Rod’s Blog • 39 implied HN points • 12 Dec 23
- The hacker in the story had a personal connection to one of the characters, making the situation more intense and personal.
- Using Kusto Query Language (KQL), the characters tried to analyze the hacker's network traffic and database activity to uncover clues about the hacker's identity and location.
- Despite challenges in decoding the hacker's data, the characters discovered a message from the hacker in the database logs, prompting them to solve a mysterious puzzle involving numbers.