{"generator":"Jekyll","link":[{"@attributes":{"href":"https:\/\/neurowinter.com\/feed.xml","rel":"self","type":"application\/atom+xml"}},{"@attributes":{"href":"https:\/\/neurowinter.com\/","rel":"alternate","type":"text\/html"}}],"updated":"2025-12-30T09:44:43+13:00","id":"https:\/\/neurowinter.com\/feed.xml","title":"Alex Manson","subtitle":"Security researcher and SRE. Writing about vulnerability research, AI, and the practical stuff I figure out along the way.\n","author":{"name":"Alex Manson"},"entry":[{"title":"The Hunt for POS Drivers Continues: Your Drivers Are in Another Castle","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/security\/2025\/12\/15\/The-Hunt-for-POS-Drivers-Continues-Your-Drivers-Are-in-Another-Castle\/","rel":"alternate","type":"text\/html","title":"The Hunt for POS Drivers Continues: Your Drivers Are in Another Castle"}},"published":"2025-12-15T00:00:00+13:00","updated":"2025-12-15T00:00:00+13:00","id":"https:\/\/neurowinter.com\/security\/2025\/12\/15\/The-Hunt-for-POS-Drivers-Continues-Your-Drivers-Are-in-Another-Castle","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"Security"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Advantech printer driver: heap corruption via Monochrome blit function (DrvRender_x64_ADVANTECH.dll)","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/security\/2025\/10\/09\/Multiple-Expliots-in-Advantech-Printer-Driver\/","rel":"alternate","type":"text\/html","title":"Advantech printer driver: heap corruption via Monochrome blit function (DrvRender_x64_ADVANTECH.dll)"}},"published":"2025-10-09T00:00:00+13:00","updated":"2025-10-09T00:00:00+13:00","id":"https:\/\/neurowinter.com\/security\/2025\/10\/09\/Multiple-Expliots-in-Advantech-Printer-Driver","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"Security"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Heap Corruption in Advantech TP 3250 Printer Driver (DrvUI_x64_ADVANTECH.dll) via DocumentPropertiesW","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/security\/2025\/10\/08\/Heap-Corruption-in-Advantech-TP-3250-Printer-Driver\/","rel":"alternate","type":"text\/html","title":"Heap Corruption in Advantech TP 3250 Printer Driver (DrvUI_x64_ADVANTECH.dll) via DocumentPropertiesW"}},"published":"2025-10-08T00:00:00+13:00","updated":"2025-10-08T00:00:00+13:00","id":"https:\/\/neurowinter.com\/security\/2025\/10\/08\/Heap-Corruption-in-Advantech-TP-3250-Printer-Driver","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"Security"}},"summary":{"@attributes":{"type":"html"}}},{"title":"The Phoenix Project: Fiction that is close to reality","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/books\/2024\/06\/13\/The-Phoenix-Project-Fiction-that-is-close-to-reality\/","rel":"alternate","type":"text\/html","title":"The Phoenix Project: Fiction that is close to reality"}},"published":"2024-06-13T00:00:00+12:00","updated":"2024-06-13T00:00:00+12:00","id":"https:\/\/neurowinter.com\/books\/2024\/06\/13\/The-Phoenix-Project-Fiction-that-is-close-to-reality","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"Books"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Solving AWS S3 Tagging Limits with Terraform: Strategies &amp; Tips","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/terraform\/2024\/01\/27\/Overcoming-AWS-Terraform-Providers-Tagging-Limitations-for-S3-Bucket-Objects\/","rel":"alternate","type":"text\/html","title":"Solving AWS S3 Tagging Limits with Terraform: Strategies &amp; Tips"}},"published":"2024-01-27T00:00:00+13:00","updated":"2024-01-27T00:00:00+13:00","id":"https:\/\/neurowinter.com\/terraform\/2024\/01\/27\/Overcoming-AWS-Terraform-Providers-Tagging-Limitations-for-S3-Bucket-Objects","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"Terraform"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Navigating AI\u2019s Influence on Truth: Ethical Use &amp; Misinformation Risks","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/ai\/2023\/06\/20\/Artificially-Generated-Truth\/","rel":"alternate","type":"text\/html","title":"Navigating AI\u2019s Influence on Truth: Ethical Use &amp; Misinformation Risks"}},"published":"2023-06-20T00:00:00+12:00","updated":"2023-06-20T00:00:00+12:00","id":"https:\/\/neurowinter.com\/ai\/2023\/06\/20\/Artificially-Generated-Truth","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"AI"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Enhance Git Commit Quality with Commitizen: A Guide for Developers","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/git\/2023\/04\/04\/commitizen\/","rel":"alternate","type":"text\/html","title":"Enhance Git Commit Quality with Commitizen: A Guide for Developers"}},"published":"2023-04-04T00:00:00+12:00","updated":"2023-04-04T00:00:00+12:00","id":"https:\/\/neurowinter.com\/git\/2023\/04\/04\/commitizen","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"git"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Switching from AWS to Simplify Blog Hosting: A Personal Journey","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/meta\/2023\/01\/09\/removing-aws-blog\/","rel":"alternate","type":"text\/html","title":"Switching from AWS to Simplify Blog Hosting: A Personal Journey"}},"published":"2023-01-09T00:00:00+13:00","updated":"2023-01-09T00:00:00+13:00","id":"https:\/\/neurowinter.com\/meta\/2023\/01\/09\/removing-aws-blog","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"meta"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Setting Up GitHub SSH Keys for Specific Repositories: A Step-by-Step Guide","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/git\/2023\/01\/06\/git-repo-ssh-key\/","rel":"alternate","type":"text\/html","title":"Setting Up GitHub SSH Keys for Specific Repositories: A Step-by-Step Guide"}},"published":"2023-01-06T00:00:00+13:00","updated":"2023-01-06T00:00:00+13:00","id":"https:\/\/neurowinter.com\/git\/2023\/01\/06\/git-repo-ssh-key","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"git"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Aligning Dev Branch with Master: Techniques for Git Branch Reset","link":{"@attributes":{"href":"https:\/\/neurowinter.com\/git\/2023\/01\/04\/reset-dev-branch\/","rel":"alternate","type":"text\/html","title":"Aligning Dev Branch with Master: Techniques for Git Branch Reset"}},"published":"2023-01-04T00:00:00+13:00","updated":"2023-01-04T00:00:00+13:00","id":"https:\/\/neurowinter.com\/git\/2023\/01\/04\/reset-dev-branch","content":{"@attributes":{"type":"html"}},"author":{"name":"Alex Manson"},"category":{"@attributes":{"term":"git"}},"summary":{"@attributes":{"type":"html"}}}]}