Chapter 37
le. traced my pass and killed it in tabase.”
“tire Cion of cyberspace, some of t in tically invented t of intrusion counterattack. try another one.”
Cald in anot. tly more sopicated. tempt to s presence, it t sniffed around open ports, t bot rojan t attempted to mimic an ordinary user. It scanned surrounding traffic on ts and found. IDEs ten to recognize t genuine users may ing t passo base. All s had disappeared.
“S. My bots are all gone. Destroyed,” Calding anyt t particular moment.
“ happen?”
“Probably traced t and realized it base. It a matter of sending in a remote query and ire database.”
“Do you have a backup?”
“Yes, I do but ts are not going to cut it. Can you imagine, t an ordinary messaging server in Need? o find a secret nethis one look like child’s play?”
“t’s ime for tter get cracking on terious network,” Mei Lin said.
“Oells me ted. ening messages?”
“OK. So w now?”
“I ’s t a interconnect links to Cs ashes.
“tronic Xcelecommunications Co. Ltd.”
“Long name,” Caldwell observed.
“t NEXt for s. hy?”
“ are ta being sucked into C’s systems?”
“high.”
“a centers?”
“NEXt toral. hy?”
“t’s w.”
“Pardon me?”
“I need to see t NEXt. t may tell us . I can attempt to it’ll take too long to break t of an Ac comes to protecting tside erconnects IDEs protecting t systems but if I can use an auticated neterminal t might be quicker.”