Twenty years ago…
When they first meet, Jamie is not impressed. But as they work together, her opinion does an about-face and they’re both having trouble keeping their eyes and hands off one another each other.
Yet neither of them know who the other really is.
Mike is the first to figure it out—but by the time he does, Jamie is running for her life.
Janet Stead grew up in Ontario’s cottage country. She attended McMaster University, where she studied languages and philosophy. After her degree, she travelled through Europe and was an au pair in France for six months. It was while living there that Janet cultivated her love of languages. France was also where she had her first experience with computers, and she decided to attend college to study computer programming upon her return. After graduating, Janet started up her own corporate software training company, which she still manages today.
Janet, along with her husband Dan, is a long-time Rotary Club member, where they enjoy both the fellowship and service to others in their own community and all over the world.
A peak into BREACH...
Here are a few pages to get you started.
Jamie’s fingers danced across the keyboard as she coded her way past Wayboard’s firewall. Once inside the company’s mainframe, she dove deep below the directory structure into the kernel of the operating system. She saw all the standard traps and coding trip wires in place to catch hackers. Mediocre hackers. Jamie is not mediocre. Known in the dark internet simply as RK04, she is a ghost that flits from system to system—a shadow that no one sees. In a world
where 99.9% of the players are male, she enjoys both the anonymity and pride of being a major player without the misogynistic bullshit.
She was exploring with no real purpose in mind. Sometimes it was just fun to get in—because she could. She leaned over to blow on the fresh pink polish drying on her toenails and gave them a wiggle.
After a bite of the half-eaten peppermint patty, left in its wrapper from the day before, she tapped a key, exited one module and was about to enter another when she paused. What was that? The statements in the opening sub-routine of that last module were wrong. So wrong, they were weird.
Jamie hit the key sequence to return to the module she had exited, scrolled down a screen—and there it was. Someone had coded the wrong data type for the opening array. Really basic shit. Who gets paid to do this?
shit, someone was in there with her.
Jamie coded a little deeper to hide herself from view but kept a window open to monitor any other changes being made.
An apostrophe appeared at the start of the next line—someone was about to leave a comment. Probably to remind themselves of the change.
The characters ( | ) suddenly appeared. A hacker’s idea of a bare ass. She was being mooned! What the? She quickly keyed out of the module. Taking only a moment to come up with a plan, her fingers flew over the keyboard, taking her deep into the kernel of the operating system. She was going back into the module through a back door. It was gone.
There was no way this was IT security tidying up some loose ends—this was another hacker.
To continue reading Breach, please click link below.
GET IN TOUCH