Ace: aceofspadeshq at gee mail.com
Buck: buck.throckmorton at protonmail.com
CBD: cbd at cutjibnewsletter.com
joe mannix: mannix2024 at proton.me
MisHum: petmorons at gee mail.com
J.J. Sefton: sefton at cutjibnewsletter.com
Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022 Dave In Texas 2022
Jesse in D.C. 2022 OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published.
Contact OrangeEnt for info: maildrop62 at proton dot me
That is, you start the login process repeatedly - a hundred times in parallel, if you can - and never complete it, and attach a sneaky payload that has a tiny chance of blowing up on the target server when your login times out.
On older 32-bit systems it takes a few hours on average for this to work.
On 64-bit systems it's more complicated to exploit and would take a week or more of constant effort; since the bug has only just been reported nobody has demonstrated a successful attack against a 64-bit system yet, so it may take even longer.
Reviewing all the servers at work turned up one vulnerable system; every other server was properly locked down. I don't know who set it up, but I curse their name. Whatever it is.
It's also much smaller than typical EV batteries - in terms of capacity and range as well as weight, unfortunately - but if you can really charge it in four minutes that might not be the end of the world.
SpaceX already launches more payload to orbit than everyone else in the world combined. This schedule would be like nuking your enemies' sailing ships in a game of Civilization.
Disclaimer: We choose to nuke the Moon and do the other things, not because it is easy, but because fuck you, Gandhi.