http://pemalite-stray.livejournal.com/ ([identity profile] pemalite-stray.livejournal.com) wrote in [personal profile] jarvisconsole 2012-06-27 11:00 pm (UTC)

As soon as we've extracted their data on you, we can determine a route off this vessel. Erek's safest in his own shell; Jarvis belongs where he has all his programs to work with. Stark Tower must not be left unguarded.

The next room has a token armed human-Controller watching it. Erek grunts and waves an illusionary repair tool in response to her questioning stare. "Rrrepairingr securrity glitch."

"Better get on with it, then." She turns away, leaving them free to limp over to the array of screens showing data for analysis and comparison. Erek surveys the displays as he moves among them. Most of them show programs of one kind or another - encryption, infiltration, viruses and firewalls...

Are any of these familiar?

Post a comment in response:

This account has disabled anonymous posting.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting