Genetic Children-Log 08- There's been a problem!

They came in through encrypted phone lines! we have to tell the director and get everything backed up, checked and traced, now!" emu rushed out of the lab, telling niel to follow her. korm ran out the door and headed for his lab, nameless followed him.

Soma

He believes that the mycelial root network uniting thousands of mushrooms over extensive surfaces are connections that have formed between the neurons of mother earth's brain which transmit their encrypted knowledge to those who consume them.

, , , , , , , ,

Death Of The TITAN: glimps

''i'm sorry but the information you have received has an encrypted virus installed please reboot and call maintenance for support. .thank you and have a nice day . . . .'' ''ohhh crap. . ..guys we need to move!'' (radio). . .

, , , , , , , , ,

Beacon & Nightshade Meet

Beacon sighed, "this door's encryption was motivation enough. 'for those who enter that have good intentions, all they will see are the negative results.' i intend to make that false."

, , , , , , , ,

New Life, New problems, Chapter 4

"but i may have heard something in the encrypted channel of inter-base communications." she smiled. "apparently they're here to discuss the safety of the morphs here and the missions they under go." becka replied.

, , , , , ,

A Father's Betrayal - Part 3.5 (Through the Looking Glass)

He says that she was another drug addict brought in by the police for treatment, but why would he encrypt every one of her records if that was the case? i can't help but think that something strange is going on.

, , , , , , ,

S under D[Arc 4: Exile] Chapter 3

We got a copy of it but it was encrypted with three different encryptions. we cracked one of them and found some information. tylan suspects ben is currently in the hands of exile. exile is a group we have very little information.

, , , , , , , ,

Part III- Writing Zero's into the Liability Matrix

"hey, you don't know that," the skoon replied, smiling down to the stocky coyote, "besides, this is amr classified data, we don't have the access code to unlock its encryption." "fine. whatever.

, , , , , , , ,

An Opus for a Penguin

There was only one problem - they were encrypted jpeg files, and the hacker who had gotten them would only reveal the decryption key once carlos published them as is.

, , , , , , , , , , , ,

Codename Songbird

Whatever interesting things i'd find would be encrypted into a coded text message, which would be sent directly to beowulf for him to decrypt before sending the information to higher command. rinse and repeat each week.

, , , , , , , , , , , , , , , , ,

The Creed: The Grand Preamble

Two folders stood out above all others: one was a hidden encrypted folder named ".tmp\_lr" and the other was on her desktop and labeled "passwds". using the passwords from the appropriate folder, i decrypted .tmp\_lr and viewed it's contents.

, , , , , ,

Cherry

According to my client's encrypted email, she wanted it to 'look like a robbery gone wrong' and 'make him suffer without inflicting physical injury'. this one lived across the state though, meaning i'd need to leave town.

, , , , , , , , , , , , , , , , ,