Entry tags:
( savrou ) ic contact

// outbox;
→ 10/27; tali'zorah
→ 10/21; marian hawke
→ 09/21; adrien arbuckal
→ 09/21; nathan drake
→ 08/15; marian hawke
→ 08/01; bruce banner
→ 07/11; elena fisher
→ 07/07; trish walker
→ 06/21; adrien arbuckal
→ 06/20; bruce banner
→ 06/20; bucky barnes
→ 06/19; elena fisher
→ 06/15; steve rogers
→ 06/08; bruce banner
→ 10/27; tali'zorah
→ 10/21; marian hawke
→ 09/21; adrien arbuckal
→ 09/21; nathan drake
→ 08/15; marian hawke
→ 08/01; bruce banner
→ 07/11; elena fisher
→ 07/07; trish walker
→ 06/21; adrien arbuckal
→ 06/20; bruce banner
→ 06/20; bucky barnes
→ 06/19; elena fisher
→ 06/15; steve rogers
→ 06/08; bruce banner
You know what to do.

no subject
Being as that does happen to be his specialty, the first thing he does is trace the connections back to their source. The origin ends up being a single MID, newly registered, a fact that gives Alan pause. But something tells him this isn’t Clu’s doing. The sophistication of the hacking program reads “import,” not something that was created in the past few days, which means its creator is almost certainly someone accustomed to being on the user’s side of the screen.
That settled, his approach his more conversational than aggressive. A single, tantalizingly unguarded access point, which terminates in a plain, unencrypted text file.]
Looking for something?
no subject
When he ordered JARVIS to start knocking on doors, he anticipated running afoul of someone or something, because this is a place that has their network tightened well enough that he can't even crack a private text message. It's kind of embarrassing, actually, but impressive from a programming standpoint. Even if it frustrates the hell out of him.
But if they're going to play this game, he decides to have some fun with it. He has JARVIS hit all the same access points, this time leaving a deliberate trail in each log file that might've been difficult to piece together for a programmer less skilled than Alan. But as things stand, it adds up to the following message: ]
I SUPPOSE
THAT
DEPENDS ON
WHOS ASKING
no subject
He chooses another access point this time. There are no firewalls in place or anything that could potentially detach their program from the system. Just a few layers of encryption to chew on. A low-stakes game. There’s another text file at the end of it.]
Someone interested in system security. Found any vulnerabilities I should know about?
no subject
At least it's proving entertaining. ]
AIR TIGHT
[ Then, a second, pointed message: ]
SO FAR
no subject
Good to hear. [Alan can’t take much credit for the network’s security himself. The bulk of its defenses seem to have been put in place well before he ever set foot on the ship.] Can I at least know if I’m speaking with a program or a user? Need to know who I should compliment for the trick with the log file entries. [With the kind of AI Alan’s seen on this ship, it could honestly be either.]
no subject
DID YOU
CONSIDER
BOTH?
[ He and JARVIS are a package deal. ]
no subject
no subject
CANT KNOW
WHAT IM LOOKING FOR
IF I DONT KNOW
WHAT THEYRE HIDING
NOW CAN I
no subject
I’d be interested to know what you find. So long as you look and don’t touch.
[And even then, it might be a good idea to put something in place to at least keep tabs on the mysterious intruder...]
no subject
KEEP YOU POSTED
SHALL I
[ Tony doesn't trust any of this at all, of course, but as with anything framed even somewhat like a challenge, he's all in. It could be fun if nothing else, and if he gives some network security guy somewhere a headache, that's just an added bonus. ]
no subject
You know how to get in touch.
[In the meantime, Alan will start working on something to let him know if the visitor oversteps his bounds.]