For the next few months, weekly writing tips will include word choice suggestions. That includes:
- colorful and original descriptions
- pithy words and phrases
- picture nouns and action verbs
- writing that draws a reader in and addicts them to your voice
I keep a collection of descriptions that have pulled me into the books. I’m fascinated how authors can–in just a few words–put me in the middle of their story and make me want to stay there. This one’s on how to describe cybersecurity stuff.
A note: These are for inspiration only. They can’t be copied because they’ve been pulled directly from an author’s copyrighted manuscript (intellectual property is immediately copyrighted when published).
- Crack the encryption
- free web email site thru an anonymizing proxy
- receives its instructions hidden in files on the auction site eBay.com.
- Cell D receives its message via IRC in channel #satanic_verses.
- Each email sent is infected with viruses designed to capture keystrokes and documents and email them back to the cell members
- The phone company’s website is then mirrored
- Data mining is the process of extracting patterns from data.
- A spyware program that would allow him to trace all of P’s internet activities in real time
- “I’ll start a sniffer to identify snoopers and malware.”
- The locator was held in place by strong magnets and could broadcast to a receiver up to a hundred miles away.
- member of cell A gets a job as a receptionist. She manages to set up a reverse VPN through the corporate proxy server using an SSH tunnel to give her associates access to servers
- gained root access
- “wardriving”. Essentially, wardrivers use the wireless signals to ride into a computer network. What many organizations cease to understand is that the wireless signals emanating from their network are not confined to their offices. These signals can easily pass through their office ceilings, walls and floors. As many incidents have shown, an unauthorized user could gain access to a wireless network by simply standing across the street or from an office above or below the organization in the same building. A perfect example is the large retailer Best Buy. Some Best Stores use cash registers with wireless networks that beam data — including credit card numbers — to a central computer elsewhere in the store. But a wardriver can sit in a store’s parking lot and “listen in” to the data. Once alerted to this security breach, Best Buy shut off wireless cash registers at its stores. The practice of “wardriving” is simple: All a hacker needs is a device capable of receiving an 802.11b signal, a device capable of locating itself on a map, and software that will log data from the second when a network is detected by the first. You then move these devices from place to place, letting them do their job. Over time, you build up a database comprised of the network name, signal strength, location, and ip/namespace in use. The network is then open to illicit use.
- delurking: Coming out of online “lurking mode”, usually motivated by an irresistible need to flame about something. “I just had to delurk and add my two cents to that conversation about the Singapore caning.”
- hackers have more words for equipment failures than Yiddish for obnoxious people.
- bipolar belief system two popular attitudes toward the Internet: either the Net changes everything or the Net changes nothing.
- Any sufficiently advanced technology is indistinguishable from magic.
- hackers, trolls (likes fucking with pp, doing pranks), virus carriers
- Gifted hacker, vicious troll, long history of digital breeches and assaults
- *67 to block caller ID
- Hi-tech gizmos
- Tech geek
Click for the complete list of 69 writer’s themed descriptions.
Jacqui Murray is the author of the popular Building a Midshipman, the story of her daughter’s journey from high school to United States Naval Academy, and the thriller, To Hunt a Sub. She is also the author/editor of over a hundred books on integrating tech into education, adjunct professor of technology in education, webmaster for four blogs, an Amazon Vine Voice book reviewer, a columnist for TeachHUB, monthly contributor to Today’s Author and a freelance journalist on tech ed topics. You can find her books at her publisher’s website, Structured Learning.