Stephen Coonts - Combat

Здесь есть возможность читать онлайн «Stephen Coonts - Combat» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: New York, Год выпуска: 2011, ISBN: 2011, Издательство: Tom Doherty Associates, Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Combat: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Combat»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

As the world moves into the next millennium, the United States finds itself at the forefront of this new age, policing not only its own shores but the rest of the world as well. And spearheading this overwatch are the men and women of America's armed forces, the "troops on the wall," who will go anywhere, anytime, and do whatever it takes to protect not only our nation but the rest of the free world.
Now, for the first time,
brings the best military-fiction authors together to reveal how war will be fought in the twenty-first century. From the down and dirty "ground-pounders" of the U.S. Armored Cavalry to the new frontiers of warfare, including outer space and the Internet, ten authors whose novels define the military-fiction genre have written all-new short stories about the men and women willing to put their lives on the line for freedom:
Larry Bond takes us into the wild frontier of space warfare, where American soldiers fight a dangerous zero-gee battle with a tenacious enemy that threatens every free nation on Earth.
Dale Brown lets us inside a world that few people see, that of a military promotion board, and shows us how the fate of an EB-52 Megafortress pilot's career can depend on a man he's never met, even as the pilot takes on the newest threat to American forces in the Persian Gulf-a Russian stealth bomber.
James Cobb finds a lone U.S. Armored Cavalry scout unit that is the only military force standing between a defenseless African nation and an aggressive Algerian recon division.
Stephen Coonts tells of the unlikely partnership between an ex-Marine sniper and a female military pilot who team up to kill the terrorists who murdered her parents. But, out in the Libyan desert, all is not as it seems, and these two must use their skills just to stay alive.
Harold W. Coyle reports in from the front lines of the information war, where cyberpunks are recruited by the U.S. Army to combat the growing swarm of hackers and their shadowy masters who orchestrate their brand of online terrorism around the world.
David Hagberg brings us another Kirk McGarvey adventure, in which the C.I.A. director becomes entangled in the rising tensions between China and Taiwan. When a revolutionary leader is rescued from a Chinese prison, the Chinese government pushes the United States to the brink of war, and McGarvey has to make a choice with the fate of the world hanging in the balance.
Dean Ing reveals a scenario that could have been torn right from today's headlines. In Oakland, a private investigator teams up with a bounty hunter and F.B.I. agent to find a missing marine engineer. What they uncover is the shadow of terrorism looming over America and a conspiracy that threatens thousands of innocent lives.
Ralph Peters takes us to the war-torn Balkan states, where a U.S. Army observer sent to keep an eye on the civil war is taken on a guided tour of the country at gunpoint. Captured by the very people he is there to monitor, he learns just how far people will go for their idea of freedom.
R.J. Pineiro takes us to the far reaches of space, where a lone terrorist holds the world hostage from a nuclear missle-equipped platform. To stop him, a pilot agrees to a suicidal flight into the path of an orbital laser with enough power to incinerate her space shuttle.
Barrett Tillman takes us to the skies with a group of retired fighter jocks brought back for one last mission-battling enemy jets over the skies of sunny California.

Combat — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Combat», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

The box representing each of these web servers was initially blue, the same color this particular specialist had chosen for the monitor’s desktop. When a server was being contacted the box went from blue to yellow. Once the connection was made, it would turn red on both the pathfinder’s monitor and the big screen on the wall. Only in the Spook Booth, where the nontechnicals watched, did the screen displaying the servers the hack was being routed through show up as an actual map. “Nontechnicals” was a catchall term applied to visitors to the Keep like the rep from the National Security Council and people who were not as computer savvy as the Cyberknights or their support team. When the Pit was being set up it had been decided that it would be far easier for these people to understand what was going on if they saw a map rather than the simplistic wiring diagram used by the pathfinder.

When a civilian web surfer goes out into cyberspace, he usually has a destination in mind but little concern over how he gets there. He simply instructs the web navigational program on his computer to take him to a Web address. This program does several things. It translates the user’s message into a protocol that will allow the user’s machine to interact with all the servers on the Web as well as the system at the destination site. This internet protocol, or IP, creates header information which includes both originating and destination addresses as well as the message or any additional information the sender has included. Once sent, this data is broken down into packets of data which then bounce about the World Wide Web looking for a server that is both available and capable of taking the message along to its destination. When the connection is made between the user who initiated the communications and the site he was looking for, the data packets are reformatted into a computer language that the receiver, or the system can understand. If the data is a simple e-mail message, the traffic is deposited in the memory of the computer to which it was sent or the service provider if a connection to the final destination is not open at that moment. If the sender has a desire to communicate in real time with someone on the other end, or access and manipulate information stored there, the connection between the two systems remains open until one party or the other terminates it.

