American library books » Other » Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕

Read book online «Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕».   Author   -   Ipam



1 ... 4 5 6 7 8 9 10 11 12 ... 33
Go to page:
reptile snake holding her ‘s’ too long. “…this is thereal barbaric classroom, Miss Craft, not play with dollyworld.”

“Yes, ma’am.” Pamela quotes, meekly. Genevaintimidates, quickly her fearful opponents into withdrawing fromthe battle. Pamela sighs then breathes, deeply fromwithdrawing.

Geneva stands, upright & walks, slowly toher desk fiddling with vanilla files and low stack of papers thencalls, loudly. “Exit out, Miss Craft. You’ll be using thiscomputer, here.” Geneva pats, gently thin plastic black frame ofplasma monitor. “Latest model from Uncle Sam, higher RAM with lesscomputing time. Time’s another factor that hackers hog whendefacing web sites. This is our grandest weapon.” She turns, slowly& smiles, wickedly at Pamela. “Sign in, while I retrieveStockton.” Geneva leaves, quickly out door.

Pamela stares, studiously at new sleek blackcomputer plasma screen. ID as exposed password hangs, lifelessly inCyber space. She presses, lightly ENTER. Screen re-boots to gloomypic of dark, damp caves. Pamela observes, studiously the screensaver. Geneva returns with Stockton from potty break as Pamela tapssingle key, reveals, prettily vertically familiar ICONS on standardPC of Word app, Excel app, Point power app, Internet app &colorfully buttons.

Geneva invades Pamela’s space, types, roughlyon keyboard as letters CIA gleams. Pamela comprehends,immediately assignment, lesson and danger that Geneva wants her tohack active traceable legal government website.

Geneva places, gently small paper at Pamela’selbow automatically Pamela’s eyeballs scans, curiously words. Blacknumbers represents active IP address.

Pamela studies, continuously at paper &talks, very carefully. “Ms. Lassater, I don’t understand why youneed me for this difficult assignment. I’m obviously a novice at IPgeneration…”

Geneva stares, seductively at CIA website.“Your binary language skills, of course will be very valuable in afew more minutes.”

Pamela neck snaps to her. “So, is thisanother test of IP address protocols?”

Geneva eye burns screen then smiles, wickedly& talks, softly. “Sorta. Go ahead, use your new skills.”

Pamela types, slowly all correct numbers inwhite box as CIA letters disappear & replace with JAVA computerlanguage controlling the meat of website. “Where do you install the.exe file?” Geneva leans, heavily into screen. Pamela instructs,slowly step by step. “First, I convert to OS.” Screen changes,magical from short sentences to sequences of repeating commandgrouped in sections for EQUATES,CONSTANTS, DATA, EXECUTION BEGINSHERE, EXECUTION TERMINATES HERE, END. “Then, I open NAMEBIT. Seefile status holds 0 = no changes, 1 = changed. I type number 1 forchange.”

Screen blinks into smaller portion of newcategories Wb_Main, Wb_Proc, Wb_Paint along with other Websiteroutines for controlling the site. Pamela points, rudely at symbol,lectures, educationally. “Wb represents website while proc containsmenu message commands.”

“We know that. Do your thing, Pamela?” Genevacommands.

“Alright, I scroll down to Wb_Command.”Pamela explains.

“Ya need to state size and create the filebefore you can execute it, cutie?” Stockton breathes, heavily badgarlic breathe from breakfast burrito into her jaw line as nostrilsinhale sour odor.

Pamela adjusts, brilliantly. “Wb_Create wouldactually notify that…a person…is hacking the system. I by-passpainting any additional bytes utilizing used parameter storage asmy program runs its task.”

“Clever, girl.” Stockton comments.

“Definitely, smart maneuver around security.”Geneva huffs.

“Inside Wb_Command,” Pamela stops,suddenly.

“Go on! Insert your program.” Geneva orders,commandingly.

“I’m reading the command statements for theright position.” Pamela details, fully. “If I pick wrong spot,their program skips over my sub-routine claiming it as falsestatement.

