Dogwalker (story)

Last updated
"Dogwalker"
Short story by Orson Scott Card
CountryUnited States
LanguageEnglish
Genre(s) Science fiction
Publication
Published in Isaac Asimov's Science Fiction Magazine
Publication dateNovember 1989

"Dogwalker" is a cyberpunk novelette by Orson Scott Card. It appeared in Isaac Asimov's Science Fiction Magazine in 1989, and was subsequently included in Card's collection Maps in a Mirror .

Plot

After a childhood accident where he was shot by a stray bullet while sleeping, the narrator of the story undergoes a unique transformation: 60% of his brain is replaced with artificial computer "goo". Consequently, his thyroid glands cease to function, halting his physical development, leaving him trapped in the body of a child. His computerized brain leads to autistic behavior, blurring the line between man and machine. However, it also gifts him with extraordinary hacking abilities, enabling him to crack even the most intricate passwords after a single encounter. Teaming up with a mysterious figure known only as "Dogwalker", he navigates the criminal underworld, leveraging his skills for profit.

Their latest scheme involves infiltrating the computer of a wealthy government official by guessing his password. Posing as a baby sitter, the narrator gains access to the official's private life, using this insight to successfully crack the code. Unfortunately, the official's paranoia leads to a fatal mistake: always entering an incorrect password before the correct one. When the team inadvertently uses the correct password on the first attempt, their cover is blown. The narrator gives himself up to organized crime in order to secure Dogwalker's release.

Upon Dogwalker's return, it becomes clear that the criminal group made an example out of him, subjecting him to a transformation similar to the narrator's, but with his brain entirely replaced by the same computer "goo.". Despite this, the narrator remains steadfast in caring for his friend and begins plotting revenge against those responsible.


Related Research Articles

<span class="mw-page-title-main">Password</span> Text used for user authentication to prove identity

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search. This approach doesn't depend on intellectual tactics; rather, it relies on making several attempts.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

<span class="mw-page-title-main">Passphrase</span> Sequence of words used to gain access

A passphrase is a sequence of words or other text used to control access to a computer system, program or data. It is similar to a password in usage, but a passphrase is generally longer for added security. Passphrases are often used to control both access to, and the operation of, cryptographic programs and systems, especially those that derive an encryption key from a passphrase. The origin of the term is by analogy with password. The modern concept of passphrases is believed to have been invented by Sigmund N. Porter in 1982.

A personal identification number is a numeric passcode used in the process of authenticating a user accessing a system.

In cryptanalysis and computer security, password cracking is the process of guessing passwords protecting a computer system. A common approach is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.

The Security Account Manager (SAM) is a database file in Windows NT, Windows 2000, Windows XP, Windows Vista, Windows 7, 8.1, 10 and 11 that stores users' passwords. It can be used to authenticate local and remote users. Beginning with Windows 2000 SP4, Active Directory authenticates remote users. SAM uses cryptographic measures to prevent unauthenticated users accessing the system.

<i>Password</i> (American game show) American television game show

Password is an American television game show. Two teams, each composed of a celebrity and contestant, attempt to convey mystery words to each other using only single-word clues, in order to win cash prizes.

<span class="mw-page-title-main">Security token</span> Device used to gain access to restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.

<i>Think Fast</i> (1989 game show) 1989 American TV series or program

Think Fast is an American children's game show which aired on Nickelodeon from May 1, 1989, to March 30, 1990, with reruns airing weekly until June 29, 1991.

A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such a database of hashed passwords falls into the hands of attackers, they can use a precomputed rainbow table to recover the plaintext passwords. A common defense against this attack is to compute the hashes using a key derivation function that adds a "salt" to each password before hashing it, with different passwords receiving different salts, which are stored in plain text along with the hash.

A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Password strength</span> Resistance of a password to being guessed

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.

One Night Genius is the first Thailand reality quiz show, on Thai TV Channel 3. First broadcasting on July 3, 2006. Present by Phanya Nirunkul and Tankhun Jitissara. Production by Workpoint Entertainment Public Company Limited. In every week, 8 competitors from 8 branches of professions have competed in the contest for the 1 million baht prize and the place where the contest is held have been changed every week.

<i>Password Plus</i> and <i>Super Password</i> American television game shows

Password Plus and Super Password are American TV game shows that aired separately between 1979 and 1989. Both shows were revivals of Password, which originally ran from 1961 to 1975 in various incarnations. With only subtle differences between them, both Password Plus and Super Password retained the format of play as their predecessor, with two teams of two people each—a celebrity and a contestant—attempting to guess a mystery word using only one-word clues. A new feature included a series of five passwords as clues to an overarching puzzle for the teams to solve.

"Time Considered as a Helix of Semi-Precious Stones" is a science fiction short story by American writer Samuel R. Delany, published in the December 1968 issue of New Worlds. It won the Hugo Award for Best Short Story 1970, and the Nebula Award for Best Novelette in 1969.

"The Leonardo" is a short story written in Russian by Vladimir Nabokov in Berlin in the summer of 1933. It was first published as Korolyyok in Posledniye Novosti in Paris the same year, and in 1956 as part of the collection Vesna v Fialte. After its translation into English by the author and his son Dmitri Nabokov it was incorporated into the collection A Russian Beauty and Other Stories and published in 1971.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

<i>Smart As...</i> 2012 video game

Smart As... is a 2012 edutainment puzzle video game developed by Climax Studios and published by Sony Computer Entertainment for the PlayStation Vita. It is similar in style to Nintendo's Brain Age series.

<span class="mw-page-title-main">Passwordless authentication</span> Identity authentication method

Passwordless authentication is an authentication method in which a user can log in to a computer system without entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.