es Mythbusters v. Dealiest Catch By cheezburger.com Published On :: Wed, 08 May 2013 05:00:00 -0700 Full Article crabs discovery channel mythbusters failbook
es Oh My of the Day: George Takei Has Perfect Response For Facebook Troll By cheezburger.com Published On :: Fri, 16 Oct 2015 04:00:00 -0700 George Takei really sucks—and he's proud of it! The Star Trek legend and Internet darling had the prefect response this week for a Facebook troll trying to bring him down. He shared a screenshot of the exchange with the caption: "Sorry, couldn't help myself. #Trollololollol" BOOM! Takei is known for his epic Internet takedowns, so mark this one down as another win for Sulu. Full Article lgbtq facebook lol gay george takei
es Learn2Quotes By cheezburger.com Published On :: Fri, 26 Apr 2013 10:00:00 -0700 Full Article quotes failbook g rated
es Quantum Disinterest By cheezburger.com Published On :: Thu, 15 May 2014 11:00:00 -0700 Full Article burn physics science failbook g rated
es Girl Texts Guy Insult in an Attempt to Flirt, and Ends up Getting Stonewalled after Some Serious Awkwardness By cheezburger.com Published On :: Sun, 18 Sep 2016 10:00:00 -0700 It all starts with the anything-but-smooth introduction... Full Article FAIL tinder Awkward insult dating
es Might We Suggest the Melons? By cheezburger.com Published On :: Wed, 16 Apr 2014 16:00:00 -0700 Full Article lady bits las vegas sexy times
es How is paper made from trees? By www.livescience.com Published On :: Tue, 12 Nov 2024 14:57:55 +0000 Plant-based paper has been used for thousands of years, but exactly how is it created from trees? Full Article Plants Planet Earth
es Pando, the world's largest organism, may have been growing nonstop since the 1st humans left Africa, study suggests By www.livescience.com Published On :: Tue, 12 Nov 2024 17:17:38 +0000 The clonal quaking aspen known as Pando is between 16,000 and 80,000 years old. Full Article Plants Planet Earth
es Our ancestor Lucy may have used tools more than 3 million years ago By www.livescience.com Published On :: Tue, 12 Nov 2024 17:29:35 +0000 An analysis looking at the hand bones of australopithecines, apes and humans reveals that tool use likely evolved before the Homo genus arose. Full Article Archaeology
es 01 – The Internet Musician – Podcast Launch and Describing Your Music By theinternetmusician.com Published On :: Tue, 12 Jul 2011 20:13:36 +0000 Welcome to the first episode of the Internet Musician Podcast! Show notes for Episode #1: Subscribe to the Internet Musician Podcast with iTunes: The first episode of The Internet Musician Podcast, hosted by indie artist and internet music marketing junkie Brian Hartzog (http://www.brianhartzog.net). In this introductory episode, Brian introduces himself, his indie music credentials and […] Full Article Podcast describe your music internet music promotion music marketing podcast promotion your music on the internet The Internet Musician Podcast
es 05 – How to Choose the Best Band Name for Google By theinternetmusician.com Published On :: Mon, 09 Apr 2012 02:14:34 +0000 Show notes: In Episode 5 of The Internet Musician Podcast, we talk through the first two stages in my 8-step process to create a music website–including how to choose a band name and how to buy a domain name for your band’s website. Towards the end of the episode, we also examine several band names to […] Full Article Podcast
es New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls By thehackernews.com Published On :: Mon, 04 Nov 2024 11:43:00 +0530 Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming Full Article
es THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) By thehackernews.com Published On :: Mon, 04 Nov 2024 16:58:00 +0530 This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean. Full Article
es German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested By thehackernews.com Published On :: Mon, 04 Nov 2024 17:32:00 +0530 German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka Full Article
es Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks By thehackernews.com Published On :: Tue, 05 Nov 2024 10:38:00 +0530 Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the Full Article
es Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages By thehackernews.com Published On :: Tue, 05 Nov 2024 11:03:00 +0530 An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few Full Article
es Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices By thehackernews.com Published On :: Tue, 05 Nov 2024 15:04:00 +0530 Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an " Full Article
es FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions By thehackernews.com Published On :: Tue, 05 Nov 2024 22:45:00 +0530 The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed Full Article
es South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers By thehackernews.com Published On :: Wed, 06 Nov 2024 12:28:00 +0530 Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission (PIPC) said Meta gathered information such as Full Article
es VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware By thehackernews.com Published On :: Wed, 06 Nov 2024 23:22:00 +0530 An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to Full Article
es Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems By thehackernews.com Published On :: Thu, 07 Nov 2024 14:38:00 +0530 Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management Full Article
es 5 Most Common Malware Techniques in 2024 By thehackernews.com Published On :: Thu, 07 Nov 2024 15:18:00 +0530 Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging Full Article
es Malicious NPM Packages Target Roblox Users with Data-Stealing Malware By thehackernews.com Published On :: Fri, 08 Nov 2024 17:23:00 +0530 A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available Full Article
es The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses By thehackernews.com Published On :: Fri, 08 Nov 2024 17:23:00 +0530 We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable. Globally small and medium-sized businesses (SMBs) are increasingly targeted by cyberattacks but often lack the resources for full-time Chief Information Security Officers (CISOs). This gap is driving the rise of the virtual CISO (vCISO) model, offering a cost-effective Full Article
es IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools By thehackernews.com Published On :: Fri, 08 Nov 2024 17:53:00 +0530 High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point Full Article
es AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services By thehackernews.com Published On :: Fri, 08 Nov 2024 19:32:00 +0530 The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a Full Article
es Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns By thehackernews.com Published On :: Sat, 09 Nov 2024 11:42:00 +0530 Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the Full Article
es Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware By thehackernews.com Published On :: Mon, 11 Nov 2024 11:43:00 +0530 Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. "However, threat actors have Full Article
es HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities By thehackernews.com Published On :: Mon, 11 Nov 2024 15:27:00 +0530 Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The flaws affect Access Points running Instant AOS-8 and AOS-10 - AOS-10.4.x.x: 10.4.1.4 and below Instant AOS-8.12.x.x: 8.12.0.2 and below Instant AOS-8.10.x.x: Full Article
es Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation By thehackernews.com Published On :: Mon, 11 Nov 2024 15:41:00 +0530 Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week. The server-side weaknesses "allow attackers to hijack important servers in the Full Article
es The ROI of Security Investments: How Cybersecurity Leaders Prove It By thehackernews.com Published On :: Mon, 11 Nov 2024 17:00:00 +0530 Cyber threats are intensifying, and cybersecurity has become critical to business operations. As security budgets grow, CEOs and boardrooms are demanding concrete evidence that cybersecurity initiatives deliver value beyond regulation compliance. Just like you wouldn’t buy a car without knowing it was first put through a crash test, security systems must also be validated to confirm their value. Full Article
es THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) By thehackernews.com Published On :: Mon, 11 Nov 2024 17:27:00 +0530 ⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways, Full Article
es 5 Ways Behavioral Analytics is Revolutionizing Incident Response By thehackernews.com Published On :: Tue, 12 Nov 2024 16:30:00 +0530 Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more Full Article
es Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs By thehackernews.com Published On :: Wed, 13 Nov 2024 12:44:00 +0530 Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under active exploitation in the wild. The security vulnerabilities are among the 90 security bugs the tech giant addressed as part of its Patch Tuesday update for November 2024. Of the 90 flaws, four are rated Critical, 85 are rated Important, and one is rated Moderate in Full Article
es Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks By thehackernews.com Published On :: Wed, 13 Nov 2024 12:44:00 +0530 The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said Full Article
es ANOTHER GREAT GUN GUY PASSES By www.backwoodshome.com Published On :: Mon, 21 Oct 2024 13:00:00 +0000 I was saddened to be told of the recent death of my old friend Ed Lovette. He had a long and distinguished career in military, law enforcement, and the CIA. Ed was a thinking man’s instructor. We took each other’s classes. He went through my LFI-I course back in the day , and about thirty […] Full Article Uncategorized
es THE NEXT TIME AN ANTI-GUNNER SAYS CITIZENS’ RIFLES ARE USELESS AGAINST ARMIES… By www.backwoodshome.com Published On :: Sun, 27 Oct 2024 13:00:00 +0000 …remind them of this. I was recently reading “Andrew Jackson and the Miracle of New Orleans” by Brian Kilmeade and Don Yeager. The War of 1812 was going badly for the Americans. The British had burned the White House, and a huge contingent of British troops was in Louisiana planning to march north in conquest. […] Full Article Uncategorized
es Weeknotes wk0 By www.aquarionics.com Published On :: Sat, 02 Jan 2021 13:20:27 +0000 Another year, another attempt at keeping track of what I’m doing. The weird thing about this site is… Full Article WRPL
