Soma

He believes that the mycelial root network uniting thousands of mushrooms over extensive surfaces are connections that have formed between the neurons of mother earth's brain which transmit their encrypted knowledge to those who consume them.

, , , , , , , ,

I'm Alien or a Time-Traveller... or something. (Eight)

The large white goat pushed the notepad across the table; no need to write encrypted craziness anymore.

, , , ,

The Hologram

On that note, i recommend that you really switch to a better database encryption because this is just embarrassing. so now i ran out of insults so i guess its time for goodbye? well, not good.

, , , , , , , , , ,

Plush Love Volume 1, Episode 28: Implications

They could get inside and act as probes in all the right places, using encrypted bidirectional radio transmissions. they wouldn't even have to transmit very far, less than ten feet or so. there've been plenty of scifi stories about it."

, , , , , ,

New Life, New problems, Chapter 4

"but i may have heard something in the encrypted channel of inter-base communications." she smiled. "apparently they're here to discuss the safety of the morphs here and the missions they under go." becka replied.

, , , , , ,

A Father's Betrayal - Part 3.5 (Through the Looking Glass)

He says that she was another drug addict brought in by the police for treatment, but why would he encrypt every one of her records if that was the case? i can't help but think that something strange is going on.

, , , , , , ,

S under D[Arc 4: Exile] Chapter 3

We got a copy of it but it was encrypted with three different encryptions. we cracked one of them and found some information. tylan suspects ben is currently in the hands of exile. exile is a group we have very little information.

, , , , , , , ,

Part III- Writing Zero's into the Liability Matrix

"hey, you don't know that," the skoon replied, smiling down to the stocky coyote, "besides, this is amr classified data, we don't have the access code to unlock its encryption." "fine. whatever.

, , , , , , , ,

An Opus for a Penguin

There was only one problem - they were encrypted jpeg files, and the hacker who had gotten them would only reveal the decryption key once carlos published them as is.

, , , , , , , , , , , ,

Codename Songbird

Whatever interesting things i'd find would be encrypted into a coded text message, which would be sent directly to beowulf for him to decrypt before sending the information to higher command. rinse and repeat each week.

, , , , , , , , , , , , , , , , ,

The Creed: The Grand Preamble

Two folders stood out above all others: one was a hidden encrypted folder named ".tmp\_lr" and the other was on her desktop and labeled "passwds". using the passwords from the appropriate folder, i decrypted .tmp\_lr and viewed it's contents.

, , , , , ,

Cherry

According to my client's encrypted email, she wanted it to 'look like a robbery gone wrong' and 'make him suffer without inflicting physical injury'. this one lived across the state though, meaning i'd need to leave town.

, , , , , , , , , , , , , , , , ,