What Happens in September...: Tales of Crime and Fantasy

Cabin Fever Press
Free sample

Seven stories, written in one month. Crime, fantasy, science fiction, humor...it's a sideways look into the strangeness of an author's mind.

The author's second collection, The Challenge, was published in October 2015. His third novel, The Secret (September 2015) is a near-future post-apocalyptic supernatural thriller.

Come on in. The water's fine...

Saints Alive! (in which Harry Saunders discovers a large egg in his bathtub)Thursday Night Game (Jack, meet Bea. Your game just changed. Forever.) Not for Hire (an assassin rethinks his approach to customers)Freethought (it can be dangerous to let your mind wander on an airplane)Accidentally on Purpose (concerning a train that needed to be stolen)...come what may (if ants are our successors, do we still declare victory?)Hard Roads (a trucker explains: the rigs are supposed to move)
Read more

About the author

David Haywood Young has written four novels, twenty-something stories, and one full-length work of nonfiction. He's also been blogging since 2009, writing code since 1981, and generally expressing opinions all over the place for far too long. On the bright side, he likes hearing other people's opinions too, especially when he disagrees but finds himself convinced against his will. It's an addiction, or nearly.

Meanwhile, since 5/4/2016 he's been posting free never-before-published fiction on his blog on Wednesdays. He may be a day late here or there, or even skip a week, but that's the plan. Last time he did this (in 2013) he kept it up for 17 weeks. Ever since he stopped? He's wanted to do it again. So, now he is. Maybe forever?

Come on by, if you like! Each story is taken down as new fiction takes its place. Though it'll all be published elsewhere eventually...

He's also working on two new novels. After all, why not? Writing is fun.

Google his full name, or type his full name dot com, and you'll find him. 

Read more



Additional Information

Cabin Fever Press
Read more
Published on
Nov 11, 2015
Read more
Read more
Read more
Read more
Fiction / Fantasy / Dark Fantasy
Fiction / Fantasy / Humorous
Fiction / Horror
Fiction / Science Fiction / Collections & Anthologies
Young Adult Fiction / Science Fiction / General
Read more
Content Protection
This content is DRM free.
Read more
Read Aloud
Available on Android devices
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
David Haywood Young
Curious about surveillance? Wondering about the security of your computer or phone?

These are just a couple of starting points. The author, with decades of experience in the field, takes us on a journey through the digital landscape. Exhaustively researched, with hundreds of links, it's nevertheless written in an informal and entertaining style.

Do you know the difference between "a web browser" and "the internet"? That's about all you'll need, to start. When you're done with this book, you'll know more than most IT (information technology) professionals do about digital security. You'll be able to analyze the claims made by tech bloggers and those who flog their own products. You'll know much, much more about the risks to your privacy and anonymity--and why they're both so important--in today's fast-moving world.

Then, at the end, the author tells how he once went to jail for trying to help protect thousands of college students (including himself). It's a chilling reminder of just how easily "spin" can replace substance. And yet, it's a funny story.

Come on in and give this book a try. You'll be glad you did.

The Table of Contents:
    Who needs this book?
    What's a Barefoot Anarchist?
    Chapter 1: Why Privacy? Why Encrypt?
        The Free Speech Argument
        Dangers of Self-Incrimination
    Chapter 2: Threat Modeling
        Sounds Ominous!
        You Can't Be Totally Anonymous
        You Must Decide What You Can Live With
        Attack Surfaces
        Your IT department
        Software: Open-Source vs. Closed
        Companies & Policies
        Government & Privacy
    Chapter 3: Connections
        Internet Service Providers (ISPs)
        Virtual Private Networks (VPNs)
        The Onion Router (Tor)
        Wi-Fi Networks
    Chapter 4: Downloading Files
        Download Sites
        Use BitTorrent?
        How About Usenet?
    Chapter 5: Digital Purchases
        Credit Card Options
        A Note on Card/Banking Security
        A Note on Credit Itself
        PayPal & Similar Services
        Bitcoin and Friends
    Chapter 6: General Computing
        Virtual Machines
        Physical Security
        Disk Encryption
        Passwords & Logins
        Smart Cards & Biometrics
        Sending Anonymous Data
        Automatic Software Updates
        Anti-Virus Software
    Chapter 7: Operating Systems
        Instead of Windows?
        Other Linux Distros
    Chapter 8: Telephony
        Location Tracking
        Cellular Eavesdropping
        Text Messaging
        Baseband Hacking...and Beyond?
        The Metadata is the Message
        Phones and Wi-Fi
        Near-Field Communication (NFC)
        Android vs iOS vs Others
        Voice over IP (VoIP)
        Texting Alternatives
        All-in-one? Silent Circle vs. Signal
    Chapter 9: Web Browsing
        Search Engines
        Which Browser?
        "Secure" Connections
        Other Plugins
    Chapter 10: "Cloud" Backups
        Dropbox and Friends
        SpiderOak & Its Pals
        Curmudgeonly Advice
        Make a Decision
    Chapter 11: Email
        Who's giving it to you?
        How to encrypt it?
    Chapter 12: Putting It All Together
        What's Your Threat Model?
        How Do We Fix Privacy?
    Appendix A: Encryption Primer
        Just the Basics
    Appendix B: Jail!
    Thanks for Reading!
    Excerpt from Shiver on the Sky
©2017 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.