"Trilogy - Three True Stories of Scoundrels and Schemers" has won yet another gold medal

Notification just arrived announcing that the audiobook of Trilogy - Three True Stories of Scoundrels and Schemers has won yet another gold medal  -- this time in the Electronic Literature (eLit) Book Awards Competition.

Older Post Newer Post


  • Richard Person on

    It’s quite unfortunate that too many people have fallen victim to the vast array of online frauds, resulting in large losses, some accountable to life-changing consequences. I was a victim of fraud of about $80,000.00 by two binary platform films, the Ingoinvest binary option and I was devastated and confused. But thank God for my neighbor who introduced me to a legit and certified binary recovery expert company that helped me recover all my lost funds If you have found yourself in the middle of an online losing streak, though the emotions that inevitably accompany those losses can be devastating to your confidence. Do not worry. Contact Recovery Hacker101 (recoveryhacker101@ Gmail com)

  • daniel paul on

    It all started one afternoon when I was using my computer. Suddenly, a pop-up alert appeared on my screen, claiming that my computer was “infected with Bitcoin mining malware.” My heart raced as I read the alarming message. I had heard about malware before, and the thought of my personal information being compromised sent a wave of panic through me. The pop-up wouldn’t go away, and it displayed a phone number for “Microsoft Support,” urging me to call immediately for assistance. WHATSAPP : +1 (581) 256‑1989‬‬ I hesitated, feeling a mix of fear and confusion, but the urgency of the situation pushed me to pick up the phone. When I called, a man with a calm and authoritative voice answered, claiming to be a Microsoft support agent. WEBSITE: ‪https://chaintraceassetrecovery.com He spoke with such confidence that I found myself believing him. He assured me that he could help resolve the issue and began guiding me through a series of steps. He instructed me to download remote access software so he could take control of my computer. ‬‬ EMAIL: chaintraceasset@post.com I felt a knot in my stomach, but he reassured me that it was necessary to fix the problem. Trusting his words, I followed his instructions, thinking I was doing the right thing. TELEGRAM: https://t.me/CHAINTRACE_ASSET_RECOVERYOnce he had access to my computer, he started navigating through my files and programs, pointing out various issues that made me believe my computer was indeed compromised. I felt increasingly helpless as he manipulated my system. Then, he mentioned that I needed to secure my cryptocurrency wallet. I had recently started using it, and the thought of losing my funds terrified me. He convinced me that the malware could drain my wallet, and I needed to act fast. In a moment of panic, I provided him with my wallet information, believing I was protecting my savings. I watched in horror as he transferred my hard-earned money into his own accounts. The realization hit me like a ton of bricks. I had been scammed. After the call ended, I tried to regain control of my computer, but it was too late. The damage was done, and I felt a deep sense of violation and embarrassment. In the days that followed, I learned that I was not alone. CHAINTRACE ASSET RECOVERY, a cybersecurity firm, was working tirelessly to combat this type of fraud. They collaborated with Europol to trace the operation back to a call center in Poland, identifying over 2,500 victims like me across Europe. CHAINTRACE ASSET RECOVERY efforts were instrumental in uncovering the extent of the scam. They analyzed the malware’s command-and-control servers and gathered evidence that helped law enforcement freeze the accounts where the stolen funds had been transferred. Thanks to their hard work, some of the stolen money was recovered, providing a glimmer of hope for victims like me. While I was grateful for the recovery efforts, the emotional toll of the experience lingered. I never thought I would be a victim of such a scam, and I wish I had been more cautious. I hope that by sharing my story, I can help others avoid falling into the same trap and raise awareness about the vital work that organizations like CHAINTRACE ASSET RECOVERY, are doing to protect individuals from cybercrime.

  • isabella olive on

    HIRE A PHONE HACKER-WEB BAILIFF CONTRACTOR
    I never once suspected my husband, and our marriage had been founded upon a lifetime of respect, history, and a life that we could be proud of having created together. Recently, however, I couldn’t ignore the nagging suspicion that something was wrong. My husband became guarded—his phone wasn’t more than an inch from his hand, and he was being strangely secretive regarding his privacy. It was last Wednesday that I could not help but get the feeling that something was amiss. I am not the jealous type, but the indicators were too difficult to overlook. Something in my gut cried out that there was more to it. Some research online later, I discovered an application meant to trace one’s phone developed by a cyber security firm known as Web Bailiff Contractor. To make it simple for any interested entity within the app, simply email them at webbailiff@contractor.net. It was nothing to be proud of, but my instinct said it was the only way to get to the truth. I paid for the services, purchased the spy app that connected his phone to mine and the app started bringing up messages, call logs, and social media activities. I remember my heart sinking as I scrolled through conversation after conversation with a woman named Rachel. They were flirtatious, with inside jokes, and made plans to meet up. I felt a rush of betrayal as my worst suspicions were confirmed. I haven’t yet mustered the courage to confront him because I’m still in shock. So I’m still spying on him.

  • Robert Cary on

    Hire Ruder Cyber Tech Sleuths, the best experts in cryptocurrency recovery.

    Looking back, it feels almost surreal. After many failed attempts with other companies, I had lost hope until RUDER CYBER TECH SLEUTHS changed everything. They not only restored my Bitcoin but also renewed my faith in customer service and technical expertise in the crypto space. Their thorough and professional approach yielded results quickly, unlike others who left me waiting for days. They effectively analyzed my wallet, tackled security issues, and communicated clearly throughout the recovery process.

    When I received the email confirming my Bitcoin was restored, I couldn’t believe my eyes as I logged back into my wallet. My investment was safe again. The team also enhanced my wallet’s security and provided valuable best practices for managing my digital assets. Thanks to RUDER CYBER TECH SLEUTHS, I no longer worry about losing my Bitcoin.
    info@rudercybertechsleuths.com

    support@rudercybertechsleuths.com

    whatsapp: +12132801476

    Telegram : @rudercybersleuths

  • isabella olive on

    HIRE A PHONE HACKER-WEB BAILIFF CONTRACTOR
    I never once suspected my husband, and our marriage had been founded upon a lifetime of respect, history, and a life that we could be proud of having created together. Recently, however, I couldn’t ignore the nagging suspicion that something was wrong. My husband became guarded—his phone wasn’t more than an inch from his hand, and he was being strangely secretive regarding his privacy. It was last Wednesday that I could not help but get the feeling that something was amiss. I am not the jealous type, but the indicators were too difficult to overlook. Something in my gut cried out that there was more to it. Some research online later, I discovered an application meant to trace one’s phone developed by a cyber security firm known as Web Bailiff Contractor. To make it simple for any interested entity within the app, simply email them at webbailiff@contractor.net. It was nothing to be proud of, but my instinct said it was the only way to get to the truth. I paid for the services, purchased the spy app that connected his phone to mine and the app started bringing up messages, call logs, and social media activities. I remember my heart sinking as I scrolled through conversation after conversation with a woman named Rachel. They were flirtatious, with inside jokes, and made plans to meet up. I felt a rush of betrayal as my worst suspicions were confirmed. I haven’t yet mustered the courage to confront him because I’m still in shock. So I’m still spying on him.



Leave a comment