Patricia Cornwell - Cruel and Unusual
Здесь есть возможность читать онлайн «Patricia Cornwell - Cruel and Unusual» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Фантастика и фэнтези, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Cruel and Unusual
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:4 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 80
- 1
- 2
- 3
- 4
- 5
Cruel and Unusual: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cruel and Unusual»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
Cruel and Unusual — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cruel and Unusual», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
The grotesque display of that twenty-seven-Year-old anchorwoman's body was Waddell's special signature. Now a little boy was dead ten years later and someone had signed his work - on the eve of Waddell's execution - the same way.
I made coffee, poured it into a thermos, and carried it into my study. Sitting at my desk, I booted up my computer and dialed into the one downtown. I had yet to see the printout of the search Margaret had conducted for me, though I suspected it was one of the reports in the depressingly large stack of paperwork that had been in my box late Friday afternoon. The output file, however, would still be on the hard disk.
At the UNIX log-in I typed my user name and password and was greeted by the flashing word mail. Margaret, my computer analyst, had sent me a message.
“Check flesh file,” it read “That's really awful,” I muttered, as if Margaret could hear.
Changing to the directory called Chief, where Margaret routinely directed output and copied files I had requested, I brought up the file she had named Flesh.
It was quite large because Margaret had selected from all manners of death and then merged the data with what she had generated from the Trauma Registry. Unsurprisingly, most of the cases the computer had picked up were accidents in which limbs and tissue had been lost in vehicular crashes and misadventures with machines. Four cases were homicides in which the bodies bore bite marks. Two of those victims had been stabbed, the other two strangled. One of the victims was an adult male, two were adult females, and one was a female only six years old. I jotted down case numbers and ICD-9 codes.
Next I began scanning screen after screen of the Trauma Registry's records of victims who had survived long enough to be admitted to a hospital. I expected the information to be a problem, and it was. Hospitals released patient data only after it had been as sterilized and depersonalized as operating rooms. For purposes of confidentiality, names. Social Security numbers, and other identifiers were stripped away. There was no common link as the person traveled through the paperwork labyrinth of rescue squads, emergency rooms, various police departments, and other agencies. The sorry end of the story was that data about a victim might reside in six different agency data bases and never be matched, especially if there had been any entry errors along the way. It was possible, therefore, for me to discover a case that aroused my interest without having much hope of figuring out who the patient was or if he or she had eventually died.
Making a note of Trauma Registry records that might prove interesting, I exited the file. Finally, I ran a list command to see what old data reports, memos, or notes in my directory I could remove to free up space on the hard disk. That was when I spotted a file I did not understand.
The name of it was tty07. It was only sixteen bytes in size and the date and time were December 16, this past Thursday, at 4:26 in the afternoon. The file's contents was one alarming sentence:
I can't find it.
Reaching for the phone, I started to call Margaret at home and then stopped. The directory Chief and its files were secure. Though anyone could change to my directory, unless he logged in with my user name and password, he should not be able to list the files in Chief or read them. Margaret should be the only person besides me who knew my password. If she had gone into my directory, what was it she could not find and who was she saying this to? Margaret wouldn't, I thought, staring intensely at that one brief sentence on the screen.
Yet I was unsure, and I thought of my niece. Perhaps Lucy knew UNDO. I glanced at my watch. It was past eight on a Saturday night and in a way I was going to be heartbroken if I found Lucy at home. She should be out on a date or with friends. She wasn't.
“Hi, Aunt Kay.” She sounded surprised, reminding me that I had not called in a while.
“How's my favorite niece?”
“I'm your only niece. I'm fine.”
“What are you doing at home on a Saturday night?” I asked.
“Finishing a term paper. What are you doing at home on a Saturday night?”
For an instant, I did not know what to say. My seventeen-year-old niece was more adept at putting me in my place than anyone I knew.
“I'm mulling over a computer problem,” I finally said.
“Then you've certainty called the right department,” said Lucy, who was not given to fits of modesty. “Hold on. Let me move these books and stuff out of the way so I can get to my keyboard.”
“It's not a PC problem,” I said. “I don't guess you know anything about the operating system called UNIX, do you?”
'I wouldn't call UNIX an operating system, Aunt Kay. It's like calling it the weather when it's really the environment, which is comprised of the weather and all the elements and the edifices. Are you using A-T an' T?”
“Good God, Lucy. I don't know.”
“Well, what are you running it on?”
“An NCR mini.` “Then it's A-T an' T.”
“I think someone might have broken security,” I said.
“It happens. But what makes you think it?”
“I found a strange file in my directory, Lucy. My directory and its files are secure - you shouldn't be able to read anything unless you have my password.”
“Wrong. If you have root privileges, you're the super user and can do anything you want and read anything you want.”
“My computer analyst is the only super user.”
“That may be true. But there may be a number of users who have root privileges, users you don't even know about that came with the software. We can check that easily, but first tell me about the strange file. What's it called and what's in it?”
“It's called t-t-y-oh-seven and there's a sentence in it that reads: 'I can't find it.'
“I heard keys clicking.
“What are you doing?”
I asked.
“Making notes as we talk. Okay. Let's start with the obvious. A big clue is the file's name, t-t-y-oh-seven. That's a device. In other words, t-t-y-oh-seven is probably somebody's terminal in your office. It's possible it could be a printer, but my guess is that whoever was in your directory decided to send a note to the device called t-t-y-oh-seven. But this person screwed up and instead of sending a note, he created a file.”
“When you write a note, aren't you creating a file?” I puzzled.
“Not if you're just sending keystrokes.”
“How?”
“Easy. Are you in UNIX now?”
“Yes.”
“Type cat redirect t-t-y-q -” “Wait a minute.”
“And don't worry about the slash-dev ' “Lucy, slow down.”
“We're deliberately leaving out the dev directory, which is what I'm betting this person did.”
“What comes after cat?”
“Okay. Cat redirect and the device “
“Please slow down.”
“You should have a four-eighty-six chip in that thing, Aunt Kay. Why's it so slow?”
“It's not the damn chip that's slow!”
“Oh, I'm sorry,” Lucy said sincerely. “I forgot.”
Forgot what? “Back to the problem,” she went on. “I'm assuming you don't have a device called t-t-y-q, by the way. Where are you?”
“I'm still on cat,” I said, frustrated. “Then it's redirect… Damn. That's the caret pointing right?”
“Yes. Now hit return and your cursor will be bumped down to the next line, which is blank. Then you type the message you want echoed to t-t-y-q's screen.”
“See Spot run,” I typed.
“Hit return and then do a control C,” Lucy said. “Now you can do an ls minus one and pipe it to p-g and you'll see your file.”
I simply typed -Is- and caught a flash of something flying by.
“Here's what I think happened,” Lucy resumed. “Someone was in your directory - and we'll get to that in a minute. Maybe they were looking for something in your files and couldn't find whatever it was. So this person sent a message, or tried to, to the device called t-t-y-oh-seven. Only he was in a hurry, and instead of typing cat redirect slash d-e-v slash t-t-y-oh-seven, he left out the dev directory and typed cat redirect t-t-y-oh-seven. So the keystrokes weren't echoed on t-t-y-oh-seven's screen at all. In other words, instead of sending a message to t-t-y-oh-seven, this person unwittingly created a file called t-t-y-oh-seven.”
Читать дальшеИнтервал:
Закладка:
Похожие книги на «Cruel and Unusual»
Представляем Вашему вниманию похожие книги на «Cruel and Unusual» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Cruel and Unusual» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.