Evan sat in his room with a cold expression as the glow of multiple monitors cast an eerie light across his face.
Once he had returned after hitting the fellow, Evan began preparing a big present for Darpan.
It was time to show Darpan place.
Lines of code scrolled rapidly on one screen while on another, a command and control interface displayed his connection to several compromised computers around the world. His latest acquisition was Darpan's computer, which he had infiltrated using a sophisticated remote access tool he had developed himself.
With a few keystrokes, Evan initiated a connection to Darpan's computer, seamlessly bypassing its firewall defenses. He watched as Darpan's desktop appeared on his screen, the icons and wallpaper familiar yet distant.