Once they were seated in the conference room at the newest location of the Dteam offices, Zara began a whiteboard session to illustrate the needed code from Jacob.
Daria explained, “Okay, I’m under contract to provide software to a security device to make sure it doesn’t get tampered with.” She drew four blocks surrounding a fifth block. Pointing to the center block she continued, “This one is already done, but my last coder indicated that it was vulnerable to attacks or spoofing hits. He recommended that before this core code does anything, it check with these daughter processes to see if the request is legitimate or is bogus to the running program. Basically, the program needs to test the authenticity of the program request. I want that security algorithm to run in a separate program that can only be accessed by either the main program or the admin so it can be updated. I need the code to fill in this security box. Can you do that?”
Jacob studied the whiteboard drawing and asked, “Any reason why the original programmer isn’t working on these other boxes as well?”
Zara stared coldly at Jacob for a few seconds then commented, “Yes, because he is dead. Are you interested?”
Jacob, somewhat surprised at her bluntness, was taken aback and responded, “Can I see the main program to see how it consumes the responses it will require from the security program? At the very least I would require the Application Program Instruction set of calls you are using, so I know how and what values to return.”
Zara quietly responded, “I can’t show you the main program, but I will give you the APIs you will use to interact with the main program. The main program is classified because it is to go into a commercially available appliance for monitoring businesses during and after regular hours. A lot of high end institutions are interested in this product, and I have to be able to tell them that no one but I have all the component knowledge. This, in itself, is another security mechanism.
“Once I see how you perform on this task, we can discuss the other blobs of code I need written. Each module blob is worth $1,000 U.S. dollars and a bonus, upon delivery of the entire program and our remittance paid. Are you capable of such a task?”
Jacob studied the board a little and remarked, “I’m sorry about your other programmer. I didn’t mean to pry. As for your offer, with the API set I can have something for you by the end of the week.”
Zara looked at Jacob in astonishment and asked, “You do know, of course, that today is Thursday, right?”
Jacob chuckled slightly and responded, “Sorry, I meant I can have something for you by Friday then. This Friday.”
Daria grinned at his impudence and stated, “Okay, then see you tomorrow, Jacob the confident coder!” She pitched him a USB drive and clarified, “The API libraries are on the drive. See you before noon then?”
Jacob smiled knowingly and agreed, “Very likely, madam.”
“Good. If you provide this as fast as you promise, then I may have some other upcoming work that I am to get details on over the next few days.”
Click Follow to receive emails when this author adds content on Bublish