Computer Networking and Cybersecurity A Guide to Understanding Communications Systems Internet Connections and Network Security Along with Protection from Hacking and Cyber Security Threats 1st edition by Quinn Kiser 1952559790‎ 978-1952559792 download
Computer Networking and Cybersecurity A Guide to Understanding Communications Systems Internet Connections and Network Security Along with Protection from Hacking and Cyber Security Threats 1st edition by Quinn Kiser 1952559790‎ 978-1952559792 download
https://ebookball.com/product/networking-for-beginners-simple-
guide-to-study-basic-advanced-computer-network-hardware-wireless-
and-cabling-lte-internet-and-cyber-security-1st-edition-by-jack-
mathew-1712954016-978-1712954010-20034/
https://ebookball.com/product/computer-hacking-a-beginners-guide-
to-computer-hacking-how-to-hack-internet-skills-hacking-
techniques-and-more-1st-edition-by-joe-benton-
isbn-b00w0s29n6-15696/
https://ebookball.com/product/hacking-beginner-to-expert-guide-
to-computer-hacking-basic-security-and-penetration-testing-1st-
edition-by-james-patterson-15708/
Cybercrime and Information Technology Theory and Practice The Computer
Network Infrastructure and Computer Security Cybersecurity Laws
Internet of Things IoT and Mobile Devices 1st edition by Alex
Alexandrou 9781000426922 1000426920
https://ebookball.com/product/cybercrime-and-information-
technology-theory-and-practice-the-computer-network-
infrastructure-and-computer-security-cybersecurity-laws-internet-
of-things-iot-and-mobile-devices-1st-edition-by-alex-ale/
https://ebookball.com/product/essential-computer-security-
everyone-s-guide-to-email-internet-and-wireless-security-1st-
edition-by-bradley-isbn-1597491144-9781597491143-16930/
https://ebookball.com/product/introduction-to-80-86-assembly-
language-and-computer-architecture-1st-edition-by-detmer-
isbn-0763717738-9780763717735-12404/
https://ebookball.com/product/hacking-beginner-to-expert-guide-
to-computer-basic-security-and-penetration-testing-1st-edition-
by-james-patterson-15720/
https://ebookball.com/product/cyber-security-for-beginners-a-
comprehensive-and-essential-guide-for-every-novice-to-understand-
and-master-cybersecurity-1st-edition-by-liam-
smith-b09s22hw9n-20054/
Computer Networking and
Cybersecurity
A Guide to Understanding
Communications Systems, Internet
Connections, and Network Security Along
with Protection from Hacking and Cyber
Security Threats
© Copyright 2020
All Rights Reserved. No part of this book may be reproduced in any form without permission in writing from
the author. Reviewers may quote brief passages in reviews.
Disclaimer: No part of this publication may be reproduced or transmitted in any form or by any means,
mechanical or electronic, including photocopying or recording, or by any information storage and retrieval
system, or transmitted by email without permission in writing from the publisher.
While all attempts have been made to verify the information provided in this publication, neither the author
nor the publisher assumes any responsibility for errors, omissions or contrary interpretations of the subject
matter herein.
This book is for entertainment purposes only. The views expressed are those of the author alone, and
should not be taken as expert instruction or commands. The reader is responsible for his or her own actions.
Adherence to all applicable laws and regulations, including international, federal, state and local laws
governing professional licensing, business practices, advertising and all other aspects of doing business in the
US, Canada, UK or any other jurisdiction is the sole responsibility of the purchaser or reader.
Neither the author nor the publisher assumes any responsibility or liability whatsoever on the behalf of the
purchaser or reader of these materials. Any perceived slight of any individual or organization is purely
unintentional.
Contents
PART 1: COMPUTER NETWORKING
INTRODUCTION
CHAPTER 1: COMPUTER NETWORKING BASICS
What is Modern Computer Networking?
CHAPTER 2: NETWORKING SERVICES EXPLAINED
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Network News Transfer Protocol (NNTP)
Simple Mail Transfer Protocol (SMTP)
Keeping the Networks Safe with Firewalls
CHAPTER 3: GETTING INTO THE NETWORKING HARDWARE
FUNDAMENTALS OF COMPUTER RELATIONSHIPS
Core Hardware Elements of a Network
Servers
Hubs, Switches, and Routers
Cabling and Cable Plants
Workstation Hardware
Utilizing the Network Traffic and Knowing the Network Hardware
Repeaters
Hubs (Concentrators)
Switches
Bridges
Routers
Gateways
The Core Fundamentals of Cable Topologies
Star Topology
Ring Topology
CHAPTER 4: WIRELESS COMMUNICATION SYSTEMS AND CONNECTING TO THE
INTERNET
Connecting to the Internet
Wide Area Networks
Internet and Intranet
Understanding the Features of Networking
File Sharing
Printer Sharing
Application Services
E-mail
Remote Access
CHAPTER 5: COMMON NETWORK PROTOCOLS AND PORTS
TCP/IP and UDP
Domain Name System (DNS), allowing users to access websites with easy-to-
remember domain names instead of long numerical IP addresses.
