Capricious ghosts haunt cyberspace
Paranormal bits and bytes scaring people
Jim connects to his interface
Hardware that is not, strictly speaking, legal
He hacks and cracks
No tracks
Relaxed, he unveils secure corpo chat logs
Quite lethal
Corpo= corporate
For dVerse (open link night)
I’m feeling the Cyberpunk blues today💙
Oh wow! 😁 what fun.
It’s really good! 😁👏🌹 love it!
LikeLiked by 2 people
Thanks, Lesley. The form you created was quite a challenge, especially that three syllable line.
LikeLiked by 2 people
Ha hah! What a massive compliment to write it. It is now out there in the world! 😁💗
LikeLiked by 1 person
You honour me 🙏
LikeLiked by 1 person
I enjoy trying out challenges like this. As long as it doesn’t involve syllable stresses, I’m game. I can’t figure out rhythm easily, for some strange reason.
LikeLiked by 1 person
Your turn to invent a poetry form 😁
LikeLiked by 1 person
I write something called Chaos poems. I’m not sure how its different from free verse. It has no rules or structure, but does have some frantic rhyming. It’s more a state of mind, I guess. They are pretty weird.
This was the first one that I wrote
LikeLike
Jim sounds like someone to be reckoned with for sure … nice writing!
LikeLiked by 1 person
He sure is! You’re safe from him as long as you’re not a corporate shark. Thanks, Helen 😊
LikeLike
Cyber flesh eating Corpo Rats!
May the Flatline be with them 🙏
like a toe tag on Body Bag Johnny😎
LikeLiked by 1 person
Just wait till Manual Miguel joins the gang for some action. Those corpos won’t know what hit them…. definitely not Miguel driving stick shift.
LikeLiked by 1 person
Feels like a chapter from The Matrix. The hackers are like the gunslingers of the old west. You captured the rebel spirit well here, Tanmay.
LikeLiked by 1 person
Thanks, Lisa. I had never seen them as gunslingers of the old west before. That’s a very good comparison.
LikeLiked by 1 person
You’re welcome 🙂
LikeLiked by 1 person
I know those… and it is quite scary what you might get from those hackers.
LikeLiked by 1 person
Yes, they can be full of nasty surprises. There’s a thin red line which separates ethical hacking (if i can call it that. The guy here is more about striking at the establishment than anything else) from cyber terrorism. Thanks for commenting, Bjorn. 😊
LikeLike