Reaching out through the code, he touched to control chip of the
rampaging droids. As expected, someone had tampered with the
programming. Impossable! No one, not even himself, was good enough to
crack the security surrounding his servers. Deal with that later.
Shift focus a hair, find the main power switch, turn it off.
Nine times he reached out and 'manually' disabled the tampered
droidikas. The danger averted, he returned to the factory to inspect
the dammage.
Pulling a rescue disk from a wall safe, he was about to boot the factory
mainframe when he noticed a floppy already in the drive. Carefully he
ejected the floppy pulled it out with tweezers, and dropped it in a
convienent tray. Calling an astromech in, he ordered that the disk be
inspected, including for fingerprints.
An inspection of the drive revealed to dammage, so he inserted the
rescue disk and booted it. As the diagnostics would take awhile to run,
he turned to examine physical evidence. A hollocam recording, every
millimeter was searched. The patch in the AC ducts was rather obvious.
Prying it open, he sent a few seekers to follow the trail. However the
intruders got in would have to be closed off.
Why did he have AC ducts across an open room anyway? They'd have to go.
Meanwhile, he'd have to revise his plans. Taking the town hall would
have to wait while Sith were loose.
------------------------------------------------------------
Later:
The reports were clear. Fingerprints and DNA traces in the ducts
pointed to a certain siths critters. Alice had come back, and would
have to be dealt with for this intrusion. Reprogramming would be almost
too good for her. But first her hole would have to be discovered.
Until then, he ordered the titanium grate that had been cut through with
a torch to allow admission replaced, and both gas and blaster equiped
drones to guard all such grates, and all sensitive areas and passages.
It would take most of his current inventory on seeker drones, but short
of retreating to orbit security would have to be maintained.
-------------------------------------------------------------
Summary:
The Jedi Hacker recovers from the breakin.
--
The Jedi Hacker
"A Jedi uses the code for queries and filters, never for cracks."
http://www.calweb.com/~hanelyp/SW/Chateau_des_Ordinateurs.html