Dynamic Host Configuration Protocol (DHCP), for assigning TCP/IP
addresses to the nodes in a network.
Hypertext Transfer Protocol (HTTP), which controls the transfer of data
between the client and the webserver.
File Transfer Protocol (FTP), which defines the method by which file data is
sent and received between the FTP client and the FTP server.
Network News Transfer Protocol (NNTP), specifically used for Usenet
discussion groups on the Internet.
Simple Mail Transfer Protocol (SMTP), which handles the sending and
receiving of e-mails from one e-mail server to another.
CHAPTER 6: LEARNING ABOUT THE OSI NETWORKING MODEL
Layer 1: The Physical Layer
Layer 2: Data-Link Layer
Layer 3: Network Layer
Layer 4: Transport Layer
Layer 5: Session Layer
Layer 6: Presentation Layer
Layer 7: Application Layer
CHAPTER 7: NETWORK SECURITY, CYBERSECURITY, AND HACKING METHODS
Account Security
Password Security
File and Directory Permissions
Practices and User Education
Understanding External Threats
Front-Door Threats
Back-Door Threats
DDoS Threats
Potential Attacks and Threats
Basics to Hacking and Network Design
The Process of Designing a Network
Assessing Network Needs
Applications
Users
Network Services
Meeting the Network Needs
The Basics of Hacking: The Kill Chain Process
Phase 1: Reconnaissance
Phase 2: Intrusion
Phase 3: Exploitation
Phase 4: Privilege Escalation
Phase 5: Lateral Movement
Phase 6: Obfuscation
Phase 7: Denial of Service
Phase 8: Exfiltration
CHAPTER 8: USEFUL CYBERSECURITY TIPS FOR 2020
Vital Function of a Disaster Recovery Plan
Assessing Disaster Recovery Needs
Considering Disaster Scenarios
Assessing Backup Needs
Acquiring Backup Media and Technologies
Choosing Backup Strategies
CONCLUSION
PART 2: CYBERSECURITY
INTRODUCTION
CHAPTER ONE: CYBERSECURITY AND WHY IT’S IMPORTANT
What is Cybersecurity?
Why is Cybersecurity Important?
Cybersecurity Scenarios
Cybersecurity Terminology
History of Cyberattacks
CHAPTER TWO: CYBERATTACKS AND 10 TYPES OF CYBER HACKERS
Classification of Cybercrimes
Reasons for Cybercrimes
Types of Cyber Hackers
Common Tools Used by Hackers
Types of Cybercrime
CHAPTER THREE: RECOGNIZING AND COUNTERING A PHISHING ATTACK
What is Phishing?
Methods used for Phishing
Common Ways to Tackle Phishing Attacks
Types of Phishing and How to Protect Yourself against Them
Identifying a Phishing Email
Identifying a Spoofed Email
CHAPTER FOUR: HOW TO IDENTIFY AND REMOVE MALWARE
Types of Malware
Protecting Yourself from Malware
CHAPTER FIVE: RECOVERING FROM RANSOMWARE
Defining Ransomware
Types of Ransomware
CHAPTER SIX: HOW TO SPOT AND STOP A SOCIAL ENGINEERING ATTACK
Social Engineering Methodologies
Spotting a Social Engineering Attack
How to Avoid Falling for Social Engineering
Tips
Look out for Banking Scams
CHAPTER SEVEN: NETWORK SECURITY AND PROTECTION TECHNIQUES
Network Security
How Does the Network Security Function?
Top Five Attacks Through a Network that can Affect Your Business
Protecting your Business from a Cyber Attack
Cybersecurity through Configurations and Settings
Some Tips to Maintain Cybersecurity
CHAPTER EIGHT: WEB APPLICATION AND SMARTPHONE SECURITY
Web Application Security
How Can You Secure Web Applications?
