Dogwalker (story)

Last updated
"Dogwalker"
Short story by Orson Scott Card
CountryUnited States
LanguageEnglish
Genre(s) Science fiction
Publication
Published in Isaac Asimov's Science Fiction Magazine
Publication dateNovember 1989

"Dogwalker" is a cyberpunk novelette by Orson Scott Card. It appeared in Isaac Asimov's Science Fiction Magazine in 1989, and was subsequently included in Card's collection Maps in a Mirror .

Plot

After a childhood accident where he was shot by a stray bullet while sleeping, the narrator of the story undergoes a unique transformation: 60% of his brain is replaced with artificial computer "goo". Consequently, his thyroid glands cease to function, halting his physical development, leaving him trapped in the body of a child. His computerized brain leads to autistic behavior, blurring the line between man and machine. However, it also gifts him with extraordinary hacking abilities, enabling him to crack even the most intricate passwords after a single encounter. Teaming up with a mysterious figure known only as "Dogwalker", he navigates the criminal underworld, leveraging his skills for profit.

Their latest scheme involves infiltrating the home of a wealthy corporate executive by guessing his password. Posing as a dog walker, the narrator gains access and successfully cracks the code. Unfortunately, the executive's paranoia leads to a fatal mistake: always entering an incorrect password before the correct one. When Dogwalker inadvertently uses the correct password on the first attempt, their cover is blown. The narrator is abducted and coerced into surrendering their earnings to secure Dogwalker's release.

Upon Dogwalker's return, it becomes clear that he has undergone a similar transformation, his brain now replaced by the same computer "goo". Despite this, the narrator remains steadfast in caring for his friend and begins plotting revenge against those responsible.


Related Research Articles

<span class="mw-page-title-main">Password</span> Used for user authentication to prove identity or access approval

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

<span class="mw-page-title-main">Brute-force attack</span> Cryptanalytic method for unauthorized users to access data

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search. This approach doesn't depend on intellectual tactics; rather, it relies on making several attempts.

A personal identification number (PIN), or sometimes redundantly a PIN number or PIN code, is a numeric passcode used in the process of authenticating a user accessing a system.

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form. A common approach is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.

The Security Account Manager (SAM) is a database file in Windows XP, Windows Vista, Windows 7, 8.1, 10 and 11 that stores users' passwords. It can be used to authenticate local and remote users. Beginning with Windows 2000 SP4, Active Directory authenticates remote users. SAM uses cryptographic measures to prevent unauthenticated users accessing the system.

<i>Password</i> (American game show) American television game show

Password is an American television game show in which two teams, each composed of a celebrity player and a contestant, attempt to convey mystery words to each other using only single-word clues, in order to win cash prizes.

In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks that use precomputed tables, by vastly growing the size of table needed for a successful attack. It also helps protect passwords that occur multiple times in a database, as a new salt is used for each password instance. Additionally, salting does not place any burden on users.

<span class="mw-page-title-main">One-time password</span> Password that can only be used once

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

<span class="mw-page-title-main">Security token</span> Device used to access electronically restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless keycards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing a transaction such as a wire transfer.

<i>Dragon Ball Z: Budokai 3</i> 2004 video game

Dragon Ball Z: Budokai 3, released as Dragon Ball Z3 in Japan, is a video game based on the popular anime series Dragon Ball Z and was developed by Dimps for the PlayStation 2. The game was published by Atari in North America and Australia, and Bandai in Europe and Japan. It was released on November 16, 2004 in North America through standard release and a Limited Edition release, which included a DVD featuring behind-the-scenes looks on the game's development. Europe soon saw a release on December 3, 2004. In Fall 2005, Europe obtained a new edition which included character models not available in the North American release as well as a few items and the ability to switch the voices over to Japanese. Japan later saw a release from Bandai on February 10, 2005 and also included the extras that the North American release did not have. Soon after, the Greatest Hits version in North America contained the extra features, including the ability to play with the Japanese voices.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such a database of hashed passwords falls into the hands of an attacker, they can use a precomputed rainbow table to recover the plaintext passwords. A common defense against this attack is to compute the hashes using a key derivation function that adds a "salt" to each password before hashing it, with different passwords receiving different salts, which are stored in plain text along with the hash.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Password strength</span> Resistance of a password to being guessed

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.

<i>Terminal Entry</i> 1987 American film

Terminal Entry is a 1987 science fiction film directed by John Kincade, written by Mark Sobel, and starring Patrick Labyorteaux, Paul L. Smith, Edward Albert, Yaphet Kotto, and Kabir Bedi.

<i>Password Plus</i> and <i>Super Password</i> American television game shows

Password Plus and Super Password are American TV game shows that aired separately between 1979 and 1989. Both shows were revivals of Password, which originally ran from 1961 to 1975 in various incarnations. With only subtle differences between them, both Password Plus and Super Password retained the format of play as their predecessor, with two teams of two people each—a celebrity and a contestant—attempting to guess a mystery word using only one-word clues. A new feature included a series of five passwords as clues to an overarching puzzle for the teams to solve.

<span class="mw-page-title-main">Companies Committed to Kids</span> Canadian non-profit organization

Companies Committed to Kids was a Canadian non-profit organization based in Toronto, founded in 1990 by former chief executive officer Sunni Boot and former president of the Global Television Network David Mintz as a contributive production-wide body dedicated to launching campaigns and expressing the significance of their public service announcements to target children between the ages of eight and 12. It produced over 30 announcements, covering topics such as drug abuse, conformity, self-esteem, and bullying. Each PSA ends with the logo of the organization. Usually, the commercials partnered up with Health Canada.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

<i>Smart As...</i> 2012 video game

Smart As... is a puzzle game for the PlayStation Vita. It was developed by Climax Studios and published by the XDev Studio Europe department of Sony Computer Entertainment. The game was released in North America on October 30, 2012, and Europe and Australia on October 31, 2012.

Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.