• Complain

Melissa Scott - Trouble and Her Friends

Here you can read online Melissa Scott - Trouble and Her Friends full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: New York, year: 1995, publisher: Tor Books, genre: Science fiction. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Melissa Scott Trouble and Her Friends
  • Book:
    Trouble and Her Friends
  • Author:
  • Publisher:
    Tor Books
  • Genre:
  • Year:
    1995
  • City:
    New York
  • ISBN:
    0-812-52213-3
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Trouble and Her Friends: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Trouble and Her Friends" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Less than a hundred years from now, the forces of law and order crack down on the world of the computer nets. The hip, noir adventurers who get by on wit, bravado, and drugs, and haunt the virtual worlds of the Shadows of cyberspace, are up against the encroachments of civilization. Its time to adapt or die. India Carless, alias Trouble, got out ahead of the feds and settled down to run a small network for an artists co-op. Now someone has taken her name and begun to use it for criminal hacking. So Trouble returns. Once the fastest gun on the electronic frontier, she had tried to retire-but has been called out for one last fight. And its a killer.

Melissa Scott: author's other books


Who wrote Trouble and Her Friends? Find out the surname, the name of the author of the book and a list of all author's works by series.

Trouble and Her Friends — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Trouble and Her Friends" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Melissa Scott

TROUBLE AND HER FRIENDS

For LAB

CONSEQUENCES

Timothy Learys dead.

No, no, no, no, hes outside

Looking in

Ray Thomas,Legend of a Mind

Chapter One

TROUBLE WAS GONE. Cerise had known it from the moment she entered the strangely neat apartment, the inevitable clutterdisks, books and papers, here a sweater, there a pair of shoesall missing along with Trouble. She went through the two rooms in the greyed light of the winter afternoon, checked the single closet and the battered trunks that held the rest of their clothes, not looking at the computers until the last, already sure of what she would find. Half the system was gone, Troubles half, the portable holo-multex drive and the brainbox and the braid of cables and biojacks that carried signals to the implanted processors in their brains. There was no paper note.

A light was flashing on the media console, and she touched the code keys to retrieve the single message. The voice that broke from the speaker was familiar, but not TroubleCarlie, babbling on about something she couldnt be bothered to hear right nowand she killed the message, not bothering to save it for later. She turned away from the wall of blank screens and cubbies filled with data decks and players, the ugly oyster-grey carpet squeaking underfoot, and looked around the little room as though she was seeing it for the first time. Outside the single window, the sun was setting beyond the buildings on the far side of the little park, throwing a last cold light across the the grey stone and concrete. A reflection like a spark flared from the highest side windows of the Lomaro Building half a mile awaythree-quarters of a kilometer, she corrected automaticallyand faded as she stared. The sun dropped into a bank of dirty cloud, and the light went out as though someone had flicked a switch. On the horizon, beyond the five-and six-story buildings of the local neighborhood, neon flickered to life, running like lightning along the edges of the buildings. She shivered, and reached overhead into the web of invisible control beams that crisscrossed the apartment, waved her hand twice to bring on the main lights. A yellow light flashed on the display by the door instead, warning her that she hadnt replaced the main battery. She swore under her breaththat had been Troubles choreand went to the panel herself, switched lights and heat to full and touched the button that brought the opaque screen down over the window. It was sheer indulgence, this system, costing at least two months rent to install, but once the securityblack security, black-market and blackest-night effective, run off an illegal direct-line power taphad been in place, it had seemed a shame not to install the convenience systems as well. She remembered Trouble balancing on an uneven chair beside the door, drill-driver in hand, bolting the last of the extra control boxes into place. That had been their indulgence for a job well done, right before the hearings began, three months before David Terrel was actually convicted of armed robbery because of a particularly brutal icebreaker he carried in his toolkit. The last good times, she thought, feeling at the moment only the cold, and turned back to the dismantled machines.