CHAPTER NINE: 9 SECURITY TESTING METHODS
Types of Security Testing
Types of Penetration Testing
CHAPTER TEN: SKILLS REQUIRED FOR A CAREER IN CYBERSECURITY
Entry-Level Roles
Senior Level Roles
Four Popular Careers in Cybersecurity and How to Get There
Required Skillset for a Career in Cybersecurity
Technical Skills
CONCLUSION
REFERENCES
Part 1: Computer Networking
An All-in-One Beginner's Guide to
Understanding Communications Systems,
Network Security, Internet Connections,
Cybersecurity and Hacking
Introduction
This book is a concoction of several computer topics that are
relevant and popular in the modern age. Throughout this book, the
reader will explore each topic with easy-to-understand terminology
and analogies. The book starts with a descriptive and comprehensive
insight into computer networking and then branches off to cover
network security, network designing, and hacking. The delivery of
topics is specifically designed to:
Displayed text
Graphical images
Formatting commands
Usenet groups are not all public. Those groups that are public get
the news echoed by other Usenet servers, but the private ones are
generally hosted by some organization or institution. Private Usenet
groups require users to authenticate themselves with proper
usernames and passwords.
The phenomenon of Usenet is made possible only by the NNTP
protocol. This protocol establishes a connection between the Usenet
server and the Usenet reader. The protocol also handles message
formatting. This makes it possible for the messages to be text-based
or carry binary attachments. Messages with binary attachments are
encoded through MIME, or Multipurpose Internet Message Encoding
(the same encoder used for e-mail attachments).
Simple Mail Transfer Protocol (SMTP)
The Simple Mail Transfer Protocol handles the sending and receiving
of e-mails from one e-mail server to another. The SMTP protocol is
simply a way to communicate with the sending and receiving
systems of e-mail servers.
The SMTP protocol comes into play when the system sending the
e-mail message connects to the receiving system through port 25.
Once the connection between the two systems has been established,
the sender then transmits a 'HELO ’ command along with its
respective address towards the receiving system. Once this
command has been acknowledged, and the receiver responds with
its own address, then communication is initiated. The sender can
then issue a command indicating it wants to send a message, by
specifying the intended recipient of the message. Once the receiving
system gets this request, it looks for the recipient. If the recipient is
known to the system, then the request is acknowledged, and the
sending system then forwards the message, along with any
attachments, to the recipient. Once the receiving system has
acknowledged that the entire message has been received, it
terminates the connection.
Keeping the Networks Safe with Firewalls
Most people reading this book would have come across the Windows
firewall prompt at least once. This firewall application running on
your machine is what keeps the network security policies upheld.
Firewalls are hardware devices that protect a network by enforcing
the network’s security policies. In most networks, a firewall is
installed into the router itself, leveraging its micro-processing chip
and built-in memory. This is true with networks designed and
installed in small offices or similar scenarios. However, for large
networks, the networking equipment includes dedicated hardware
running the firewall. This hardware can be a single unit or multiple
pieces.
Normally, a separate computer running the firewall software is
designated for the network. Otherwise, there can be a firewall
device with a computer chip within it. Generally, a firewall acts as an
outpost stationed between a LAN and the Internet. Regarding the
firewalls available for use, there are mainly two types:
1.
Network-Based Firewall: This firewall operates at the
third layer, also known as the data-link layer, of the OSI
networking model. The security technique used by a
network-based firewall is primarily ‘packet filtering.’ Using
this technique, the firewall is programmed with a defined set
of rules. Whenever data packets travel between the two
networks, the firewall analyzes and compares this packet
against the rules and then decides whether the packet
should be allowed to arrive or depart from the network or
not. The permission or denial of passage according to the
packet-filtering rules for the data packets is usually based on
their destination address, source address, or the TCP/IP
port.
2.
Application Based Firewall: This firewall serves the role
of a proxy. The word ‘proxy’ in this context means that the
firewall represents the user’s interactive session with the
server of which services are requested. An application-based
firewall allows no data traffic to pass through the two
networks directly. Instead, the communication between the
two networks will be handled on one side by the firewall, as
a proxy. This is why an application-based firewall is also
known as a ‘proxy firewall.’ The technique used by a proxy
firewall is ‘NAT,’ also known as ‘Network Address Translation.’
In this technique, the main idea is to conceal the network
addresses of the internal network so it is not directly visible
to the external network. In an application-based model, the
firewall is responsible for the transmission of data to the
network addresses for which the connections are
established.
Chapter 3: Getting into the
Networking Hardware
Fundamentals of Computer
Relationships
The term ‘computer relationship’ refers to how a computer interacts
with another computer connected on a network. There are generally
two types of computer relationship.
1.
Peer to Peer
2.
Client/server
Last but not least, the router . By now, we have given adequate
attention to the details of how a router works and functions. We now
know that the primary job of a router in a computer network is to
route the data packets effectively through one network on to the
next. A router can also be a bridge that offers a path of flow for the
data packets between two connected networks. These two networks
establish a connection to the router by using their respective types
of wiring and connection.
Let’s understand this better through an example. Consider a
router in a network that establishes a connection between a 10Base-
T network and an ISDN telephone line. In this scenario, the router is
dealing with two network connections, one from/to the 10Base-T
network and the other from/to the ISDN telephone line. The job of
the router will be to create a proper route for the data packets to
travel between these two network connections.