Since he wanted to hit specific servers in a fixed sequence, the pathfinder had to organize the address portion of the packets so that they followed a specific route. If a selected server had no open ports, progress along the Web stopped until access was gained. Once in a server, the address for that server was stripped away, revealing the pathfinder’s instructions to send the routing message along to the next server.

The assembled Pit team sat in silence as they watched the pathfinder’s display on the big screen. Bobby Sung, a patient soul, could be as dispassionate as the computer that sat before him. Eric Bergeron, on the other hand, was unable to contain the nervous energy that was gnawing away at him. With nothing better to do with his hands, he tapped the table with a pencil. While there might have been some sort of rhythm in the Cyberknight’s head driving this subconscious response, his hand did a poor job of translating it into anything resembling melody. Instead of music, the female interpreter seated next to him heard disjointed thumps that only served to heighten her own jitters. Without a word, she reached over and snatched the pencil out of Eric’s hand. Offended by her action, Eric turned and stared at her. The interpreter met his indignant glare with an expression that all but said, “Go ahead, make my day.”

In the midst of this nonverbal exchange, the pathfinder broke the silence. “Okay, boys and girls, we’re in.” After giving the interpreter one more spiteful glance, Eric turned his attention back to the big screen.

By the time he had refocused his attention to the progression of the attack, Bobby Sung was already at work. As the electronic-warfare knight for this operation, it was his task to break through the security systems that protected the host computer macnife worked from. Since the system they were breaking into was based on an American design, and both the network-level firewalls and the application-gateway firewalls had not been modified by macnife’s sponsors, this task was relatively easy. For the first time that day, Bobby Sung betrayed the excitement he felt by humming “The Ride of the Walküre” while his fingers flew across the keyboard before him.

* * *

In the Spook Booth, the CIA agent chuckled when he heard Wagner’s oft-played piece. “Sounds like your people have been spending too much time watching old war movies.”

Kevin Shrewsbery looked over at the visitor from Langley. “I’d rather that than have them use the training we give them here to empty my bank accounts.”

While the CIA man stared at the Army colonel, the FBI liaison chuckled. “You’ve got that right.”

* * *

Back in the Pit, Bobby Sung was finishing his tasks. “Righto, mate,” he called out to Eric Bergeron, “we be in business.”

Taking a deep breath, Eric studied his screen. “Let’s see now,” he mumbled. Bobby Sung, using an old technique, had managed to enter an open port in the host computer macnife worked from by sending a message using an address that macnife’s system was familiar with. Once past the security gateways, the body of the message was not checked by the security programs, since it followed the address of a trusted user. That body consisted of a sequence of commands, written in the computer language used by the system under attack, that established a new root account.

Neither the nation that had provided the computers nor macnife’s native country altered the basic programming language, making it easy for Eric to pull up the directory of the host computer and get to work. The first phase of the attack involved the downloading of a Trojan horse. While there are several variations to this sort of attack, the one Eric introduced to macnife’s host computer involved that system’s Internet protocol instructions.

Rather than destroy a single computer which could easily be replaced, the NSA had convinced the members of the National Security Council that it could nullify the effectiveness of future attacks by keeping track of where the dark knights from that country were going in cyberspace. Their solution was to modify the header portion of the Internet protocol instructions currently on macnife’s host computer so that every time macnife and his compatriots connected with the internet, the NSA would be alerted. The Trojan horse in this case did nothing other than send the NSA an info copy of everything that was sent out onto the Web. With that information in hand, the NSA would be able to warn any site that was the target of an attack as well as gather information on who this particular nation was working with.

Methodically Eric made his way into the operating system of macnife’s host computer. With root access, this was rather simple. What was not going to be easy was the substitution of codes. To do that Eric would have to operate on the old code. That could create a momentary interruption in service, much in the same way that a surgeon performing open-heart surgery must stop the heart in order to work on it. Everyone using macnife’s host computer that was connected to the Internet would experience a momentary delay of service. If this interruption became pronounced, the system administrator would, quite naturally, assume that there was a problem either with his connections or his system. Either way, he would become active and begin an aggressive effort to resolve the problem while ignoring the phone calls from angry users.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Combat»

Представляем Вашему вниманию похожие книги на «Combat» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Владимир Колышкин - Combat
Владимир Колышкин
Владимир Колышкин - Combat (СИ)
Владимир Колышкин
Stephen Coonts - Pirate Alley
Stephen Coonts
Stephen Coonts - The Disciple
Stephen Coonts
Stephen Coonts - Arctic Gold
Stephen Coonts
Don Pendleton - Fatal Combat
Don Pendleton
Elle James - Hot Combat
Elle James
Don Pendleton - Combat Machines
Don Pendleton
Отзывы о книге «Combat»

Обсуждение, отзывы о книге «Combat» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x