Hack.
By D Shipway
4/5
()
About this ebook
Book 1.0: Alpha
Only mobsters, federal agents, and gladiatorial combatants stand between our intrepid hacker and his goal to save his family, his life, and (time permitting) both of the worlds he holds dear...
Alexander leads a double life. In the ‘real’ world, he’s a mild-mannered family man and nerd for hire who spends as much time changing diapers as he does at his tech consulting business. But in the dark and sinister cyberspace of the VirT, Alexander is an avatar of deadly efficiency—a private eye and elite assassin.
But when a sultry new client's betrayal leads to his derez, Alexander must hack back into the VirT to solve his own murder and get to the bottom of the mysterious rapid-onset plague spreading around the real world, creeping ever closer to home.
D Shipway
D Shipway is composed of 70% water. The rest is a mixture of film snobbery and TV nerditude, but mostly #GeekDadPride. He hasn’t been writing enough on FLIMgeeks.com for a very long time (eons in Internets years) and is working on the second stack of papers he calls a novel. He resides in Canada with his wife and twin sons (‘The Monsters’) when not vacationing in intergalactic, pan-dimensional, modal realities.
Related to Hack.
Related ebooks
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsDissecting the Hack: The F0rb1dd3n Network, Revised Edition Rating: 5 out of 5 stars5/5Detained Rating: 0 out of 5 stars0 ratingsHacked Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsIntroduction to Web Hacking: Cross-site Scripting Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Hidden Realms - A Pathway To Hacking Rating: 5 out of 5 stars5/5Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5Ultimate Hack Rating: 0 out of 5 stars0 ratingsCybersecurity Experts Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsThe Core of Hacking Rating: 0 out of 5 stars0 ratingsHacking Rating: 3 out of 5 stars3/5Defending Yourself from Hackers and Spammers Rating: 0 out of 5 stars0 ratingsComputer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals Rating: 0 out of 5 stars0 ratingsRansomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks Rating: 0 out of 5 stars0 ratingsNo Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Gray Hat Hacking the Ethical Hacker's Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5The Basics of Web Hacking: Tools and Techniques to Attack the Web Rating: 3 out of 5 stars3/5Anti-Virus Tools and Techniques for Computer Rating: 0 out of 5 stars0 ratingsHacking Web Apps: Detecting and Preventing Web Application Security Problems Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratings
Reviews for Hack.
3 ratings0 reviews
Book preview
Hack. - D Shipway
|q6# <^3 x{u;-4eB~'r[sծ;)G2Gqh& ;fXrC&d\JǍ;2f-/}%Յc?k[&z?y]smU qm- haZseaq.)Fz`㫰yquR;*dU6ؤGm~Hfa@> {r?#d@#M.czF yFVj9[d_{l %wp}c uu(Ң'1)۠ R?AgW xoi!lO]A } P܅[}M9J"P tO'~ ?s_Z/ۼu3]a u48Da9VR&|oFy\K/ :%%n] L8{G5R.KsCs.JP `H}xY֮KF̂o?b]@»vKXLp3܋pQb[@`u/C!.SaeI爄d庾`t@`$%?46jMe ok17C돁ehA/TP0vա]֝JneHe(|L2H_>VT2Sw91liR " (ЎyTHc`*W^] r@_ڕ #roLj^0p zz_eA XYHd.8"ȓ:N4Fu%ٹR(ʵy]J:\u0ZC #)eZcȼ$ `L;w!.\U._$s..?͓^A}Tdk6EMpZid@[>.rԊf5;!=VU*F;F /20"(P:U9!8>SyP2qL̼]Ɣ`S&EpwcSB=J^e(MGcܠRZw\Q1ђCGid [C:M%>fU^:W:ZOt0@TIuEH3jAD3TO"hSƙ0{n/G;dy|oZʪG:,$Hl+SbMpP um͈(ݷL AdV"e.k؍vkr&__Ӡ=I0ԕ:ĭ^u0afɘ,{sf:Y5/CB%Z어ڙ^gFog^CdǍHox SLB5&|u뻐Xu/dh6s}Iڦ F "-׆\'`R\7-d8iY,7Q4KI,lVQ 4kF_#'S3m/UcT+; GX.;6U _c(XyEa2%T1֠ԝn7Zk%;Aṑkn[LQڧZWY>&I0-a^e5Ƿi d 7>IJ &v&nEPY{E֦挬;ʰVgBIr.c2Z*;5,mt,P[Li"&1+tjRuݡj% -IٍQgm[! +y&H}? 'hr #d3٨Bym.Q5#dZޔ qʁ%O}OsOKtz BV76&)%H#b[=MiҴ])7km;dTpu.Tb?MLw8[t wtcbwRգ:\~Fδ@ TI] DV"TSnIֿ-mR;*u"<ZAՋB"dw;b仔.*}Pj (GkÂNF01D2T\%7ݻ lb$*#Ews7 mF[5TBصd~1fJ1vtng%Zu;x$Xh3Ȕ,ob+y>_ fVY5 }Y˿櫳_؏loa550XqbI|H,rSʆSy!)`'1Oa BX!AQc|%M2,`E|b@#}$6{Iqp躎q0,o.x#hc.NcMe( eFL2|ORBb GzTUu*Yb)O} <6/R mv4 *}Ǚt#9!.Cƾc#h# {e:~.ޟWV&Z9f)گH\bHc״g{ŞĖ4%asml@j^ZEm]NT("! 2!]3NwKL~PcBYN*tYs/31!@{%1W^d!ʉwJ:G#EFvkPRWÑёKZ]/+%N&[7lEz` ;Pf*.Mz$+\l%"iHh*Y4 ezWW[<Ђ:VBWK;! %Pvn;ys+gwߞ{5+p`T`5?:L84<5 d0fF|K3!dO]@҆'Ԥ[84aIY&,nmj7\5aő"m'5XQ5dk ~{nQ⹖iM5>݆iaH.+" ̞˺paS-5zrh|cʓKYt 5 gu_<*L[KvRAù W굾Qh ݧH5O(D`džiMc8Kxu3mW^ۄ+7Q-3:KvJ֊hx(7U'4maۜ "yӎ*waH8Γ6{Tܹm5rR,(ṀF_mAg`;0d(#q*Yh{He:ީn*yYUuqmB|#3UMk]4N&=5m4_S>H$XѾ9DpKYTp52G/0--ڹwԧʱA2ۮQۙJR5ΘqM#*dǝE'OOu.6[k>r&ԝ6O, j.5&4a̽H7HC,ݦ_oCWyBrLZ|[*i;v\XP?͊>ubpjk8*'^)yf7Ą/o65f4+Jĺ5{xHGwHL',(墷LjIqbmKVWhŴ!^ń)~!Dǯ},S:YʢFj zF0Zr;oRM(57g{dRf7+c?ֆ|%A~WsH6mT+̨xٿb(Aa~h2y`î=8 H~Ҏircu)^lUզ:#|a=E}Zoau:H bH'f!D k41w*EeQ0;]:#8!`y~Tb7JPt1}ӂtcW3zpsm&ftO<>gj֫=l_D;)qLw2*VB *∻CƷs<&`je~p['AQ%)CHF䞆ÁIҏ{ ͬԜ'R$BV<_A8.:iئ 1K$ĴhsM{VTq 9@amƟIP5Df$\>K<r;Xܸ(]wk>R˝4B%L<و*s_C