BATO
.
TO
v3x
←v2x
SIGN IN
Home
Browse
Lists
Users
Groups
More...
Groups
Reviews
Comments
Latest Chapters
Most viewed: 24 hours
Most viewed: 7 days
Most viewed: 30 days
Random Comics
Upload Comic (v2x)
Disqus: Requests
Disqus: Corrections
Disqus: Home
Disqus: Search
Suggestions & Bugs
Disqus: Chat
Bato Docs
B
Mirrors +
SIGN IN
light
dark
dracula
valentine
retro
lemonade
coffee
black
smoke
SIGN IN
comic title or author name
🇬🇧
Mel Kano
Volume 3 Chapter 15
: Phishing
Volume 2 Chapter 10 : Cookie
Volume 2 Chapter 11 : Response
Volume 2 Chapter 12 : Buffer Overrun
Volume 2 Chapter 13 : Impedance
Volume 3 Chapter 14 : Uuencode
Volume 3 Chapter 15 : Phishing
Volume 3 Chapter 16 : Avatar
Volume 3 Chapter 17 : Link
Volume 3 Chapter 18 : Cyber Cascade
Volume 3 Chapter 19 : Firewall
Volume 3 Chapter 20 : Netizen
Volume 3 Chapter 21
Volume 3 Chapter 22
Volume 3 Chapter 23
Volume 4 Chapter 24
Volume 4 Chapter 25 : Troll
Volume 4 Chapter 26
Volume 4 Chapter 27
Volume 4 Chapter 28 : Recovery
Volume 4 Chapter 29
Volume 4 Chapter 30
Volume 4 Chapter 31
Volume 4 Chapter 32
Volume 4 Chapter 33
Volume 4 Chapter 34
Chapter 0 : Prototype
Chapter 1 : Login
Chapter 2 : Proxy
Chapter 3 : Redial
Chapter 4 : Gateway
Chapter 5 : Overhead
Chapter 6 : Offline
Chapter 7 : Time Out
Chapter 8 : Access Point
Chapter 9 : Security Hole
Manually
One Page
All Pages
No margin
Margin only
Page number
Default
Original
Win Width
Win Height
768px
960px
1116px
1360px
◀ Prev
◀ Prev Chapter
Next ▶
Next Chapter ▶
Volume 2 Chapter 10 : Cookie
Volume 2 Chapter 11 : Response
Volume 2 Chapter 12 : Buffer Overrun
Volume 2 Chapter 13 : Impedance
Volume 3 Chapter 14 : Uuencode
Volume 3 Chapter 15 : Phishing
Volume 3 Chapter 16 : Avatar
Volume 3 Chapter 17 : Link
Volume 3 Chapter 18 : Cyber Cascade
Volume 3 Chapter 19 : Firewall
Volume 3 Chapter 20 : Netizen
Volume 3 Chapter 21
Volume 3 Chapter 22
Volume 3 Chapter 23
Volume 4 Chapter 24
Volume 4 Chapter 25 : Troll
Volume 4 Chapter 26
Volume 4 Chapter 27
Volume 4 Chapter 28 : Recovery
Volume 4 Chapter 29
Volume 4 Chapter 30
Volume 4 Chapter 31
Volume 4 Chapter 32
Volume 4 Chapter 33
Volume 4 Chapter 34
Chapter 0 : Prototype
Chapter 1 : Login
Chapter 2 : Proxy
Chapter 3 : Redial
Chapter 4 : Gateway
Chapter 5 : Overhead
Chapter 6 : Offline
Chapter 7 : Time Out
Chapter 8 : Access Point
Chapter 9 : Security Hole
◀ Prev
◀ Prev Chapter
Next ▶
Next Chapter ▶
uploaded
5574 days ago
2 member views + 546 guest views