Amazon Are Upping Their Print Costs For Books, Which Means Some (possibly Many) Self-pubbed Authors May

Amazon are upping their print costs for books, which means some (possibly many) self-pubbed authors may have to also up the cost of their book(s). I'd like to say now, to make it crystal clear for the record, this is not authors being greedy.

I think someone who looks up the royalty rate for KDP and sees "60% for exclusive publishing and 40% for non-exclusive" would think "Wow, these authors are getting paid good money!" but once you calculate the amount of the list price that Amazon eats after printing costs, that percentage can be literally pennies. The minimum, and I mean the absolute bare minimum that I could sell When Dealing with Wolves for after the changes is £12.48 – and if I did that, I would make £0.00. That's zero money. No royalties.

I repeat: 40% royalties on a book listed at £12.48 = nothing.

I currently have WDWW up at £14.00. My "40% cut" from that is £0.76. After the printing cost changes go into effect, I'll make £0.61 from each sale instead. I really don't want to up my prices, because frankly it enrages me that Amazon won't let me list my book for anything under £12, when the standard price of a fiction paperback in the UK is usually around £8.99 – but writing isn't my priority job, so I have that luxury. I'm not trying to make a living off my writing so much as using it to supplement what I make from the freelance career, which is a choice I made because I knew I could never cope with the workload required for a ""serious"" self-pubbed writing career without sabotaging myself. The £0.15 difference in royalties from one book sale isn't going to be the difference between me eating or not; it just really really annoys and disheartens me. (And, also, is further proof that I can't sustain a full-time writing career, because I'd run myself ragged for too little gain and then I wouldn't be able to eat).

But there are plenty of authors who are writing as their primary source of income, either because they can't do anything else or because they took the plunge they're building their career (and it shouldn't matter to you why someone is writing full-time, by the way. You want fiction media to interact with, then you need writers, and writers need to be paid in order to live in order to make more media). It's these authors who will have to up their book prices, and I feel in my bones that it's these authors who are going to face the backlash.

So, if you must be pissed off at someone, be pissed off at Amazon. The authors are probably pissed off, too (I certainly am!), so you'll be in good company.

(And if you can, buy the ebook version because we get better royalties, or see if the author has their own store where you can get the book, since they'll have more control over their own prices there).

More Posts from Silliestofmanygeeses and Others

6 months ago
Table Of Contents:

Table of Contents:

Part One: A New Standard Part Two: Types of Parents Part Three: Parents in Literature Part Four: Parents on the Page A Diversion: Reuniting Children With Changed Parents Part Five: Sibling Scenarios Part Six: Sibling Perception Part Seven: Writing Siblings A Diversion: Myths About Writing Close Sibling Relationships A Diversion: Siblings With Age Differences A Diversion: Writing Twins A Diversion: Making Siblings Important Part Eight: Knowing the Outer Family Part Nine: Piblings :: The Cool Extended Parents Part Ten: Qualifying Cousins Part Eleven: Cousin Appearances Part Twelve: Writing Cousins Part Thirteen: The Roots of Friendship Part Fourteen: The Definition of Friend Part Fifteen: Layers of Friendship Part Sixteen: Writing the Best Friend A Diversion: Writing Close Groups of Friends Part Seventeen: Surely Antagonistic Part Eighteen: Evil Manifests as Villain Part Nineteen: Protagonist in the Way Part Twenty: Conversations with Antagonists A Diversion: Writing the Rival to Friend Relationship A Diversion: Writing the Enemy to Grudging Respect Arc Part Twenty-One: Deepened Friendship Part Twenty-Two: Influences of Individual History Part Twenty-Three: Crafting Dates Part Twenty-Four: Expectations Part Twenty-Five: Healthy Relationships Part Twenty-Six: Unhealthy Relationships A Diversion: Writing the Supportive Friend Part Twenty-Seven: When Relationships Unravel Part Twenty-Eight: Mentors, Teachers, and Advisers Part Twenty-Nine: Wise Old Tropes

(Note from Pear: This series is indefinitely open to new posts. As they are added, this post will be updated. Like always, you can find original content in the posts by pear tag and the table of contents tag for series.)

5 months ago

Genuinely and unironically my philosophy abt music has expanded to “stop writing off music because it’s from a specific genre” and I think that could be applied to most mediums actually

RB if you think CD drives in computers are not obsolete, but in fact still necessary, despite being artificially phased out

Well since you all asked nicely...

Time you all learn how to get into being a hacker~!

Advance warning this will be a long post and as of typing this idk if tumblr has char limits so might need to continue in reblogs?

Right, so. You may be asking "How do I get into hacking?" and find yourself here because of it.