Seeing the system broken, the empty spaces where Troubles machines had been, made her shiver again, something like fear or rage or sorrow threatening to break through the numbness, but she shoved the feelings down again, and went back into the bedroom for the things she needed to repair the gaps. She had spares of everything that Trouble had taken, machines she had used before shed met Trouble, and she hauled their cases out from under the bed, brushing dust from the lids. The wind moaned through the rungs of the fire escape that slanted down past the bedroom window; she glanced at it, hearing loose bolts rattle on the landing one story above, and went back into the outer room.

It didnt take long to rebuild the system. Trouble had worked with her usual precision, taking nothing that wasnt hers, leaving the backup disks stacked prominently in front of the dusty keyboard. There was a hollyblock there, too, holographic storage, and Cerise moved it impatiently aside to plug her own holodrive into the multiple sockets. She replaced Troubles dedicated brainbox with her ownan older model, but still serviceable, still fast enough to let her run the nets without dangerand found a length of cable to reconnect the various components. She looked at the hollyblock, but did not pick it up, turned instead to the rarely used keyboard and began methodically to recreate her machine.

The screen lit and windowed as she worked, giving her a schematic view of the reconstructed system; she touched keys, reestablishing virtual links that had been broken when the physical links were removed, and watched the schematic shift, rotating in the uppermost window to show her the new links outlined in red. A string of text asked for confirmation. She gave it the code it wanted, and watched as the red lines slowly turned to yellow and then to green, blending in with the rest of the design. When she was sure it was complete, she dismissed that image, and sorted through the directories until she found her private mailbox. It took two keys to open it, one a nameshe made a mental note to change thatthe other a meaningless string of letters, but she found nothing new in the lists of files. That was as shed expected, and she closed the program, reaching instead for the hollyblock. If Trouble had left her anything, any explanation, it would be there.

She fitted the box carefully into the replacement multex drive, and touched the keys that initiated the test sequence. Everything came back green, and she pressed a second set of keys to access the drive. A dozen files, each indicated by an individual symbol, an icon, bloomed on her screen. She frowned thenshe had expected more, some message, some more useful labels, somethingbut touched the first icon. The file blossomed in front of her, filling the screen with a peculiar half-squashed, half-stretched image that she recognized at once as the two-dimensional representation of a three-dimensional network fileof their network map, she realized suddenly, of the map she and Trouble had painstakingly built over the four years of their partnership. It was one of their more useful tools: there were no commercial maps availablenot covering all the netsand the ones that did exist were deliberately flawed, deliberately distorted to hide the control areas from people who had no business having access. And there were plenty of corporate spaces, privately owned systems that nonetheless also existed in the unreal space of the myriad networked computers that was the nets; all of those preferred to be invisible, at least to an outside eye.

On the net itself, of course, things were different. Once you plugged yourself into the systemeither via the implanted dollie-box and dollie-slot, the direct-on-line-image processor system, which gave a text-speech-and-symbol interface, or through the full-sense brainworm, with its molecular wires running directly into the brain that let you experience virtuality as though it were realit was easy enough to find your way around the nets. There were signposts, vivid neon images, and the swirling rivers and lines of light that were the virtual reflection of the data itself, which anyone whod been on the nets for any length of time could read like a tracker read spoor. But the map was useful for planning a job, when you had to enter the nets from the safest point, so that the security programs, watchdogs and trackers and callback systems, and all the panoply of IC(E)Intrusion Countermeasures (Electronic)would either lose your trail in the confusion of conflicting data or never have the chance to track you down. Remotely, Cerise was surprised that Trouble had taken the copy with her, though she supposed it was possible that Trouble had made two copies out of the network files, their own secure space. But then, Trouble had said it was time to give up cracking.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Trouble and Her Friends»

Look at similar books to Trouble and Her Friends. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Trouble and Her Friends»

Discussion, reviews of the book Trouble and Her Friends and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.