Business Expenses

encrypted message. short pulse. return in the span of milliseconds. automated. a second. short pulse. long delay. half a second. more. ping. even encrypted, i could at least get ahold of the messages. it was a start.

, , ,

Introduction to Manipulators: Linguistics and Phonetics

Parallel can be encrypted, so other manipulators may hear the sound, but only the designated manipulator gets the packet of code. parallel is meaning without words, as all standard manipulator language is.

Finding a New Self, chapter 17: A Tough Night

"but not on encrypted messages!" "of course we do! decrypt it, reach a point it stops working, adjust the feed so it starts making sense again..." "but..."

, , , ,

Lupis Culture: Battle Howls

Without a leap in encryption methods, any aggressive attempts to hack and decode messages would be met with flimsy resistance.

, , , , , , , , , , , , , , , , , , , , , , ,

Firewall

L.a.r.e.s or rather "learning artificial real-time encrypted securities" was an intelligent firewall based on real artificial intelligence.

, , , , , , , ,

Cyber Sleuth

Opening his laptop and logging in to the local wi-fi, he activated an encryption program (no, not pcp) that would protect his computer from intrusions.

, , , , , , , , ,

New Genesis Chapter 2: The Angels with Flaming Swords

Every brain has the power to download, configure, encrypt, decrypt, create, delete, store, and edit pieces of information. only telepaths have the power to connect brains in order to share that information without any other medium.

, , , , , , ,

Void Incursions Chapter 1: Contact

The only reason she paid any attention to the signal is that it had an encrypted military signature.

, , , , , , ,

Modifications

The softkey was encrypted and quite well. he smiled and cracked his knuckles, fingertips dancing along the keys steadily. forty layers of tri-lateral encryption. whoever it was certainly knew he liked a puzzle.

, , , , , ,

Ecstasy or Oblivion - Session 7

"no, we'll encrypt it." she smiled. it was the smile she got when she was proud of her own ideas. "we encrypt the memory and replace it with a slightly different memory and then exchange encryption keys.

, , , , , , , , , , , , , , , , , , , , , , , , ,

Not Quite Prometheus

A team of scientists worked for years to decode and translate a heavily encrypted alien computer. what they found was completely unexpected, but in retrospect not all that surprising. in the late 1940s, an alien spacecraft crashed on earth.

, , , , ,

The hack: Chapter 11 (Trent)

"this tape drive is my digital scrapbook, i have encrypted files about everyone i have hacked and buried them deep in the tape drive through encryption and steganography photos so that no one sees it" i replied. "why do you do it though?"

, , , , , ,