses lips.

“I must agree…then dress.”

Preston orders, smiles, wickedly. “I give mypermission…” She tries, unsuccessfully to pull away. He raiseseyebrow, left. “…only if you promise to return.”

“I promise, Prince Preston.”

“Good forth, Princess Pamela.”

Time: 9:01 am. Federal Building. Level 11.Division of Cyber Crimes. Partly cloudy. 85*F. Geneva cries,loudly & points, rudely unpolished & rouge finger nail atscreen. “See that marker of IP address in England then flips backto New York then floats over to Canada and finally drifts back toanother new city. All emails, GPS locates, money wires, cell callscan be tracked and traced back to the original input IP addresswith all sources leading to the single hacker or group ofhackers.”

“Hacker interplayed Internet apps, mobilephones and US bank accounts to commit his crime.” Pamela sums,brilliantly. She gets it. For two weeks, two hours per day, Pamelastudies, traces, tracks, searches, checks, shows, changes, andhides Internet Protocol (IP) addresses including location, ISP,hostname, type, proxy direction, email tracking, speed testing& blacklist status detailed by country, state, region, city,town, village including Latitude and Longitude. She cansuccessfully do this in her sleep. Pamela frowns, ugly, reads,slowly. “Enable IPv4 address conflict detection…”

Stockton explains. “IP address conflicthappens when two computers are battling for the same space.”

Pamela questions. “But in real world ofnetworking or wireless, Internet requires an address to possess aunique identifier to function properly for transferring data orelse, that would mean only one traffic flow would end up thatunique address. What happens to other data?”

Stockton pitches. “Major disruption oftransferred monies/data/information causing conflicting conditionswithin the address therefore, the computer shoots the other set ofdata out into Cyber space…forever.”

“Does the source recover the data?” Pamelabats.

“ARP or probe address resolution protocolsends new signal back to conflicting host clearly identifyingstoppage of assigned IP address.” Stockton punts.

“If the conflicting host doesn’t complaintwith commands?” Geneva scores.

“Host tattles to IP Master, problem solved inshort-term order.” Pamela concludes.

“But there’s also a catch-22.” Stocktonthreats, smiles, slightly.

“What catch-22?” Pamela frowns, funny,inquires, mysteriously.

Stockton kicks. “ARP probe packets arestrings to control the IP address manually within the DHCP.”

“Don’t tell her that, Stockton. I trainingretrievers, not hackers.” Geneva warns, warmingly, grins,toothy.

“Tell me what, I don’t understand?” Pamelainsists.

“To assist in eliminated the conflict of twohosts, with one address, a good programmer can override the IPaddress to his/her network by manual entering the IP address, thensimply rebooting the server, PC, laptop or even cell phone.”Stockton tattles.

Geneva lectures. “IP address conflicts arealmost always configuration mistakes by database administrators topride to show fear and too worried about losing their jobs. Theychange it manually by-passing our passwords and securityprotocols.”

“Technically, it’s a software bug so databaseadmin has an excuse to fix it within minutes, right?” Pamelaquestions.

“Network administrator or another userbrilliant in programming, two DHCP servers on same network or longaddress lease time with hosts lacking battery-based clock keepingtrack of time when powered down or maybe suspended sleeping mode.The most rarest DHCP scenario is an excluded range with static IPwithin a DHCP-controlled subnet.” Stockton informs.

“Excluded range within DHCP-controlledsubnet, that’s kinda like stalling the computer mainframe to hackinto the system while...” Pamela dumps, incompletely.

“Exactly, Pamela. She’s smart.” Geneva nods,once, compliments, greatly.

“She’s chatty.” Stockton smiles, adds,curtly.

“Then the hacker might could in theory createa new IP address and create chaos, conflict and control of alltransferred datum from single host.” Pamela concludes, firmly.Geneva nods, once. “Holy cow! That’s…that’s wrong….” She finishes,swiftly.

“…and illegal if you happen to get caught.”Stockton reminds, boldly.

“Don’t fret, Pamela. Networking and wirelesssystem error event logs possess backtrack switches detailing alloccurrences of newly created IP addresses along with associatedconflicts from original devices and portals.” Geneva addresses.

“Not…” Pamela stops, suddenly talking thenponders, heavily. “Not if multiple IP addresses are involved.That’s a scary thought.”

Geneva concludes, scary. “This hacker usedten IP addresses communicating offensives of stolen data, moniesand personally IDs. Let me emphasize, one and the same person didthis over and over again stealing valuable tangible and intangiblematerials…until he/she was caught by us, of course.” She slams,hardy back of leather chair ending her speech.

“I didn’t learn these kinds of brutal tacticsin my computer class.” Pamela shakes, sideways black skull thenfrowns, ugly at screen & whines, baby-tonish.

Geneva remarks, pointedly. “Becausssse…” Shesounds like a

1 ... 3 4 5 6 7 8 9 10 11 ... 33
Go to page:

Free e-book: «Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕»   -   read online now on website american library books (americanlibrarybooks.com)

Comments (0)

There are no comments yet. You can be the first!
Add a comment