[At first Alan thinks the hacker hasn’t gotten the message. There’s no attempt to change strategy, no new measures to hide their program’s tracks. But investigating further, the minute differences he finds are… interesting. Deliberate, even. Piecing together the pattern, that instinct proves correct. The evasive answer gets a slight smile out of Alan. Someone afraid he’ll bring the hammer down on them, then?
He chooses another access point this time. There are no firewalls in place or anything that could potentially detach their program from the system. Just a few layers of encryption to chew on. A low-stakes game. There’s another text file at the end of it.]
Someone interested in system security. Found any vulnerabilities I should know about?
no subject
He chooses another access point this time. There are no firewalls in place or anything that could potentially detach their program from the system. Just a few layers of encryption to chew on. A low-stakes game. There’s another text file at the end of it.]
Someone interested in system security. Found any vulnerabilities I should know about?