Daze in the Valley
Caution: This Drama Sex Story contains strong sexual content, including Ma/Fa, Fa/Fa, Mult, Consensual, Lesbian, BiSexual, Heterosexual, Humor, Safe Sex, Oral Sex, Anal Sex, Masturbation, Sex Toys, Size, Slow,
Desc: Drama Sex Story: Chapter 91 - Adam Walters is a 19-year-old farm boy going to college in the big city. Reeling from the deaths of his parents and struggling with the financial hardship those deaths bring, he takes the advice of a friend and enters the porn world. With the aid of his pals - and some exceptional young women - Adam helps to transform a business known for wicked excess and questionable integrity into a stable, profitable enterprise. Note: Codes represent only physical acts between main characters
Adam had just handed the phone off to a surprised Karlie when Allie, Mary, Rachelle, Leslie, Erin, Walt and Sean came in.
"Look what we picked up in the parking lot!" Rachelle said, putting an arm around Leslie's shoulders. "Can we keep her?"
"She's not housebroken," Rebecca replied. "We'll have to keep her in the yard."
"Hey!" Leslie giggled.
Adam looked at the computer equipment that Walt and Sean carried.
"I'll explain in a minute," Mary said. "It's good Leslie is here because I think it affects her, too."
Karlie closed the phone with a smile.
"Betsy Hamilton just told me how great she thought my scene was," she said. "She mentioned me in the same sentence as Ashley Malibu and Sahara Rain as far as performances go. She sounded really nice."
"She seemed that way to me, too," Adam replied. "In fact, I told her the next time we all plan a get-together, we'll call her. Maybe she can come out and get to know everyone."
"Too cool," Sean said, shaking his head. "Now all we need to hook is Cami Heart."
Leslie made a face which everyone noticed.
"I don't think you'll like her much," Leslie said. "At least I didn't like her when I worked with her. She is really crass."
"We like Mary," Walt said, earning a glare from Mary who was too busy hooking up network cables to smack him properly.
"Mary is a funny crass," Leslie said. "But underneath she's sweet. Cami is a nasty crass and I got the impression that she is that way inside, too. Plus she is really big into the party scene. She brings a bunch of people to every shoot and they basically make asses of themselves. It was a different group each time I saw her but they acted the same. I think they are all people she clubs with and she brings them along to show how big a star she is. If I have a vote, I would say you might consider working with her but I wouldn't seek to be friends with her."
"You have a vote," Adam said firmly, "and I won't work with anyone I wouldn't invite to hang out with my friends."
"I don't know Cami," Rebecca said. "But I trust Leslie's opinion. I think you might be better served to develop new talents into recognizable stars – like Jenny appears to be on her way to – than to try to shoehorn someone incompatible into this group of friends."
"Well said," Sean remarked. "I was only thinking of something Rachelle told me earlier. The five top-grossing new starlets last year according to one source were Cassie Charms, Cami Heart, Betsy Hamilton, Rita Looker and Ashley Malibu. I figure the list will be different this year because of the problems you and Leslie encountered but the name recognition won't fade. You can add Sarah to the list – because she is going to really be massive by the fall."
"Are you saying I'm big, you bastard?" Sarah said, pretending to glare at Sean.
"Only your tits," Sean countered with a laugh.
"Oh, OK then," Sarah replied. "It's good of you to notice. Carry on."
The group chuckled at the byplay and by the time the laughter subsided, Mary was set up.
"Rebecca, I don't mean to be a downer, but I have some things you need to see," Mary said.
The group heard the gravity in Mary's voice and all settled in around the computers. Mary had configured the computers to play on the flat-screen TV so everyone could see it.
"I don't want you to be angry at me but if you're going to be, I hope we can get it out of the way at the beginning," Mary said. "I hacked into your site this morning. It took me about two minutes."
Rebecca's eyes narrowed and she didn't speak. She simply nodded for Mary to continue. Mary took a deep breath and pointed to a second Macintosh Mini on the table.
"That holds a clone of your site as it existed at 5:45 this morning," she said. "I tell you that because what I'm going to show you might cause your site to crash and take all your data with it. That computer is not hooked up to any network and will not be affected. The other Mini is also a clone of your site from the same time. My initial goal was to simply check your security measures. I didn't hack you maliciously or with the intent to cause damage to your site or to your reputation. Before we continue, I would suggest you take your site off-line for the next 45 minutes or so. After you see what I have to show you, you can decide if it needs to be for longer."
Mary gestured to Allie's personal laptop which was already pointed to Rita Looker's web page. Rebecca frowned but moved over, logged in and took the site down – posting a message to her customers saying it was undergoing routine site maintenance and would be up again soon. She then took a seat in the center of the group.
"OK, again, I apologize and I hope you don't think I did this to try to gain your business or anything," Mary said. "Now, here is what I did."
She explained how she went to Rita's site the traditional way, by typing in the address and looking at the home page. When she saw some of the information, she tried something else.
"You have a deal with Eden's Pleasure," Mary said. "If a person buys a certain amount of their products, they get a three-day pass to a limited portion of your site. Is that right?"
Rebecca nodded again but still didn't speak.
"I have never purchased a single item from Eden's Pleasure," Mary continued. "In fact, until this morning, I didn't even know it existed."
Mary opened a program on the dock. She was put off by Rebecca's silence but this was too important to simply walk away from.
"This is an open-source program readily available on the web at no cost to its user," she continued. "It's called a Spoof program. Watch what happens when I type in your web site as the target and Eden's Pleasure as the referrer."
The group watched as the computer bypassed the homepage and went straight to a section of paid content.