The answer is you just did it. Right there. By clicking that keep reading link you have just entered the world of hacking, because curiosity is everything. The innate urge to learn more, to know more, that is what hacking comes down to. You do more than just using a system, you question it. Ask yourself, what does the system do when i input these characters? How does it take my input and translate it into the function? Where does it store information in what way?

Have you ever tried inputting unexpected text into a field? For example, say a website asks for a particular input like your name, but instead you start putting in numbers or unexpected unicode. That right there is, by definition, the poking around that hacking uses. You're experimenting with unexpected use-cases. Often times if you try this, you may end up finding interesting results. In my example here, say instead of your name, you put ../../../../etc/passwd into the field. Suddenly when you hit enter, you get hit with a result of a bunch of names and data. That is a hack. The database to control the storage of your name instead received a command to back out of that database, and go into the etc folder to retrieve the passwd folder, which houses user data from that system. This, of course, assumes the system is running Linux, but it is an example. All hacking is, is poking around in ways the original programmer couldn't expect to find interesting results and broaden your access into things you shouldn't have.

Now, this is all well and good, but what if you want an actual way to learn this in person? Well the good news is there are plenty of legal avenues to get into hacking and broaden your experience! Personally I use HackTheBox for my CTFs through their labs. That means they run a thing called Capture The Flag, where they give you a single IP and you have to explore that system to find two different flag files to win. They also have competitive CTFs I have yet to try, but I do have a competitive tournament coming up next month for it. Then they also have the academy to teach you more via both hands-on methods and reading work. If you know next to nothing and want to get started in a safe learning environment, you can try out their academy or my next resource. TryHackMe! This website is more learning focused, and I have been taught a lot of what I know through it! It has free lessons along with premium ones for a subscription, so just know that only a selection of what you can learn here is free, but I do recommend them if you do feel like paying for that extra bit, as I would say what I learned from it was worth it and they focus on both offensive hacking, which I do, as well as the blue side for defensive hacking and even things like digital forensics if you're interested in that!

HackThisSite. No really, hack it! This website is a legal playground to try out scenarios from the unlikely to the realistic in varying difficulties to put your skills to the test!

There's many, many more resources to look into as well, those are just the first few off the top of my head. Beyond this, I'd say constantly stay up to date in cybersecurity news and read up on new large scale attacks, as the entire industry is a constant arms race with exciting twists to learn about! Beyond that there is no one right way to go about hacking, and there's never a stupid idea to it either!

Now, all this is well and good, but what about a real case example? Well luckily for you all I happen to have a machine up and running to show off a case example of a CTF in action. Today i'll be showing you the "Lame" box from HackTheBox, the first machine they ever published, now retired. I can access it thanks to VIP.

First thing's first, I'm using a laptop that I stripped of Windows 11 in favor of Linux, and specifically Kali Linux being the exact distro. If you're wanting to get into hacking at the VERY least use a VM with linux, but i beg of you dont use windows. You're asking for trouble both in terms of lack of tools and in terms of vulnerability. You're putting a VERY large target on your back by using Windows because of how vulnerable it is. Kali Linux is a nice option as it comes pre-built with tools, but if you want something more user friendly you can go for Parrot OS.

Once the OpenVPN connection is active and we have the Lame machine up and running, it gives us an IP and nothing more. The first thing you will want to do when this is the case is to use a tool called Nmap to scan that IP for active TCP ports. This shows you what open, and sometimes closed, connections that machine is running, along with information about them. I usually use the command with these particular flags. nmap -sV -Pn -p- (ip)

Well Since You All Asked Nicely...

It will output the ports we want to see, dont worry about how much text there is, we're focusing on just a small segment saying port numbers and a description of them

Well Since You All Asked Nicely...

Now that's interesting, looks like this is running Samba SMBD on ports 139 and 445, and thanks to a google search I know this is a vulnerable version. We'll take the quick route and just use a tool called Metasploit. In a typical run metasploit wont have what you need, but for the sake of time and post length, i'll just boot that up by running "msfconsole" and running a search for our exploit. On finding the one I need I select the payload.

Well Since You All Asked Nicely...

Next up, we need to equip the options for it, setting who our target is and where to send the information back to, in this case my VPN's IP.

Well Since You All Asked Nicely...

Once that's done, you simply say "run" and it will go! And what do you know, i'm in the system as a root user, aka full administrative privileges with access to both the user and root flag! In a typical CTF there are many more steps including usually getting into the user first, then exploiting into root. I, however, took the shorter route this time.

Well Since You All Asked Nicely...

(The flags change every run so you cant just copy paste them from my run.)

And that's that, machine conquered! We did it! Of course, in the real world of hacking there are many more steps, and it can even take multiple days to get everything you need from a target in a stealthy manner. The faster you move, the louder you are.

