hacktivist: Hacker School Attacked
()
About this ebook
Act One of the cyberhug.me novel. "We can't predict when there will be no Next Time."
"The other students have already left, their luggage in transit to dispersed assembly points. Shadow programs are giving Hacker School a semblance of normal activity.
We are scheduled to detonate this, and be on our way in fifteen minutes, morphing programs have already taken over. Any networked data about us is already worthless. Worms will devour off line systems containing student profiles when certain searches are keyed. The Dean is waiting till midnight with a morph program, mine is already well advanced. I've done this outside of hacker school permission or knowledge. Any questions?"
Jan looks hard at Billy. “Why are you emphasizing that you are acting outside of Hacker School permissions.”
He shocks them, “We have a mole, a high level administrator has compromised Hacker School."
Allan R. Wallace
"If you view change as a problem rather than an opportunity you'll always be too late. Visionaries and crackpots are always too soon and pay a high price for their insight.We can accept that." ~ Allan R. Wallace
Read more from Allan R. Wallace
Daily Thought Provokers Sydrathium: Sword Of Kings, Assassins, and Thieves Rating: 0 out of 5 stars0 ratingsShirker John Leprechaun: The Quest For Dragon Treasure Rating: 0 out of 5 stars0 ratings
Related to hacktivist
Titles in the series (5)
hacktivist: Hacker School Attacked Rating: 0 out of 5 stars0 ratingsComplicit Simplicity: A hacktivism team fights for human rights. Rating: 4 out of 5 stars4/5Abacus Brief: Moonlit Knight's cyberwar and peace Rating: 0 out of 5 stars0 ratingsCyberhug.Me (Hacktivist Cyberwars For Human Rights) Rating: 0 out of 5 stars0 ratingsHacker School Trilogy Rating: 0 out of 5 stars0 ratings
Related ebooks
Cyber Shadows: Power, Crime, and Hacking Everyone Rating: 0 out of 5 stars0 ratingsDetained Rating: 0 out of 5 stars0 ratingsThe Algorithm Man: America's Cyber Sleuth Rating: 0 out of 5 stars0 ratingsOSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5CEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsTargeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Rating: 5 out of 5 stars5/5Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition Rating: 0 out of 5 stars0 ratingsCYBERDEFENSE: Domain Name Systems as the Next Public Utility Rating: 0 out of 5 stars0 ratingsDefense in Depth: An Impractical Strategy for a Cyber-World Rating: 5 out of 5 stars5/5Open Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsCybersecurity and Infrastructure Protection Rating: 0 out of 5 stars0 ratingsClient-Side Attacks and Defense Rating: 0 out of 5 stars0 ratingsSeven Deadliest Wireless Technologies Attacks Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsCyber Threat Hunting A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Hacking and Penetration Testing with Low Power Devices Rating: 2 out of 5 stars2/5Offensive Security A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 4 out of 5 stars4/5Intrusion Detection Systems A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsNagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices Rating: 0 out of 5 stars0 ratingsCyber Incident Response Plan A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity and Applied Mathematics Rating: 0 out of 5 stars0 ratingsPentesting for Beginners - Short Stories Rating: 0 out of 5 stars0 ratingsCyber Guerilla Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsKali Linux Intrusion And Exploitation A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
War & Military Fiction For You
For Whom the Bell Tolls: The Hemingway Library Edition Rating: 4 out of 5 stars4/5The Book of Lost Names Rating: 4 out of 5 stars4/5A Farewell to Arms Rating: 4 out of 5 stars4/5The End of the Affair Rating: 4 out of 5 stars4/5The Things They Carried Rating: 5 out of 5 stars5/5All Quiet on the Western Front Rating: 5 out of 5 stars5/5The Last Kingdom Rating: 4 out of 5 stars4/5The Rose Code: A Novel Rating: 5 out of 5 stars5/5The Winemaker's Wife Rating: 4 out of 5 stars4/5The Huntress: A Novel Rating: 4 out of 5 stars4/5The Grapes of Wrath Rating: 5 out of 5 stars5/5Like the Appearance of Horses Rating: 4 out of 5 stars4/5Mash: A Novel About Three Army Doctors Rating: 4 out of 5 stars4/5The Forest of Vanishing Stars: A Novel Rating: 4 out of 5 stars4/5The Diamond Eye: A Novel Rating: 4 out of 5 stars4/5Going Postal Rating: 5 out of 5 stars5/5The Paris Daughter Rating: 4 out of 5 stars4/5Cold Mountain: A Novel Rating: 4 out of 5 stars4/5The Visitors Rating: 5 out of 5 stars5/5All Quiet on the Western Front Rating: 4 out of 5 stars4/5The Ones They Left Behind Rating: 4 out of 5 stars4/5The Room on Rue Amelie Rating: 4 out of 5 stars4/5Johnny Got His Gun Rating: 5 out of 5 stars5/5The Memory Keeper of Kyiv: A powerful, important historical novel Rating: 4 out of 5 stars4/5In the Lake of the Woods: A Novel Rating: 4 out of 5 stars4/5When I Come Home Again: 'A page-turning literary gem' THE TIMES, BEST BOOKS OF 2020 Rating: 4 out of 5 stars4/5The Naked and the Dead: 50th Anniversary Edition, With a New Introduction by the Author Rating: 4 out of 5 stars4/5The Shepherd Rating: 4 out of 5 stars4/5The War of the Worlds Rating: 4 out of 5 stars4/5The Three Fates Rating: 4 out of 5 stars4/5
Reviews for hacktivist
0 ratings0 reviews