"How did you do that?" Leslie asked.
"The same way about a half a million others could if they wanted," Mary answered. "I bypassed her protocols. I'm not the only one who can do this and I'm not the only one who does do this. When I arrived at this site this morning, there were about three dozen other Spoofers in there with me. I booted them and that was bad enough but this is worse. Whoever set up your site left a backdoor. If I had to guess, it was intentional. Are you aware of it?"
Rebecca shook her head and stared at the screen. Mary closed the browser and opened the Spoof program again. This time, she added a slash and three letters at the end of the target site. When she hit the OK button, the screen showed a series of folders on the screen. For the first time, Rebecca spoke.
"Those are my content folders!" she said angrily. "How in the fuck did you get to my data documents?"
"Through the backdoor," Mary said consolingly. "It's the first place any halfway decent hacker will look. Did you know the source code for your entire site is stored in this same area?"
"Hell no!" Rebecca said loudly. "Look, I know enough HTML to do my own postings and to change the looks of things. I'm not a God-damned programmer. I know what the area looks like and I know my original images and movies are stored in folders there. I can add folders and links, but I don't know anything about the actual composition of the site."
Mary nodded her head and gave Rebecca a mollifying look.
"You paid someone to set up your site like almost everyone does," she said. "Let me explain a little bit before I get too far in. When you click a link on a site, the link goes to one of these folders. If it is an image or an HTML document or a video download, it all comes from one of these folders. The link is the pathway the computer takes to get to these folders. Rita Looker's site was set up to give limited read-only access to a few of these folders without a password if the user comes from a specific place. Her main site is set up to give the user read-only access to more of the folders with a common username and password. Read-only means the content cannot be altered or deleted. Users can copy things from the folder but they can't change or remove anything inside the folder."
The group nodded their heads collectively.
"What Rebecca didn't know was that her source code – the nuts and bolts and every piece of information about her site is stored in the same area," Mary continued. She believed everyone was on the same page. "Those folders are generally only accessible with an administrative password which allows users to alter or change things on the site and to add or delete content. It is accepted security protocol to keep the source file information in a separate section. You'll see why in a moment."
Mary sighed deeply again and turned to the computer keyboard.
"I went into your source code," she admitted. "I can understand if you're angry at me. I wanted to see how many users you usually get and how many members you have on your site. There is a data file that will tell me that. When you learn what I found, you'll be less unhappy with me and more unhappy with whoever programmed your site."
She pulled out an index card and handed it to Rebecca.
"How did you get this?" Rebecca asked when she looked at the card. It contained her personal administrative password.
"The same way I got these two," Mary answered. She handed over another card with two lines written on it. "Whoever programmed your site set up a generic password for access. It's not unusual but what is unusual is that they didn't go back through and delete it once you put in your password. Some site owners leave an intentional backdoor. They either forget their administrative password or they might need to access their server from somewhere else. So they'll leave 'admin:admin' as their set up. Others might use 'asdf" or 'qwerty.' Your problem isn't with 'admin:admin'; it is with the second one. I tried to remove it and it wouldn't let me. It is set up as a 'super admin' and it will take some extra measures to keep it from having full access to your site. Just to let you know, even your personal password is not set up as a 'super admin.'"
"Damn it," Rebecca said, anger evident in her voice. "Can you tell me when it was set up?"
Mary nodded and opened a folder. A list of thousands of usernames and passwords appeared on the screen. Mary sorted them by access and three names popped to the top.
"Your password was created on your 18th birthday," Mary said. "I went to the adult database to confirm this."
Rebecca returned to the nodding routine.
"The generic password was created in 2004 and I assume it came with your original non-nude site which was altered when you turned 18 two years ago," Mary said. "The other was created in January of this year."
"When I split with Patrick," Rebecca replied harshly. "I'm sure it's his. When we split, I watched him sit down and remove his administrative access. I should have known he would have another way to get in there. Damn it. I wish I could prove it."
"I can call some folks if you want me to," Mary said. "What he did is illegal if you own the site and specifically denied him access. I know you said he is still under contract as your webmaster until July so what he is doing with the password might be legal. What he is doing with your content is not."
"What is he doing with my content?" Rebecca said, standing to her full height with her hands on her hips.
"He is setting up landmines and tripwires," Mary said. She went on to explain what those terms meant. Someone was using an administrative password to overwrite picture, video and document files with different ones that included something malicious.
"So far, I've found Trojan horses, a few key counters and numerous viruses," Mary said. "I'm only through about a quarter of the folders. There are duplicates of every folder on your server. I checked the links at random and it doesn't appear the new folders are in use. But they can be linked in only a few seconds. These folders have been created and modified in the past four months."
Rebecca was nodding her understanding but she stopped abruptly.
"Four months?" she asked.
"Starting in November of last year," Mary confirmed. "The first folder created was a duplicate of your video folder. I found some very interesting things in there, mostly low-level threats that might slip past a user's security software but which can really cause problems. As near as I can tell – and I'll have to spend a lot more time on it before I can give you a complete answer – none of the infected items has ever been downloaded. And about the only way they could have been accessed is by someone – like me, I guess – who had no business in there in the first place."
Rebecca waved her hand dismissively. She had come to understand that Mary meant no harm and even if she had, what she found out was more harmful than anything she left behind.
"The reason we're using clones of your site instead of accessing the original is because of what else I've found," Mary continued. Her already grave face became even darker. "Rebecca, what was your plan when you reopened your site?"
"What do you mean?" Rebecca asked.
"Did you plan to use this set up and server or did you plan to move somewhere else?" Mary clarified.