Now you know the basics though! Get out there and learn, google will be your friend and its never wrong to ask questions. My DMs are open if you have more to ask or just wanna talk hacking! :3

Legal, illegal, who cares im not a cop, have fun and stay curious~!


Tags
2 months ago

i created this masterpiece for an inside joke and now all of tumblr must witness my creation

I Created This Masterpiece For An Inside Joke And Now All Of Tumblr Must Witness My Creation
7 months ago

they say you snooze you lose, and well. heh. i snost and lost

BABIE BUGS! SQUAD UP!!!

BABIE BUGS! SQUAD UP!!!

I CANT GET OVER THE LECTURES MY HISTORY PROFESSOR RECORDED FOR US, HIS DAUGHTER KEEPS WALKING IN ITS SO FUCKING FUNNY & ADORABLE???

  • sylvasystem
    sylvasystem liked this · 4 months ago
  • helenadetroy-reads
    helenadetroy-reads reblogged this · 4 months ago
  • misfit-mania-the-first
    misfit-mania-the-first reblogged this · 6 months ago
  • misfit-mania-the-first
    misfit-mania-the-first liked this · 6 months ago
  • thehiddenbaroness
    thehiddenbaroness reblogged this · 6 months ago
  • homeboysgotguts
    homeboysgotguts reblogged this · 6 months ago
  • the-golden-comet
    the-golden-comet liked this · 1 year ago
  • xarrixii
    xarrixii liked this · 1 year ago
  • searchingforserendipity25
    searchingforserendipity25 liked this · 1 year ago
  • freebirds-poet
    freebirds-poet reblogged this · 1 year ago
  • freebirds-poet
    freebirds-poet liked this · 1 year ago
  • mistresskayla-blog1
    mistresskayla-blog1 liked this · 1 year ago
  • artistnamedlg
    artistnamedlg liked this · 1 year ago
  • frostybearpaws
    frostybearpaws liked this · 1 year ago
  • waterloosunrise
    waterloosunrise liked this · 1 year ago
  • napalm-waistcoat
    napalm-waistcoat reblogged this · 1 year ago
  • ghost-with-pen
    ghost-with-pen reblogged this · 1 year ago
  • haunted-closet
    haunted-closet liked this · 1 year ago
  • wearenotdoinggethelpp
    wearenotdoinggethelpp liked this · 1 year ago
  • wolfgirlstories
    wolfgirlstories liked this · 1 year ago
  • pabloernesto
    pabloernesto liked this · 1 year ago
  • squid--inc
    squid--inc reblogged this · 1 year ago
  • squid--inc
    squid--inc liked this · 1 year ago
  • ace-malarky
    ace-malarky reblogged this · 1 year ago
  • chauceryfairytales
    chauceryfairytales liked this · 1 year ago
  • foxy-lisard
    foxy-lisard reblogged this · 1 year ago
  • childofearthandsea
    childofearthandsea reblogged this · 1 year ago
  • phoenixmakeswords
    phoenixmakeswords reblogged this · 1 year ago
  • lux-scriptum
    lux-scriptum reblogged this · 1 year ago
  • hiraethdays
    hiraethdays liked this · 1 year ago
  • aerica13
    aerica13 liked this · 1 year ago
  • lanerose23
    lanerose23 liked this · 1 year ago
  • pixiealtaira
    pixiealtaira reblogged this · 1 year ago
  • meimeikyu
    meimeikyu liked this · 1 year ago
  • an-idiot-in-a-trenchcoat
    an-idiot-in-a-trenchcoat reblogged this · 1 year ago
  • an-idiot-in-a-trenchcoat
    an-idiot-in-a-trenchcoat liked this · 1 year ago
  • wipbigbang
    wipbigbang reblogged this · 1 year ago
  • hyperions-light
    hyperions-light reblogged this · 1 year ago
  • mattyxmk
    mattyxmk liked this · 1 year ago
  • fic-txt
    fic-txt reblogged this · 1 year ago
  • surfingpichu
    surfingpichu liked this · 1 year ago
  • nonbinarymissingno
    nonbinarymissingno reblogged this · 1 year ago
  • invenblocker
    invenblocker reblogged this · 1 year ago
  • nishiki-apologist
    nishiki-apologist liked this · 1 year ago
  • linguisticsho
    linguisticsho liked this · 1 year ago
  • rose-bookblood
    rose-bookblood reblogged this · 1 year ago
  • laylaylamode
    laylaylamode liked this · 1 year ago
  • peaceloveandafropuffs
    peaceloveandafropuffs liked this · 1 year ago
  • letsalltakeawalk
    letsalltakeawalk liked this · 1 year ago
  • graveexcitement
    graveexcitement liked this · 1 year ago

I’m not a bot, I just kinda like to browse and exist here occasionally :))))

193 posts

Explore Tumblr Blog
Search Through Tumblr Tags