SlideShare une entreprise Scribd logo
1  sur  23
Letting Go of Control




A 12-Step Program for Embracing the Cloud
with host Taylor Banks                      Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Hi, I’m Taylor

                            • and I’m a control freak.
                            • and I’m a security professional.
                            • and I’m a bit OCD.
                            • and I just put my data in the cloud.

                                                                 Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 1: Admit that you
                 are powerless over cloud
                                      Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
The cloud is coming




                   Step 1: Admit that you
                 are powerless over cloud
                                      Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
The cloud is coming
 Recognize that it’s happening




                   Step 1: Admit that you
                 are powerless over cloud
                                      Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
The cloud is coming
 Recognize that it’s happening
 You are [not] in control




                   Step 1: Admit that you
                 are powerless over cloud
                                      Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
The cloud is coming
 Recognize that it’s happening
 You are [not] in control




                            CONTROL
                                      Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
*These statements have not been evaluated by the CSA
      This presentation is not designed to diagnose, prevent,
     treat or cure any cloud security problems / conditions.




                                                   Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 2: Believe that a provider
 greater than yourself exists




                      and is necessary to meet the needs of your dynamic
                                     customer population
                                                                   Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 2: Believe that a provider
 greater than yourself exists

                             •100,000,000 purchase orders
                             •100,000 hackers from China
                             •100 users from Iowa



                      and is necessary to meet the needs of your dynamic
                                     customer population
                                                                   Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 3: Make a
                                      decision to turn
                                         your life and
                                     your will over to


                                                     (as we
                                                 understand
                                                   Google)
Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 4: Make a searching and
    fearless inventory of your
            datacenter




                            Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 5: Admit to Google, to
                        yourself, and another human
                            being the exact nature of your
Saturday, October 9, 2010
                                  data indiscretions    Copyright (C) 2010 by Taylor Banks
Step 6: Demonstrate a
  readiness to remote desktop
Saturday, October 9, 2010
                            Copyright (C) 2010 by Taylor Banks
Step 7: Humbly ask
               others to host your data




Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 8: Make
                            a list of places where
                              your data remains
                                  unprotected
                                and be willing to encrypt it all




                                                                   Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 9:
                                        Encrypt all
                                       unprotected
                                           data



                            except when to do so would affect its usability
                                                                        Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 9: Encrypt all unprotected data
                            `
                            except when to do so would affect its usability




                                                                        Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 10: Continue to
            inventory your use of the
                      cloud

                            and when wrong, promptly admit it   Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 11: Seek through prayer
and mediation to improve your
conscious contact with Google
   as we understand Google,
 praying only for knowledge of
  Google's will for us and the
    power to carry that out
                            Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Step 12: Having had a spiritual
awakening, carry this message
   to other control freaks



                     and practice these principles in your affairs
                                                             Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010
Thank you!
                            Taylor@Cloudin48.com




                                        Copyright (C) 2010 by Taylor Banks
Saturday, October 9, 2010

Contenu connexe

En vedette

Wireless Power Transmission Options For Space Solar Power
Wireless Power Transmission Options For Space Solar PowerWireless Power Transmission Options For Space Solar Power
Wireless Power Transmission Options For Space Solar PowerVinayaka Karanth
 
White Paper A New Way Of Working Microsoft Netherlands External[1]
White Paper A New Way Of Working Microsoft Netherlands External[1]White Paper A New Way Of Working Microsoft Netherlands External[1]
White Paper A New Way Of Working Microsoft Netherlands External[1]Mark Meerbeek
 
Evan LaPointe: B2B & Social Media: Performance, Measurements, and SEO Benefits
Evan LaPointe: B2B & Social Media: Performance, Measurements, and SEO BenefitsEvan LaPointe: B2B & Social Media: Performance, Measurements, and SEO Benefits
Evan LaPointe: B2B & Social Media: Performance, Measurements, and SEO BenefitsLIFT Summit 2009
 
Erik Qualman: How Social Media Transforms the Way We Do Business
Erik Qualman: How Social Media Transforms the Way We Do BusinessErik Qualman: How Social Media Transforms the Way We Do Business
Erik Qualman: How Social Media Transforms the Way We Do BusinessLIFT Summit 2009
 
SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!
SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!
SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!David Berkowitz
 
Top 5 Insights: SXSW 2016
Top 5 Insights: SXSW 2016 Top 5 Insights: SXSW 2016
Top 5 Insights: SXSW 2016 ibmmobile
 
Banasura Hill Resort: Heaven Made of Earth
Banasura Hill Resort: Heaven Made of Earth Banasura Hill Resort: Heaven Made of Earth
Banasura Hill Resort: Heaven Made of Earth Banasura Hill Resort
 

En vedette (15)

Education
EducationEducation
Education
 
Wireless Power Transmission Options For Space Solar Power
Wireless Power Transmission Options For Space Solar PowerWireless Power Transmission Options For Space Solar Power
Wireless Power Transmission Options For Space Solar Power
 
johlen
johlenjohlen
johlen
 
Reasons to-smile
Reasons to-smileReasons to-smile
Reasons to-smile
 
White Paper A New Way Of Working Microsoft Netherlands External[1]
White Paper A New Way Of Working Microsoft Netherlands External[1]White Paper A New Way Of Working Microsoft Netherlands External[1]
White Paper A New Way Of Working Microsoft Netherlands External[1]
 
Evan LaPointe: B2B & Social Media: Performance, Measurements, and SEO Benefits
Evan LaPointe: B2B & Social Media: Performance, Measurements, and SEO BenefitsEvan LaPointe: B2B & Social Media: Performance, Measurements, and SEO Benefits
Evan LaPointe: B2B & Social Media: Performance, Measurements, and SEO Benefits
 
Erik Qualman: How Social Media Transforms the Way We Do Business
Erik Qualman: How Social Media Transforms the Way We Do BusinessErik Qualman: How Social Media Transforms the Way We Do Business
Erik Qualman: How Social Media Transforms the Way We Do Business
 
Mindshare NA's Guide to SXSW 2016
Mindshare NA's Guide to SXSW 2016Mindshare NA's Guide to SXSW 2016
Mindshare NA's Guide to SXSW 2016
 
Issa 042711
Issa 042711Issa 042711
Issa 042711
 
CitizenShift Media in Action Presentation
CitizenShift Media in Action PresentationCitizenShift Media in Action Presentation
CitizenShift Media in Action Presentation
 
SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!
SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!
SXSW 2016 Preview: #DamnSXSW, back at it again with the Obamas!
 