es Bripe and the world Bripes with you By www.aquarionics.com Published On :: Wed, 21 Apr 2021 08:56:54 +0000 This is, without doubt, the stupidest coffee device I have ever bought. But I have bought it. Full Article Uncategorized
es Hot takes on an 11 year old game: Mass Effect 2 By www.aquarionics.com Published On :: Sun, 06 Jun 2021 13:12:36 +0000 I completed Mass Effect 2 a couple of days ago for the first time. This article contains spoilers… Full Article Computer Games Mass Effect
es 2022 in Video Games By www.aquarionics.com Published On :: Mon, 26 Dec 2022 22:54:36 +0000 I’ve played some computer games in 2022. Here are some words about some of them. Final Fantasy 14… Full Article Computer Games
es Trump Embraces RFK Jr.’s Views on Vaccines, Fluoride By www.factcheck.org Published On :: Tue, 05 Nov 2024 00:52:25 +0000 In the waning days of his campaign, former President Donald Trump has further embraced some of Robert F. Kennedy Jr.’s incorrect or controversial views on health, including vaccines and fluoride. The post Trump Embraces RFK Jr.’s Views on Vaccines, Fluoride appeared first on FactCheck.org. Full Article FactCheck Posts SciCheck 2024 elections Presidential Election 2024
es Trump Makes Unsupported Claim About ‘Massive CHEATING’ in Philadelphia By www.factcheck.org Published On :: Wed, 06 Nov 2024 00:34:07 +0000 Former President Donald Trump posted to social media an unsupported claim about "massive CHEATING" in Philadelphia, which he claimed had drawn the attention of law enforcement. The Philadelphia Police Department, the Philadelphia district attorney, a Republican city council member and the Pennsylvania Department of State all refuted the claim. The post Trump Makes Unsupported Claim About ‘Massive CHEATING’ in Philadelphia appeared first on FactCheck.org. Full Article FactCheck Posts 2024 elections Presidential Election 2024
es Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias By www.factcheck.org Published On :: Wed, 06 Nov 2024 21:56:25 +0000 Social media users alleged bias against former President Donald Trump when a Google search on Election Day for “where to vote” returned an interactive map to find a person’s polling station when including the word “Harris” but not “Trump.” The reason is because “Harris” is a county in Texas, whereas “Trump” is not a location. The post Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias appeared first on FactCheck.org. Full Article Debunking Viral Claims FactCheck Posts 2024 elections Presidential Election 2024
es 2024 Week 36 Notes: Planners Gotta Plan By www.cygnoir.net Published On :: Sun, 08 Sep 2024 18:12:44 -0800 The new 2024-25 COVID vaccines are available, so FunkyPlaid and I got ours on Friday. Because we went to a pharmacy, my health insurance didn’t cover them, so I had to use funds from my HRA. (We could have waited until our medical provider had appointments, but that would have been late September or early October — and with travel coming up soon, I was unwilling to wait.) It is bizarre and enraging to see how agencies supposedly dedicated to public health are flailing in this moment. I’m extremely fortunate to have a job that provides health insurance, an HRA, and sick leave, and I can afford KN95 masks and rapid antigen tests. What about people who are uninsured or underinsured? I know it’s a bummer to read this, but it’s a bigger bummer to try to survive during yet another COVID surge. Let’s take care of our health, for ourselves and for our communities. Concentrating on This time of year is Planner Season, when the 2025 planners are released and people like me (and maybe you too) gobble them up and then spend the rest of this year hoping that next year we have lives exciting enough to plan. Ever the optimist, my planner line-up for 2025 is: For my personal planner, daily log, habit tracker, reading journal, and commonplace book, I’ll be trying the Sterling Ink Common Planner in their new N1 size, which fits inside a Traveler’s Notebook. I’m currently using a Hobonichi Weeks, which is 95mm x 186mm; the N1 size is 110mm x 210mm. For my work planner, the Wonderland 222 A5 Weekly Planner has been working well for me this year, so I’ll try it again in 2025. Cultivating ✍???? Drafting two stories, one for performance (I hope ????????) and one for a collection. ???? Still knitting that gift for someone. ???? Food I made that was yummy: Peperonata with peppers from a coworker’s CSA box, plus peppers from our own CSA box. CSA boxes are great! Gluten-free vegan apple crisp. I am not a huge fan of apples in their primary form; I prefer them as a cinnamon delivery device. So this recipe from Minimalist Baker, apples chopped up and baked with oats and sugar? That works. Sliced heirloom tomatoes on toast spread thinly with mayonnaise. Truffle salt if you’re feeling fancy. (I was.) ???????? Learning Italian with Duolingo. ???? The workweek was short because of the holiday on Monday, but also long because of everything. I’m still trying to create better boundaries around that. Consuming ????