A Dragon's Tale-Chapter 35-The Tide Of War

"there's an incoming message from an encrypted source." nolan's smile dropped. "what channel?" "channel one sir!" "that's not possible",nolan replied,"even the us military can't hack that channel."

, , ,

Dark Origins: Revelations: Part 2

"since you, matt and one other unidentified intruder have already gone through the encrypted records this morning you may already know."

, ,

Chapter 1: Access granted

Parrotjak $ cd tsociety parrotjak $ python main.py \ 1)info tools 2)password tools 3)stress tools 4)file encrypter 0)update toolkit (still in developent) 99)exit it said on the terminal as he typed in the password cracking

, , ,

SATAM: Internal Conflict - Chapter One

"nicole - wireless linkup; scan for all encryption levels, starting with highest." "accessing... top level encryption detected. beginning decryp cycle. estimate five minutes needed."

, , , , , , , , , , ,

School for Heroes - Vuoritorni

I opened up the encrypted communication program that exabyte had installed on the computer and put in a call back home. erhaben was the one who answered, which was a bit unusual.

, , , , , , ,

381 The Nuclear Dance

Admittedly the open channel is already subject to a continuously shifting adaptive encryption, but to the sethura this is probably about as secure as two children chatting with a taunt string and a couple of tin cans, so they've agreed to go purely euphemistic

, , , , , , , , ,

Para-Imperium Technology

The first dates back to pre-exodus earth, when they were used to make "keys" for unbreakable encryption of radio or optical communications, as qeparts are mass-produced these days a lot of companies or government agencies use them for secure internal

Airline Food for the Soul

There's a pause of silence as steve flips open the encryption unlock keypad in front of him.

, , ,

The Dark Choir

He tapped on a circle and whispered, then the shapes and squiggles all took a familiar, if still unreadable, shape, "these scrolls have encrypted magic writing, so that only my allies and i can read it, though these were written when magic script was more

, , ,

Coming Home

The network is encrypted. it will not be able to connect. the mi turns the transmit antenna off again. best to conserve power. after logging the event, the mi turns on the camera. it wants to know what it is approaching.

, , ,

misc story 1: Chloe (p. 1)

He'd use a secure encrypted link to speak with her from now on, as he didn't want to endanger her life. he started up a chat line, which used information found across the web to secure a link with the person.

, , , , , , , , , ,

Curiouser...

What he was able to grab from the _agamemnon_'s computer is pretty thorough--enough that we can adapt our systems to work with their encryption. maybe pass a little better in the future.

, , , , , , , , , , , , ,