Banasura Hill Resort Wayanad
Banasura Hill Resort WayanadBanasura Hill Resort Wayanad
Banasura Hill Resort Wayanad
 
Top 5 Insights: SXSW 2016
Top 5 Insights: SXSW 2016 Top 5 Insights: SXSW 2016
Top 5 Insights: SXSW 2016
 
Banasura Hill Resort: Heaven Made of Earth
Banasura Hill Resort: Heaven Made of Earth Banasura Hill Resort: Heaven Made of Earth
Banasura Hill Resort: Heaven Made of Earth
 
3G TECHNOLOGY
3G TECHNOLOGY3G TECHNOLOGY
3G TECHNOLOGY
 

Similaire à Letting Go of Control - #BSidesATL 2010

OpenStack Summit, A Community of Service Providers
OpenStack Summit, A Community of Service ProvidersOpenStack Summit, A Community of Service Providers
OpenStack Summit, A Community of Service ProvidersAndrew Shafer
 
Making social media work
Making social media workMaking social media work
Making social media workJames Williams
 
Cloud Adoption Secrets
Cloud Adoption SecretsCloud Adoption Secrets
Cloud Adoption SecretsJustin Pirie
 
The digital revolution has only just begun
The digital revolution has only just begunThe digital revolution has only just begun
The digital revolution has only just begunKate Carruthers
 
GTEC: Government as a Platform
GTEC: Government as a PlatformGTEC: Government as a Platform
GTEC: Government as a PlatformTim O'Reilly
 
Advanced android
Advanced androidAdvanced android
Advanced androiddonnfelker
 

Similaire à Letting Go of Control - #BSidesATL 2010 (6)

OpenStack Summit, A Community of Service Providers
OpenStack Summit, A Community of Service ProvidersOpenStack Summit, A Community of Service Providers
OpenStack Summit, A Community of Service Providers
 
Making social media work
Making social media workMaking social media work
Making social media work
 
Cloud Adoption Secrets
Cloud Adoption SecretsCloud Adoption Secrets
Cloud Adoption Secrets
 
The digital revolution has only just begun
The digital revolution has only just begunThe digital revolution has only just begun
The digital revolution has only just begun
 
GTEC: Government as a Platform
GTEC: Government as a PlatformGTEC: Government as a Platform
GTEC: Government as a Platform
 
Advanced android
Advanced androidAdvanced android
Advanced android
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Letting Go of Control - #BSidesATL 2010

  • 1. Letting Go of Control A 12-Step Program for Embracing the Cloud with host Taylor Banks Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 2. Hi, I’m Taylor • and I’m a control freak. • and I’m a security professional. • and I’m a bit OCD. • and I just put my data in the cloud. Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 3. Step 1: Admit that you are powerless over cloud Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 4. The cloud is coming Step 1: Admit that you are powerless over cloud Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 5. The cloud is coming Recognize that it’s happening Step 1: Admit that you are powerless over cloud Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 6. The cloud is coming Recognize that it’s happening You are [not] in control Step 1: Admit that you are powerless over cloud Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 7. The cloud is coming Recognize that it’s happening You are [not] in control CONTROL Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 8. *These statements have not been evaluated by the CSA This presentation is not designed to diagnose, prevent, treat or cure any cloud security problems / conditions. Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 9. Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 10. Step 2: Believe that a provider greater than yourself exists and is necessary to meet the needs of your dynamic customer population Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 11. Step 2: Believe that a provider greater than yourself exists •100,000,000 purchase orders •100,000 hackers from China •100 users from Iowa and is necessary to meet the needs of your dynamic customer population Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 12. Step 3: Make a decision to turn your life and your will over to (as we understand Google) Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 13. Step 4: Make a searching and fearless inventory of your datacenter Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 14. Step 5: Admit to Google, to yourself, and another human being the exact nature of your Saturday, October 9, 2010 data indiscretions Copyright (C) 2010 by Taylor Banks
  • 15. Step 6: Demonstrate a readiness to remote desktop Saturday, October 9, 2010 Copyright (C) 2010 by Taylor Banks
  • 16. Step 7: Humbly ask others to host your data Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 17. Step 8: Make a list of places where your data remains unprotected and be willing to encrypt it all Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 18. Step 9: Encrypt all unprotected data except when to do so would affect its usability Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 19. Step 9: Encrypt all unprotected data ` except when to do so would affect its usability Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 20. Step 10: Continue to inventory your use of the cloud and when wrong, promptly admit it Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 21. Step 11: Seek through prayer and mediation to improve your conscious contact with Google as we understand Google, praying only for knowledge of Google's will for us and the power to carry that out Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 22. Step 12: Having had a spiritual awakening, carry this message to other control freaks and practice these principles in your affairs Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010
  • 23. Thank you! Taylor@Cloudin48.com Copyright (C) 2010 by Taylor Banks Saturday, October 9, 2010