️ One of my planner pals shared a sample of Bungukan Kobayashi’s Yagentoshiro Reflex Violet, a dusky blue with iridescent purple shimmer. ???? “girlfriend” by Hemlocke Springs is on repeat on my brain radio. ???? You don’t need to be a Rolling Stones fan to enjoy the “I Can’t Get No Legal Action” episode of the Judge John Hodgman podcast. ???? Still working my way through the crossword puzzle books I’ve hoarded and enjoying the daily Cross|word on Puzzmo. Also, Minute Cryptic is quite humbling. ???? One last episode of “Fargo” to go, then we’ll start the latest season of “Slow Horses”. ???? What I’m reading and quoting: “The Mountain in the Sea” by Ray Nayler: “The great and terrible thing about humankind is simply this: we will always do what we are capable of.” Some links From “What would an adequate COVID response look like?” by Julia Doubleday: Right now, state representatives are deliberately avoiding mention of COVID, while propagandizing the safety of infection and/or the end of the pandemic by refusing to mask. It is hard to imagine how successful a pandemic response might be if public officials were actually trying to end the pandemic. We quite literally have public health and political and media figures working to hide three pieces of critical information: public knowledge of the virus, public knowledge of mitigation measures that would reduce viral spread, and public knowledge of the severity of the virus (which would motivate desire to reduce viral spread). Other links: NaNoWriMo Shits The Bed On Artificial Intelligence (Chuck Wendig) Why Goblin Mode Is the New Self-Care Routine (Cleveland Clinic) 2024 Winners of the 17th Annual iPhone Photography Awards One more thing Today I’m journaling about this quote from Seneca: “Life, if well lived, is long enough.” Full Article
es 2024 Week 37 Notes: R&R By www.cygnoir.net Published On :: Sun, 15 Sep 2024 19:52:00 -0800 Look at this absolutely good girl: my canine sister, Willa. Concentrating on Rest, relaxation, and quality time with loved ones! We’re visiting family in Pennsylvania this week and attending a wedding in Kentucky on Friday. When packing, I restricted myself to three notebooks and three pens because I tend to overpack and then immediately regret as I am schlepping around a stationery store in my backpack. Cultivating ✍???? Drafting two (very different) stories. I’m looking forward to time off work to let my creative writing brain percolate. ???? Food I made that was yummy: Pork chops in garlic mushroom sauce, with mashed potatoes and salad on the side. I am not a huge fan of pork chops, but I got them in our CSA box, so I looked for a recipe that incorporated other things I am a huge fan of, like garlic and mushrooms. ???????? When my brain is full of Italian, I switch over to music lessons in Duolingo. It’s fun! ???? No. Consuming ????️ Only three pens means only three inks: De Atramentis Charles Dickens, Sailor Manyo Hinoki, and Robert Oster Sydney Lavender. ???? I heard “White Gloves” by Khruangbin for the first time in a while and forgot how much I enjoy their music. ???? Recently FunkyPlaid and I tried to watch the show “Kaos” and lasted about ten minutes. I had listened to the Pop Culture Happy Hour episode on the show and thought I might enjoy it. ???? No time for games this week. I’m looking forward to some Puzzmo! ???? We started watching “My Brilliant Friend”, the adaptation of Elena Ferrante’s Neapolitan quartet, which I read last year and loved. ???? What I’m reading and quoting: “The Mountain in the Sea” by Ray Nayler: “How we see the world matters — but knowing how the world sees us also matters.” Some links I love Tracy Durnell’s latest weeknotes post. I’m not even mad at how it makes me feel like I’ve done absolutely nothing in comparison. ???? Neither Elon Musk Nor Anybody Else Will Ever Colonize Mars (Albert Burneko) Firefly Atlas: I’m eager to see fireflies while I’m here, so I’m doing some research. One more thing I was a bit anxious to travel during a COVID surge, so in addition to getting the new vaccine as soon as I could, I invested in a Flo Mask Pro to wear in airports, planes, and any other crowded spaces. I’m so glad I did; it was very comfortable to wear all day, once I got used to how it felt. My glasses didn’t fog up at all, which is a minor miracle. I did get some looks (you know the kind) but that was a small price to pay for a greater chance of avoiding Covid and/or Long Covid. I only saw a handful of other people masked. Full Article
es More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Sun, 27 Oct 2024 22:41:00 +0000 You can now download Peter F. Hamilton's Pandora's Star for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: The year is 2380. The Intersolar Commonwealth, a sphere of stars, contains more than six hundred worlds interconnected by a web of transport “tunnels” known as wormholes. At the farthest edge of the Commonwealth, astronomer Dudley Bose observes the impossible: over one thousand light-years away, a star . . . disappears. Since the location is too distant to reach by wormhole, the Second Chance, a faster-than-light starship commanded by Wilson Kime, a five-times-rejuvenated ex-NASA pilot, is dispatched to learn what has occurred and whether it represents a threat. Opposed to the mission are the Guardians of Selfhood, led by Bradley Johansson. Shortly after the journey begins, Kime wonders if the crew of the Second Chance has been infiltrated. But soon enough he will have other worries. Halfway across the galaxy, something truly incredible is waiting: a deadly discovery whose unleashing will threaten to destroy the Commonwealth . . . and humanity itself. Full Article
