Gunner: The Hacker's Code Read online


GUNNER: THE HACKER’S CODE

  An Anathergians Novella

  By Michelle C. Reilly

  COPYRIGHT

  Gunner: The Hacker’s Code

  An Anathergians Novella

  Copyright 2015, Michelle C. Reilly

  Editing by Victoria Miller

  Book design by Michelle C. Reilly

  https://www.michellecreilly.com

  EBooks are not transferable. All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher and/or author, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law.

  This is a work of fiction. Names, characters, businesses, places, events and incidents are either the products of the author’s imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.

  This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite ebook retailer and purchase your own copy. Thank you for respecting the hard work of this author.

  Cover background photo copyright Meinzahn | Dreamstime.com - Fremont Street in Las Vegas, Nevada.

  Books by Michelle C. Reilly (in order)

  VARIANTS, The Anathergians Trilogy, Book 1

  NICO: THE ROGUE WARRIOS, An Anathergians Novella

  WITCHES, The Anathergians Trilogy, Book 2

  GUNNER: THE HACKER’S CODE, An Anathergians Novella

  ROYALS, The Anathergians Trilogy, Book 3

  To those who have struggled, been knocked around, or taken against your will…

  Know that you are thought of. Know that you are cared for. Know that you are loved.

  ACKNOWLEDGEMENTS

  The awesome ladies within my critique group have been a great help and inspiration to me. Rebecca Andrews, Tisha Wilson, Kay Phoenix, and Diane Deeds… You ladies rock!

  Superhero editor Victoria Miller. I just love opening a new document from you and reading your comments. I laugh out loud and embarrass myself, but who cares?

  To Brian and Dave for your tech input.

  To my street team members. There may only be a few of you, but you all make my days that much brighter.

  Justin and Alex. I am in awe of you every single day.

  Table of Contents

  GUNNER: THE HACKER’S CODE

  COPYRIGHT

  ACKNOWLEDGEMENTS

  CHAPTER 1

  CHAPTER 2

  CHAPTER 3

  CHAPTER 4

  CHAPTER 5

  CHAPTER 6

  CHAPTER 7

  CHAPTER 8

  CHAPTER 9

  ABOUT THE AUTHOR

  CHAPTER 1

  The hacker’s fingers flew over the keyboard of the laptop, clicks echoing off the walls of the dark room. The code was ready. Now to access the backdoor. Everything has a backdoor, and Glitchen knew right where to find it.

  Glitchen inserted a USB drive into a slot on the side of the computer and clicked a file on the device. The screen filled with an Internet browser running the Tor program. She eyed the circuits of encrypted connections. They set up relays and hooked up with other Tor systems around the world, making her online movements invisible within its encrypted layers. It was difficult, if almost impossible, to trace anything back to her system. Glitchen entered a website’s URL. Once her system connected with the website, it was visible to the authorities, allowing Glitchen only a few minutes to complete the hack.

  The bank’s website popped up, and the hacker pushed a button on her phone to start a timer. It took a matter of seconds to push the code through the weakness within the website. Glitchen smirked.

  Way too easy.

  Next came the bank account numbers. The balances within the accounts were extreme, and Glitchen’s stomach curdled from the thought of how the bastards made the money. A few more keystrokes transferred the funds to different nonprofits’ accounts for the abused both locally and throughout the world. The final bit of code made the transfers untraceable.

  The bastards will never get their blood money back.

  Glitchen left one clue behind: a name.