Besides these defined network connections, the router can also
have another terminal connection. The purpose of this secondary
connection would be to program and maintain the router itself.
Repeaters
A hardware device used in a network to lengthen the range of the
network is called a repeater. Repeaters extend the network’s reach
by boosting the signals. Whenever a network is installed, it is a given
there will be places where the network signal is weak. The repeater
will take this network’s side where the signal is weak, boost this
weak signal, and then send it out through the other side. Repeaters
are most commonly used for networks with a limited range, such as
thin Ethernet networks. Hence you will see the use of repeaters in
such network setups. However, this does not mean that using
repeaters is limited.
But repeaters can be used for virtually any network connection.
For example, consider a typical 100Base-T network installed using
Cat-5 network cables. The maximum length of this cable is one
hundred meters, meaning that’s the range of the network. By using
a repeater in this network setup, we can double the range of the
network signal to two hundred meters.
In terms of the OSI networking model, operating repeaters is a
process in the first layer, i.e., the physical layer. A repeater device is
not intelligent. This means that a repeater does not have the
hardware capability to understand the signals it is transmitting. Since
the only job of the repeater is to perform a network signal
amplification it needs to be used carefully. A repeater will not discern
between a network signal and an interference signal (usually called
“noise”). This is why they should be used only after careful
assessment of the network. Otherwise, a repeater might amplify the
noise in the network.
Repeaters cannot be used to connect different network mediums.
For instance, if a repeater is being used with a 10Base-2 Thin
Ethernet network, then it can be connected only with another
10Base-2 Thin Ethernet network.
If we critically analyze the intelligence of a repeater, then we can
find it does possess a slight hint of intelligent functionality;
nevertheless, this is not enough to perform complex operations such
as discerning between the signal types being transmitted. The extent
of the intelligent functionality of a repeater device is the ability to
separate a connection from the others when the device detects any
problem or anomaly in the connected network. For instance, let’s
consider that we are dealing with two segments of a thin ethernet
network. These two segments are connected by a repeater device. If
these two segments become broken, then instead of shutting down
the entire network, the repeater will still allow the functional
segment to keep on working. In this way, the users of the network
can access the resources on the network segment still functional but
won’t have access to the resources on the broken segment.
However, one thing to note here is that even if the repeater does
separate the working segment from the broken segment, if the main
resources such as the servers are on the broken segment, it will be
useless. This is because even if the workstations were on the
functional segment, they won’t be able to access the main
networking resources of the server.
The figure shown below depicts a typical repeater setup
extending the length of the network.
Hubs (Concentrators)
Hubs are known by these terms:
Concentrators
When choosing a suitable hub for your network, the first thing to
bear in mind is the specifications of your network. By knowing how
many nodes are supposed to be connected to the hub, the required
bandwidth for each node, and the network backbone type being
used with the hub, we can choose the right hub best suited for the
network. In terms of the network backbones usually installed with a
hub, they are generally anything between shared 10 Mbps thin
ethernet networks to 100 Mbps 100Base-Tx and high-speed
networks. Whatever the case, the choosing of a backbone
technology primarily depends on the bandwidth requirement of the
network and other criteria that need to be fulfilled for the network
designed.
Technically, in a network where hubs are being used, the hubs act
as ‘collision domains’, where collisions usually occur. So, if we use
multiple hubs in a single network set up, then the area of the
collision domain in the network will inevitably become larger. The
only exception is when the hubs are individually connected to a
switch. By using switches, we can restrict the collision domains of
each hub to itself. The figure shown below depicts a network using
several hubs.
Switches
Just as the name implies, a switch is a hardware component of a
network that can rapidly switch connections from port to port. A
switch creates these connections in a network by switching
dynamically among the several network ports available. Consider a
train yard, where several trains are coming in from certain tracks and
leaving through other tracks. The train yard has a designated person
tasked to manage the movement and routes of the train. This
person is called the ‘yard manager.’ To make sure that the trains
arrive at their destination, the yard manager essentially switches the
tracks according to their specified route. In this analogy, the ‘switch’
is the ‘yard manager.’ Instead of directing trains by switching the
tracks, a switch directs the data packets through the network by
ethernet cabling. In this way, a data packet is effectively routed to
its destination.
We know that a switch establishes an individualized connection
between any two given ports of the network; it makes sense that
the entire ports converging into the switch device don’t share a
common collision domain. This is why a switch device plays a role
somewhat similar to that of a super bridge.