es More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Tue, 29 Oct 2024 17:03:00 +0000 You can now get your hands on the digital edition of Blake Crouch's Upgrade for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: The mind-blowing new thriller from the New York Times bestselling author of Dark Matter and Recursion—currently in development as a motion picture at Steven Spielberg's Amblin Partners “You are the next step in human evolution.” At first, Logan Ramsay isn’t sure if anything’s different. He just feels a little . . . sharper. Better able to concentrate. Better at multitasking. Reading a bit faster, memorizing better, needing less sleep. But before long, he can’t deny it: Something’s happening to his brain. To his body. He’s starting to see the world, and those around him—even those he loves most—in whole new ways. The truth is, Logan’s genome has been hacked. And there’s a reason he’s been targeted for this upgrade. A reason that goes back decades to the darkest part of his past, and a horrific family legacy. Worse still, what’s happening to him is just the first step in a much larger plan, one that will inflict the same changes on humanity at large—at a terrifying cost. Because of his new abilities, Logan’s the one person in the world capable of stopping what’s been set in motion. But to have a chance at winning this war, he’ll have to become something other than himself. Maybe even something other than human. And even as he’s fighting, he can’t help wondering: what if humanity’s only hope for a future really does lie in engineering our own evolution? Intimate in scale yet epic in scope, Upgrade is an intricately plotted, lightning-fast tale that charts one man’s thrilling transformation, even as it asks us to ponder the limits of our humanity—and our boundless potential. Full Article
es More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Wed, 30 Oct 2024 16:25:00 +0000 You can now download Sebastien de Castell's Play of Shadows for only 0.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: Swordplay, magic, intrigue and friendships stronger than iron: the first volume in the new swashbuckling fantasy series set in the universe of THE GREATCOATS. Damelas Chademantaigne picked a poor night to flee a judicial duel. He has precious little hope of escaping the wrath of the Vixen, the most feared duellist in the entire city, until he stumbles through the stage doors of the magnificent Operato Belleza and tricks his way into the company of actors. An archaic law provides a temporary respite from his troubles - until one night a ghostly voice in his head causes Damelas to fumble his lines, inadvertently blurting out a dreadful truth: the city's most legendary hero may actually be a traitor and a brutal murderer. With only the help of his boisterous and lusty friend Bereto, a beautiful assassin whose target may well be Damelas himself, and a company of misfit actors who'd just as soon see him dead, this failed grandson of two Greatcoats must somehow find within himself the courage to dig up long-buried truths before a ruthless band of bravos known as the Iron Orchids come for his head. Oh, and there's still that matter of the Vixen waiting to duel him . . . Full Article
es More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Thu, 31 Oct 2024 14:10:00 +0000 For a limited time, you can download Paolo Bacigalupi's Navola for only 5.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: From the New York Times best-selling author of The Windup Girl and The Water Knife comes a sweeping literary historical fantasy about the young scion from a ruling-class family who faces rebellion as he ascends to power. "You must be as sharp as a stilettotore’s dagger and as subtle as a fish beneath the waters. This is what it is to be Navolese, this is what it is to be di Regulai." In Navola, a bustling city-state dominated by a handful of influential families, business is power, and power is everything. For generations, the di Regulai family—merchant bankers with a vast empire—has nurtured tendrils that stretch to the farthest reaches of the known world. And though they claim not to be political, their staggering wealth has bought cities and toppled kingdoms. Soon, Davico di Regulai will be expected to take the reins of power from his father and demonstrate his mastery of the games of Navolese diplomacy: knowing who to trust and who to doubt, and how to read what lies hidden behind a smile. But in Navola, strange and ancient undercurrents lurk behind the gilt and grandeur—like the fossilized dragon eye in the family’s possession, a potent symbol of their raw power and a talisman that seems to be summoning Davico to act. As tensions rise and the events unfold, Davico will be tested to his limits. His fate depends on the eldritch dragon relic and on what lies buried in the heart of his adopted sister, Celia di Balcosi, whose own family was destroyed by Nalova’s twisted politics. With echoes of Renaissance Italy, The Godfather, and Game of Thrones, Navola is a stunning feat of world-building and a mesmerizing depiction of drive and will. Full Article