Search results
Results from the WOW.Com Content Network
The Atrocity Archives is the first collection of Laundry stories by British author Charles Stross.It is set in 2002–03 [4] and was published in 2004. It includes the short novel The Atrocity Archive (originally serialised in Spectrum SF in Spectrum SF, #7 November 2001) and The Concrete Jungle, which won the 2005 Hugo Award for Best Novella.
The Laundry is a tabletop role-playing game published by Cubicle 7 in 2010. [1] The game is based on novelist Charles Stross 's The Laundry Files series. Description
Stross also authorised, but did not write, an official role-playing game, The Laundry (2010, ISBN 1-907204-93-8, Gareth Hanrahan, published by Cubicle 7) [14] [15] and a number of supplements based on the "Bob Howard – Laundry" series. [16] The system uses an adaptation of the Call of Cthulhu RPG rules (under licence from Chaosium).
The Rules of Shared Laundry 1. Do NOT leave your laundry for more than 15 minutes after it's done. ... Set a timer for five minutes before your cycle is expected to finish so you have ample time ...
The novel is a fixup of two novellas, "Jury Duty" and "Appeals Court", along with a new third section, "Parole Board". The book, set in the late 21st century, takes a generally comic look at the technological singularity through the eyes of Huw, a technophobic member of a "Tech Jury Service" tasked with determining the value of various technological innovations and deciding whether to release ...
Shannon Appelcline discussed how The Compleat Arduin two-book set at 450 total pages "was the largest Arduin release. It was clearly based upon the original rules - as they'd developed through The Arduin Adventure and Revised Arduin: A Primer - but polished and reorganized."
Rule 34 is a near-future science fiction novel by Charles Stross. [ 1 ] [ 2 ] It is a loose sequel to Halting State and was published on 5 July 2011 in the US and 7 July 2011 in the UK. [ 1 ] [ 3 ] The title is a reference to the Internet meme Rule 34 , which states that "If it exists, there is porn of it.
One of the modes John can use is the dictionary attack. [6] It takes text string samples (usually from a file, called a wordlist, containing words found in a dictionary or real passwords cracked before), encrypting it in the same format as the password being examined (including both the encryption algorithm and key), and comparing the output to the encrypted string.