Due to the nature of switches, they are mostly used to bridge the
connection between hubs and relatively faster backbones in a
network. For instance, consider a network using ten hubs. Each hub
supports up to 24 connection nodes for workstations. With ten hubs,
we will have about 240 connection nodes meaning there will be 240
workstations in total connected to the hubs. If these hubs are
connected to the same backbone in the network, then it would mean
that the collision domain of all the hubs would be the same. When
the 240 workstations are sharing the same collision domain, then
network performance will deteriorate. Here, we can fix this problem
by using a switch with 12 ports. Earlier, each port of the switch had
its own separate collision domain. Here, all ten of the hubs
connected to the 12-port switch will have domains, thereby
maintaining the network quality.
A 100Base-T network connection is commonly used with
workstations. A networking expert would recommend a 1000Base-T
or faster connection as the backbone network. By using a switch and
a fast backbone, the workstations connected to the network through
the nodes can operate at 100 Mbps.
Switches impact the speed and performance of the network so
well that using a switch becomes a no-brainer. Another aspect that
makes switches so desirable in networks is that they are very
inexpensive. For a typical local area network, using switches instead
of hubs makes more sense because hubs are expensive network
components. In comparison, a switch is inexpensive, has much to
offer to the network, and is comparatively easier and simple to
install. Nowadays, you might find difficulty finding an available
bridge on the market as the supply and demand of switches is
overwhelming.
The reason to know and understand hubs is that although they
are not used now, you might still come across older installations
using hubs. In newer network installations, it is guaranteed that you
will exclusively deal with switches instead. To reiterate the main
concept of these hubs and switches, hubs create a bigger packet
collision domain, while switches have smaller, separated collision
domains.
Bridges
A bridge is a hardware device that performs the same function as a
repeater but is more intelligent. Bridges work by joining two network
segments, just like repeaters; the main difference is that when a
bridge must pass data traffic from a segment to another segment, it
does so intelligently. This means that a bridge will only pass the data
traffic to the other segment if this traffic’s destination is the target
segment; otherwise, it will not. Another distinguishing feature of a
bridge is that they also divide the network into smaller segments.
Certain bridges can be connected to two network segments. For
instance, such a bridge can span from coaxial Thin Ethernet to a
twisted-pair Token Ring.
We talked about the layer at which repeaters operate at (which
was the physical layer of the OSI model). One would assume that
since the function and purpose of the bridges is virtually the same as
repeaters, they would also operate at the first layer of the OSI
networking model. However, that’s not the case; instead, the bridges
operate at a layer that is one level higher, i.e., at the second layer,
also known as the data-link layer in the OSI networking model. This
is because bridges connect the network segments and then pass the
data traffic from segment to the other segment ‘intelligently.’ To do
this, the bridge analyzes each encountered data packet’s MAC, or
Media Access Control address. This analysis of the MAC address
helps the bridge determine whether it should forward the data
packet onto the other network or not. A bridge device can store the
parts of the network’s address data. This can be done in either of
two ways.
1.
The user programs a static routing table that contains the
address information and data.
2.
The user implements a dynamic learning system that
learns in a tree pattern by automatically identifying and
discovering the network’s addresses.
Routers
Continuing the chain of intelligent iterations of the other hardware
components of a network, a router is basically a bridge, but even
more intelligent, just as a bridge is an intelligent version of a
repeater. Just as bridges operate at one layer higher (at the data-link
layer) in the OSI networking model than repeaters, routers operate
at the third layer of the OSI networking model, also known as the
network layer. Routers are more efficient and far better than bridges
for transmitting data packets to their respective destinations.
Since the operation of the router is at the third layer of the OSI
networking model, the only requirement for the upper layers of the
OSI model to establish a connection with the router is that of using
the same protocols. If the router is configured and designed
specifically for protocol translation, then it can translate any protocol
from the first three layers (physical, datalink and network layers) to
any other protocol also a part of these three layers. A router can
also connect two networks that have no similarity to each other
(while connecting similar networks is a given). Generally, routers are
best suited and commonly used for Wide Area Networks (WAN) as
they can effectively create the links required for this network to be
established.
If we analyze the characteristics of the router which allow it to
effectively connect two similar or dissimilar networks, we conclude
that a router essentially serves the purpose of a node. Routers
feature their very own network address, which solidifies their
function as a node even more. A router receives data packets from
other nodes. After receiving the packets, the router analyzes and
examines the contents of the data packets: only after this
assessment does the router send the data packet to its destination.
This procedure needs to be performed almost instantaneously to
avoid delay and lag in data traffic. To ensure that the router swiftly
and accurately performs this job, they are designed with a
microprocessor inside them to handle the computational and logical
needs of the task. Usually, this processor is a variant of the RISC or
Reduced Instruction Set Computer type chip. Besides a
microprocessor, routers also have built-in memory to help with
routing function. Since routers are more intelligent than bridges and
they have more computational resources; they can figure out the
shortest route (if available) towards any data packet’s destination
and use it.
