From: | "Brian E. Angliss" <ANGLISS@******.BITNET> |
---|---|
Subject: | What's this? |
Date: | Mon, 12 Sep 1994 14:42:16 -0400 |
the lable read... "To Dante, a truly superb decker, even if you are a real
son-of-a-fraggin-slitch. From your opponent, I.B.A"
Well, thank you, IBA. I'm sure you won't mind if I scan it for viruses and
such, since I am paranoid about Trojan Horse programs and all...
+++++Initiate Analyze, Target: Bow Wrapped Package
+++++Search Parameters? Viral coding, Trace_upon_activation code, Trace_and
+++++Burn code
+++++2 Viral code fragments located
Nice try, IBA. Looks like they would trace me down and fry my optical memory
Well, you'll see what happens to that stuff...
+++++Initiate Exterminator....Virus fragments destroyed
Now, let's open the lovely gift, shall we?
+++++Matrix wise there is a sudden explosion of virtual fireworks and
iconography that takes on very beautiful forms. For the next several minutes,
Dante sits in the node, entranced and laughing over the sheer ingineuity of it
all
Thank you, IBA. I really appreciate this. It is too bad that you failed in
your trace and memory burn, but such is life, ne'st pas?
+++++WARNING! Trace in progress....Tracing....
What? That's impossible....
+++++Activate Trace Destruction Sequence....no trace program in node-Cannot
+++++Target non-existant program
DREK!
+++++Tracing.......Tracing.......
Wait...THE BOX!!!!
+++++Tracing.....Tracing......Tracing.....
+++++Activate Attack, Nightstalker. Target: Gift Box/Trojan Horse
+++++Tracing....Tracing....Traced.
+++++Gift Box Destroyed....Location Traced. WARNING!!! Signature Labled.
+++++Viral coding implanted in MPCP chip...Trace beacon broadcasting...
+++++WARNING!!! Viral code discovered, Burner program has infiltrated...
FRAG!..........*****Link Terminated*****
-- Dant....No further information available...subject Jacked out.
+++++Trace is as follows: Country: UCAS. LTG code: X312. Cross-checking
+++++.....Location as follows: Chicago, the Noose. Precise location within
+++++The Noose: Unknown. Unable to penetrate unknown system's defenses