“How long did it take you to figure where toinstall your first app?” Geneva demands.

“Trial and error, mostly.” Pamela comments,giggles, lightly.

“How many times did you fail, Pamela that’sthe correct question.” Stockton adjusts, chuckles, lightly.

“Here, right there.” Pamela points, rudely atscreen. “Between save files and close processes. I type this.”

ENDIF (eax = ME_NEXT)

And…Filestatus, not NAMEBIT,0

Jmp…Wb_Destroy

“Then I create another IF, THEN, ELSEstatement within the Wb_Destory using my assemble file.” Pamelaexecutes, next step.

ELSEIF (eax= ME_DESTROY)

Jmp…Return

“Once you execute and destroy the website, itcan’t return to the beginning of program for restoratation.”Stockton concludes.

“Precisely, Mr. Wingard.” Pamela voicespiccolo octave “A” & smiles, sweetly.

“How many times did you fail, Pamela that’sthe correct question.” Geneva asks.

“None! I work on the fly within real time.When my code aborted, I re-wrote inside IF, THEN, ELSE statementsin binary until it worked, successfully.” Pamela answers.

“You destroyed the hacker’s ISO.” Genevarecognizes, immediately.

“Yeah, isn’t that the point of our job?”Pamela relays, softly. Geneva pats, tenderly Pamela’s collarbone.

“Yes, Pamela, that’s our goal. You’re doing afine job of meeting your goals.”

“Whatever,” Pamela whispers, softly thentalks, loudly turning to Geneva. “Ms. Lassater, my code brings downthe website. This is a stupid lesson. I don’t get it. I didn’tlearn anything in this assignment.”

“Wrong, darling.” Stockton talks, meekly.

Geneva orders, bravely. “There’s a…databasebehind the IP address. I need access to that info.”

“What for?” Pamela eye burns Geneva, ponders,deeply. Screen beeps, loudly as firewall falls, magically intoseries of mathematical 0’s and 1’s running horizontally likemilitary soldiers across top to bottom of plasma.

00010101 10001111 10010101 11101011 1010010011001101

“1, 2,3,4,5,6,7 and 8 bit. Old stuff.”Stockton counts.

“Ancient binary opcodes used by IBM in the1960s.” Pamela talks, shockingly.

“Only stored that way…on purpose to keepyoung babes away.” Stockton voices in tenor trumpet.

“I didn’t catch that meaning?” Pamelaremarks, confusingly.

“Geneva means no trouble for gifted assemblerprogrammer.” Stockton insults, purposefully then snorts, lightly ashe eye burns Geneva.

“No.” Pamela quotes, meekly.

“Go to work! You can translate…” Stocktonorders, commandingly & breathes down her neck muscles as hescans digits.

Pamela dumps, annoyingly. “…into hexi-numericEnglish, that’ll take time. Am I timed on this exercise, Ms.Lassater because it’s close to lunchtime?”

“Scroll down to…” Geneva stares, studiouslypaper coupled into her open palm. “31267 line.” Cobol, Java andAssembly computer language is written in semi-words and typed onnumerical lines. 31,267 is line number within code of thisprogram.

Pamela types command: GO TO 31267. Computerprogram shuffles, magically to line. “Short.” She talks,observantly.

“Convert to English words, Pamela.” Genevaorders, commandingly, eye burning screen. Geneva only likes usingyour first name when she’s deeply contemplating something,differently.

Pamela types, swiftly binary commands. Screentransforms, instantly into words & displays, quickly.

TAG 03299110456 Sl

“Is that it?” Stockton addresses, confusingly& neck snaps to Geneva.

Plasma blinks dark midnight, then brightyellow as translation vanishes from eye sight. Geneva stares,studiously at

1 ... 4 5 6 7 8 9 10 11 12 ... 33
Go to page:

Free e-book: «Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕»   -   read online now on website american library books (americanlibrarybooks.com)

Comments (0)

There are no comments yet. You can be the first!
Add a comment