Besides this, routers can also perform certain tasks that facilitate
the bandwidth maximization of a network. Also, a router can
logically and dynamically adapt to the traffic problems detected in a
network.
Let’s talk about the importance of routers in a network. It
wouldn’t be an exaggeration to say that routers form the backbone
of the entire Internet. For instance, consider the TRACERT
command. When you use this command to trace a route from two
points, a node to a destination, we can see there are multiple ‘hops’
shown by the terminal before it can show the destination. These
‘hops’ are routers that are forwarding the data packet until it reaches
its destination.
POP3
SMTP
Bus Topology
Bus topology is also commonly called ‘Common bus multipoint
topology.’ A bus topology is basically a network that uses a single
end-to-end network cable. On this network cable, some devices are
connected at different locations on the cable, and these connections
are termed ‘nodes.’ A simple illustration of a bus topology network is
shown below:
Luego, la voz del cantador subió en el aire, como una flecha, hasta
llegar a un tono agudísimo, y en este tono cantó el entierro del
torero, las coronas que llevaba, las dedicatorias de los compañeros,
la tristeza del pueblo, y, al terminar esta parte, la guitarra animó el
final con unos cuantos acordes, como para no dejarse entristecer
por la muerte del héroe.
Después, el cantador terminó el tango en tono de salmodia, con
estas palabras:
Murió por su valentía
aquel valiente torero,
llamado Manuel García
y apodado el Espartero.
En el circo madrileño
toreó con mala suerte;
la afición, que no dormía,
le llorará eternamente.
«Una rusa.
«A los españoles.
»Momentos antes de morir, frío, tranquilo, con el
convencimiento de mi superioridad sobre vosotros, quiero
hablaros.
»Durante toda mi vida, la sociedad me ha perseguido, me
ha acorralado como a una fiera. Siendo el mejor, he sido
considerado como el peor; siendo el primero, se me ha
considerado como el último.
»Daría los motivos de mi Gran Obra de Altruísmo, si los
españoles pudieran comprenderme; pero tengo la
seguridad de que no me comprenderán, de que no pueden
comprenderme. Los esclavos no se explican al rebelde, y
vosotros sois esclavos, esclavos todos, hasta los que se
creen emancipados. Unos del rey, otros de la moral, otros
de Dios, otros del uniforme, otros de la ciencia, otros de
Kant o de Velázquez.
»Todo es esclavitud y miseria.
»Yo sólo soy rebelde, soy el Rebelde por excelencia. Mi
rebeldía no procede de esas concepciones necias y vulgares
de los Reclus y de los Kropotkine.
»Yo voy más lejos, más lejos que las ideas.
»Yo estoy por encima de la justicia. Mi plan no es mas que
éste: empujar el mundo hacia el caos.
»He realizado mi Gran Obra solo. Quizá no lo crean los
imbéciles que suponen que los atentados anarquistas se
realizan por complot.
»Sí; he estado solo; solo frente al destino.
»Si hubiese tenido necesidad de un cómplice, no hubiera
llegado al fin. En España no hay un hombre con bastante
corazón para secundarme a mí. No hay dos como yo. Yo
soy un león metido en un corral de gallinas.
»Hubiese escrito con gusto un estudio acerca de la
psicología del anarquista de acción, para dedicárselo a la
Sociedad de Psicología de París, pasándome en
observaciones mías interesantísimas, pero no hay tiempo.
»Durante estos últimos meses tenía la idea vaga de llevar a
cabo mi Gran Obra. Cuando me convencí de la necesidad
de ejecutarla, mis vacilaciones desaparecieron y viví
tranquilo, estudiando el momento y la manera de
conducirla al fin.
»Viví tranquilo, y la vida que me escamotearon los demás la
viví enérgicamente en el tiempo en que preparaba mi obra.
»¿Se puede comparar la intensidad extraordinaria de mi
vida con la existencia ridícula de los sibaritas de la antigua
Roma o con la no menos ridícula de los cortesanos de
Versalles?
»Sólo en cualquier noche antes del atentado, cuando tiraba
desde el balcón una naranja, para ver dónde caía en la
calle, y poder precisar el modo de echar la bomba, tenía yo
más emociones que todos ellos.
»Sí. Me he resarcido en grande.
»En el último momento, al tomar la bomba entre las
manos, y al inyectarle la nitrobencina, temblaba: «Tiembla,
grande hombre, me dije a mí mismo; tienes derecho a eso
y a más.»
»¡Y cuando la lancé, rodeándola con flores! Al estallar, creí
que se me desgarraban las entrañas.
