27

JOHN
Will this be enough?

SARAH
It had better be. Hopefully more than enough. It's better to be safe than terminated.

EXT./ INT. HOUSE -- DRIVEWAY -- LATE AFTERNOON

The Terminator and T- 2000 pull in front of a house in the Eagle Rock District of L.A.

T-2000 KICKS

the front door off of the hinges. The Terminator follows.

IN THE BEDROOM

the Terminator searches. He sees a computer. The Terminator turns it on. From the file names we see it belongs to Dave. T-2000 walks in while the computer shows a program for a commercial online service. A window with a picture of Earth appears then morphs into PHREAKNET.NET. The program asks for a password under Dave's name.

TERMINATOR
Primitive password protection.

He types in a password. The computer bleeps and a soft male voice speaks from the computer:

COMPUTER
I'm sorry, Dave. I can't do that.

T-2000
Sure you can.

The T-2000 morphs her hand into a plug interface and jacks it into the back of the PC. She uses a decrypting program to access the Online services password files. The access codes, and Internet nodes are mapped out in her POV.

GATEWAY 867.5.30.9 ACCESSED -- FIREWALL OVERRIDE

UNIX ROOT ACCOUNT ESTABLISHED -- PASSWORD FILE OPEN.

Dave's Online account is opened into a an ordinary text window. The Terminator uses the mouse to choose the "List of E-mail Addresses" menu. We see an E-mail address -- Savior@phreaknet.net. This address shows the most E-mail replies from Dave's account.

[PREVIOUS PAGE][NEXT PAGE]

© 1999 - Daniel Perez