home

<img src="c3p2.gif"><br> <img src="a5c3p2.jpg" align=bottom width=51 height=25 hspace=30><a href="c3p1.html"><img src="../images/prevpage-1.jpg" align=bottom width=49 height=37></a><a href="c3p3.html"><img src="../images/nextpage-1.jpg" alt="next page" align=bottom border=0 width=49 height=37></a>

Roger quickly composed himself and got to work on the system logs from the past 48 hours. Once he was alone, Roger sent Spike a message. Spike found a monitor and showed Roger the firewall trace as he talked. "Something's not right. There's no trace of the break-in. Nothing! As far as I'm concerned that's impossible. Whoever hacked in, didn't hack in! They already knew this system cold." Roger paused then added, "I wonder if that's why Bailey was so nervous? Her access code is one of the few that's allowed access this deep into the operating system."