. " Wading through the dry and boring guides, Simon spotted a common thread running through the system design. Although each remote site was capable of engaging targets on its own, they all relied on the central processor to identify their targets by asking a second site for confirmation. His goal was to have one of the tributary sites request a confirmation from the central processor on a target that didn't exist. By continually re-requesting this non-existent target he hoped to cause the system. ”“Tomorrow.” Emma sighed theatrically. “That’s ages away.”“Tell me about it.” Jason agreed, unable to keep the happy grin off his face at the fact that his girlfriend seemed to want their first time together to happen as much as he did. “Still want to skip the whole school day?”“Yes.” Emma grinned. “But I’ll find out today if I can.”“Fingers crossed.” Jason grinned back.“Dirty boy.” Emma laughed. “You just want to have your way with me.”“I won’t deny that.” Jason smirked. “But if we are talking. Can you hack into it, yes or no?’ ‘We’re trying sir, we’ve been trying since we first plugged in the machine, nothing works.’ Reynolds hesitated for a second before deciding to take the bait Michelle had given her. ‘Try the password Derek Reynolds’ Game.’ ‘Voice code accepted!’ To the whole room’s astonishment, the computer suddenly came to life the second Reynolds finished speaking. Monitors switched on, processors kicked into life and one by one four video feeds came up on each of the.Read More