Ace: aceofspadeshq at gee mail.com
Buck: buck.throckmorton at protonmail.com
CBD: cbd at cutjibnewsletter.com
joe mannix: mannix2024 at proton.me
MisHum: petmorons at gee mail.com
J.J. Sefton: sefton at cutjibnewsletter.com
Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022 Dave In Texas 2022
Jesse in D.C. 2022 OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published.
Contact OrangeEnt for info: maildrop62 at proton dot me
TipTop's "The One" gluten-free bread is bread. Sure it's made of tapioca starch and rice flour and - yes - soy, but it tastes like bread, has the texture of bread, doesn't fall apart the moment you butter it, and only costs twice as much as bread.
It's the breadiest bread I've had since I was diagnosed with celiac back in 2010.
They silently install a management agent on your servers if you use certain Azure services. The management agent has a hole in it - not so deep as a well, not so wide as a church-door... Actually, it pretty much is. If you don't firewall your server properly, anyone can access that agent to run any code they want without needing anything fiddly like a password.
It's a double whammy: A remote code execution vulnerability coupled with complete failure to actually check the password. You can just waltz straight in.
This is even more severe. The RCE is the simplest RCE you can ever imagine. Simply remove the auth header and you are root. remotely. on all machines. Is this really 2021? pic.twitter.com/iIHNyqgew4
Looking for a quick example of how to implement encryption? Stack Overflow answers will give you a convenient cut and paste solution that will ruin your day.
Daniel has a deep understanding of the tools and techniques used by the adversaries we aim to protect users against, and as such is a uniquely qualified expert to advise on defense against such threats. Our product and infrastructure have already benefited from that understanding in better securing user data.