»Algo semejante debe sentir la mujer al parir. Yo acababa
también de dejar en el mundo algo vivo.
»Antes de mí, en España no había nada. ¡Nada! Después
de mi Gran Acto vivía ya un ideal: la Anarquía. Yo lo
acababa de echar al mundo en aquel momento terrible.
»Si hubiese posibilidad de comparación entre el autor de un
hecho individual obscuro y sin trascendencia y el autor de
un acontecimiento que habrá conmovido el mundo, diría
que mi estado de automatismo cerebral, desde que pensé
mi Obra hasta que la realicé, era idéntico al de Raskolnikof,
en Crimen y Castigo, de Dostoievski.
»Creo que pocos hombres hubieran tenido mi serenidad. En
el momento terrible, cuando estaba en el balcón con la
bomba en la mano, vi en la calle unas cuantas muchachas
que reían. Sin embargo, no vacilé. Implacable como el
Destino, las condené de antemano a la muerte. Era
necesario.
»He realizado mi Gran Obra y la he realizado solo y con
éxito.
»Creo que mi atentado es el más grande de cuantos se han
cometido. Todos los españoles, si no fueran cretinos,
debieran agradecerme, todos, el rey, porque he dignificado
su cargo; la burguesía, porque ante el peligro parece
menos egoísta y vil; el pueblo, porque ha aprendido de mí
la forma más eficaz y más enérgica de la protesta.
»He tenido un instante de debilidad, es cierto, al acogerme
en casa del doctor Aracil. No me arrepiento. Este instante
pasajero de flaqueza me ha permitido tener, en el último
momento, la conciencia de mi vida y de la magnitud de mi
obra.
»Me voy a hundir en la nada incrustándome una bala en el
corazón. Deshacer mi cerebro, disparar contra él, me
parecería un sacrilegio. Además, no lo podrían estudiar los
médicos, y como este cerebro no encontrarán muchos.
«Adiós.
Nilo Brull.»
Aracil, al leer esta carta, quedó pensativo.
La parte teatral, enfática, el bello gesto de mediterráneo que había
dejado Brull, le producía cierta envidia.
—La verdad es que era todo un hombre—murmuró.
Luego, volviendo sobre su sentimiento, pensó en la fuerza de ilusión
que tiene el hombre para convertir las acideces de su estómago y las
irritaciones del hígado en motivos idealistas y metafísicos...
Se pudo seguir el camino llevado por el anarquista, saltando tejados
desde el cuarto de la casa del doctor Aracil, hasta allí.
Ya resuelto el desenlace del actor principal del drama, aunque no a
satisfacción de la justicia ni del público, los periódicos comenzaron a
zaherir y a burlarse de la policía y del Gobierno porque no lograba
coger a Aracil.
Algunos aseguraban que el doctor había salido de España en
automóvil, en el célebre automóvil rojo del millonario, visto por
Iturrioz; otros, que en el tren, disfrazado; pero la mayoría opinaba
que el doctor y su hija se hallaban escondidos en Madrid.
En esto, a los cinco días de enviar Aracil la carta a su amigo de París,
trajeron los periódicos la siguiente noticia con letras grandes: «El
doctor Aracil en París», y a continuación una serie de telegramas.
El doctor había estado en la redacción de El Intransigente a saludar
a Rochefort, y en su conversación con uno de los redactores de
dicho periódico había dicho que Nilo Brull, sin duda se dirigió a su
casa a pedirle protección por ser su amigo. El doctor no podía
desampararle ni protegerle, y había optado por abandonarle la casa.
Aracil había pasado la frontera en el automóvil de un amigo y se
disponía a marchar a América, pero no tenía inconveniente en volver
a España, cuando se calmara la efervescencia del momento, para
probar su absoluta inocencia. Aracil había estado en casa de los
corresponsales de los periódicos madrileños en París, dejando su
tarjeta.
La campaña estuvo lo bastante bien hecha para que nadie dudara.
Se intentó averiguar quién había salvado al doctor, pero no se puso
nada en claro.
Se discutió la cuestión de la extradición de Aracil, y a los cuatro o
cinco días los periódicos comenzaron a dar este asunto por
terminado.
La Epoca dijo: «Los anarquistas pueden estar satisfechos; han dado
la batalla sin pérdidas por su parte».
XIII.
LA PARTIDA
A las dos semanas de encierro, Aracil se sentía aplanado por la
soledad y el silencio.
—Creo que debíamos marcharnos ya—dijo Aracil a su hija, después
de pensarlo varios días—. Isidro no puede vivir en paz teniéndonos a
nosotros aquí.
—¿Por qué?
—Porque ya es molestar demasiado.
