After the hacking, we – meaning my father – get the website up and running again. I ask about checking the log files on the site (I parlez a little technologese), and he says, I’ve got a better idea.
Sometimes, he says, war calls for land mines.
I have no clue what he’s talking about, but I picture myself romping around circuitry like that kid in Home Alone, and that seems like more fun than I’ve been having lately, so count me in.
He explains: Whoever hacked the site will probably be back. When they come back, we’ll be waiting. Or rather, the software will. It’s a two-way connection – they connect to our machines, we connect to theirs.
This isn’t making a lot of sense to me. I don’t want to, say, load a virus on his computer. Who cares? The Departed – if it was him – doesn’t care about anything. It’s not even his machine, he’s probably using his company machine. If it’s him. And if it is him on his company machine, hacking a website run by his ex-wife in order to harass her, I’m willing to wager that his employer would be very interested in knowing that.
Me too, says my father. But it’s much easier and probably more effective if we let our server tell them.
And so I wait.