INKR Logo

Bloody Monday

Bloody Monday • File 48 J's Orders • Page ik-page-1770622
Bloody Monday • File 48 J's Orders • Page ik-page-1770618
Bloody Monday • File 48 J's Orders • Page ik-page-1770621
File 48 J's Orders
This is a locked chapterFile 48 J's Orders
About This Chapter
The chapter opens with a flashback to the events of the previous chapter, in which Hirohito and his men enter the house and find that the Wi-Fi signal is down. The narrator explains that this is because the wireless network has been infected with a Trojan horse, and that the infected devices have been used by the enemy to communicate with each other. The infected devices include the laptops, cordless phones, and even the cell phones, which the narrator uses to hack the connection between the laptops and the wireless devices. He explains that he used his own tools to do so, and he is glad that it worked. He tells the narrator that if the laptops had not been infected, they would have been sunk. He also tells the story of how he found out that the woman was a traitor, and how he has been friends with his father and his company since college. He asks the narrator not to kill the falcon until they establish its location on the e-mail server where the shimuraki file is kept
Jump To Chapters
Close Viewer
INKR Logo

Bloody Monday

Bloody Monday • File 48 J's Orders • Page ik-page-1770622
Bloody Monday • File 48 J's Orders • Page ik-page-1770618
Bloody Monday • File 48 J's Orders • Page ik-page-1770621
File 48 J's Orders
This is a locked chapterFile 48 J's Orders
About This Chapter
The chapter opens with a flashback to the events of the previous chapter, in which Hirohito and his men enter the house and find that the Wi-Fi signal is down. The narrator explains that this is because the wireless network has been infected with a Trojan horse, and that the infected devices have been used by the enemy to communicate with each other. The infected devices include the laptops, cordless phones, and even the cell phones, which the narrator uses to hack the connection between the laptops and the wireless devices. He explains that he used his own tools to do so, and he is glad that it worked. He tells the narrator that if the laptops had not been infected, they would have been sunk. He also tells the story of how he found out that the woman was a traitor, and how he has been friends with his father and his company since college. He asks the narrator not to kill the falcon until they establish its location on the e-mail server where the shimuraki file is kept
Jump To Chapters
Close Viewer