—No; es algo más que molestar. Pero a Isidro no le importa. Por él
podemos estar aquí un año si queremos.
Y era verdad. El guarda tenía una abnegación extraordinaria. El
devolver el beneficio al doctor Aracil, que le había curado su hija, le
producía tal júbilo, que rebosaba de contento.
A pesar de esto, Aracil quería marcharse; se sentía abatido, achicado
de encontrarse solo, y necesitaba verse entre gente, en un sitio
donde poder hablar y lucirse.
María era partidaria de pasar allí todavía un par de meses y luego
marcharse en el tren, sin tomar precaución alguna; pero Aracil
confesó que no podía más, que estar metido en aquel rincón le era
insoportable.
—Bueno, pues nos iremos—dijo María.
Decidieron la marcha. Lo más prudente era que Aracil fuese solo,
aprovechando trenes de ferias, y que esperase a María en la
frontera; pero el doctor aseguró que temía la soledad, pues era
capaz de hacer cualquier tontería. Yendo juntos era una locura
tomar el tren, estando todavía tan reciente el atentado y las órdenes
dadas a la policía. Lo mejor era ir a caballo. De acuerdo padre e hija
en este punto, discutieron por dónde intentarían salir de España.
Aracil creía lo más sencillo encaminarse directamente a Francia.
María encontraba mejor marchar a Portugal.
—En primer término, el viaje es más corto—dijo ella—; luego, la que
hay que cruzar es tierra más despoblada y seguramente camino
menos vigilado.
María había oído hablar de este viaje varias veces a su primo
Venancio. Consultaron con Isidro, y éste fué partidario de la marcha
por Portugal.
—Nada; pues vamos por Portugal—dijo el doctor.
Se comenzaron a hacer los preparativos; Isidro compró dos
caballejos baratos y los dejó en una cuadra de un amigo suyo de las
Ventas de Alcorcón. Trajo ropas de campesino usadas; para Aracil
una especie de marsellés, faja y pantalones de pana, y un refajo y
una chaqueta para María.
María cosió unos cuantos billetes de Banco, el capital con que
contaban, en el forro de la americana de su padre después de
haberlos envuelto en un trozo de hule, y se quedaron con unos
duros y unas pesetas sueltas para el camino.
El señor Isidro enseñó a Aracil, en un borrico que tenía, la manera
de echarle las albardillas y ponerle la cincha y el ataharre. Luego
compró el guarda una manta y una alforja, en donde metió unas
cuantas libras de chocolate, un queso, una bota y pan, por si
algunos días no encontraban comida en el camino. María le mandó
comprar una tetera, un bote de té y una maquinilla de alcohol.
El señor Isidro se agenció un plano de España, y, por último, le dió
al doctor su cédula y sus papeles.
—Usted se llama como yo, Isidro García; es usted guarda de la Casa
de Campo y va usted con su hija a San Martín de Valdeiglesias.
Desde San Martín dicen ustedes que han ido hasta allá en tren, y
que van a la Vera de Plasencia.
Hicieron una lista de los pueblos por los que tenían que cruzar, y ya
decididos, fijo el día de salida y dispuesto todo, a media noche se
presentó el señor Isidro, les hizo salir de su encierro, y los tres,
cargados con una porción de cosas, y por entre las matas, cruzaron
gran parte de la Casa de Campo hasta un lugar frontero a la aldea
de Aravaca.
Al llegar a este punto, Isidro cogió una escalera de mano y la apoyó
en la tapia. Subió, miró a derecha e izquierda, y dijo:
—¡Hala! Vengan ustedes.
Subieron María y Aracil. La tapia, por el otro lado, apenas levantaba
un metro del suelo; así que de un brinco quedaron fuera.
—Ahora sigan ustedes bordeando esta tapia—dijo el señor Isidro—;
yo voy a adelantarme para traerles a ustedes los caballos.
El guarda desapareció en un instante; Aracil y María continuaron
solos. La noche estaba negra; en el suelo, mojado por la lluvia, se
hundían los pies. No se cruzaron con nadie. Clareaba ya el alba
cuando llegaron a las Ventas de Alcorcón.
En la carretera les esperaba el guarda, teniendo de la brida a los dos
caballos.
—¡Ea, vamos allá!—dijo el señor Isidro. La yegua de usted, don
Enrique, se llama Montesina, y el jaco de la señorita, Galán. Hábleles
usted, porque estos animales obedecen muchas veces mejor a la
palabra que al palo.
Prometió hacerlo así Aracil. El guarda ayudó a montar a padre e hija,
dió una varita a cada uno de ellos, les estrechó la mano
afectuosamente, y les dijo:
—¡Vaya, filando! Adiós, y buena suerte.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookball.com