The light from the laptop illuminated the small closet the hacker was crouched in.
Glancing at his watch, he shifted to pick up the cable running from the side of his computer.
Under his breath he spoke, “four. three. two. one.”
Quickly plugging the cable into the plug next to him and focused on the screen.
His hands flew across the keys activating several watchdog programs and more active measures to hide his presence on the net.
Nervously he checked the time.
The lockpick program pinged and he refocused on the screen.
:: load //vol3/override-package
:: execute override-package
#SYSTEM OVERRIDE IN PROGRESS
#NETWORK WATCHDOGS OFF
#SECURITY MONITORS OFF
#REMOTE ACCESS CONTROL ////////