exchange information, share displays, and even share memory and storage. Again: assuming you had the right software. It had great marketing, but not so great technology. There was a lot of network-enabled stuff manufacturers didn't want everyone connecting to and possibly hacking. ATM's, payphones, and utility meters suddenly needed special shielding and encryption to protect them from a UIU. The software for connecting to legitimate commercial products never really surfaced. Pretty soon the only people who really used them were hackers. It didn't take long for UIU's to get banned, but not before a black market of the things emerged to supply the technology hungry counter-security culture.
Keypads were smart enough to know that if someone was entering passwords at a rate faster than humans could type, or if the user was entering a lot of bogus codes, then it was probably being hacked. It would then lock itself down and trip the local alarm. Deck had written some software for his UIU to enable it to analyze keypads by searching their memory for valid codes or passwords without actually trying all of the codes. The only drawback was that it took a long time. The keypad's memory would almost certainly be encrypted, and would need to be deciphered before the code could be extracted. This internal encryption would have to be fairly light or else it would slow the device down too much for it to function properly. In theory, his overpowered machine should be able to break it in under half an hour.
Deck took the UIU from his rig and taped it over the surface of the keypad with the duct tape. The surface of the UIU was battered and covered with old tape residue and grime from all of the other devices it had been attached to during its long and useful career.
Deck sat down at his rig, which acted as the interface for the UIU. He fired up KEYPDBRUTE, a program he designed for just this sort of job. However, he didn't want to have to wait for this to finish. The UIU was just insurance, in case he couldn't get the password by other means.
He checked the front desk for a button that would "buzz" employees in. It was an unlikely long shot - since it would negate all the security on the door - but he still had to check. On the underside of the desk he found a small red button, which he assumed was a security alarm. A "buzzer" would most likely be more obvious, and not colored red. Either way, he wasn't about to press it and find out.
On his rig he had stored everything he knew about TriOp, including the employee roster for this office. He brought it up and scanned though the list. He needed someone high enough on the company food chain to have the keypad code, but low enough to be easily intimidated. Anyone in middle management would be a good target. He scanned the list and found the person with the most distant address. He looked up their phone number and dialed using the phone on the reception desk.
"Hello?," came a wary voice. This guy obviously wasn't used to getting phone calls at 10:30pm.
Deck adopted his best arrogant prick voice for this one, "Is this Neil Paulson?"
"Yeah, who is-"
"I'm Richard Holgate, personal assistant to Lawrence Diego," Deck paused for a second to let the name of TriOptimim's CEO to sink in. "I'm trying to collect the copyright documents needed for Mr. Diego's Tokyo trip. That information was supposed to be overnighted to him yesterday. So I'm here at your office looking for it and I notice everyone is gone for the day." He seethed with indignant anger.
"Well I don't -"
"I can get it myself, but you need come in and open the lobby door for me."
"Come in to the office right now?," his voice was nervous and shaken. He didn't want to piss "Richard" off, but he also didn't want to drive an hour just to open a door.
"Richard" sighed to show how patient he was trying to be, "YES. You. Come in. Right Now. How else would you suggest I get in?," Deck hoped he wasn't over-playing it. If he did, the guy
Richard J. Herrnstein, Charles A. Murray