Skip to main content

Baked Ziti

This dish is perfect for a dinner party or a long weekend. Sauce recipe serves 16, but its always better to make once and eat twice. Freeze the remaining sauce for up to 3 months or keep in the fridge for a week.

Time: 2.5 hrs
Active: 30 minutes
Inactive: 2 hrs

Ingredients

  • 2 Lbs Ground Beef, Browned, salt & peppered
  • 1 White Onion, chopped
  • 2 Lg or 4 Sm garlic cloves, minced
  • 3 oz Tomato Paste
  • 8 oz Red Wine
  • 2 28oz Cans Crushed Tomato
  • 2 14oz Cans Diced Tomato with Italian Herbs
  • Harissa Paste, to taste
  • 11/2 tsp Red Chili Flake
  • 1 Tbsp Italian seasoning, or 3x the amount of fresh herbs (Basil, Marjoram, Thyme, Oregano), chopped
  • 28 oz Water
  • 1 8 oz Block of Cream Cheese, softened
  • 11/2 Cup Cheddar, finely shredded
  • 1/2 Cup Parmesan, grated
  • 1/2 Cup Mozzarella, shredded
  • 3/4 Cup Italian Bread Crumbs
  • 1 Stick Salted butter, melted
  • 1 box Ridged Ziti, cooked al dente

Steps

  1. In a high walled, heavy bottomed dutch oven, brown beef in batches, salting and peppering as needed.
  2. Remove beef from dutch oven with a slotted wooden spoon.
  3. Sweat onions over a high heat. Once nearing translucence, add garlic and cook until fragrant.
  4. Add harissa paste and carmelize slightly.
  5. Wisk together the Tomato Paste and Wine in a small bowl and pour into the pot.
  6. Cook until the smell of alcohol has dissipated and sauce begins to thicken.
  7. Immediately introduce all the tomato products (crushed, diced), herbs, chili flake, and water. Work fond from bottom of pan.
  8. Bring to a gentle boil, reduce to low and cook uncovered for 1 hour, stirring infrequently.
  9. (Optional) 45 minutes into the reduction, introduce fresh chopped tomatoes, or whole peeled tomatoes from a can. This lends a bright citrusy flavor to the final dish.
  10. Begin preheating oven to 350F and introduce the cooked ground beef back into the sauce.
  11. In a separate pot, bring 8 Cups of heavily salted water to a boil and cook the ridged ziti to an al dente state.
  12. Remove half of the sauce and freeze.
  13. Add the block of cream cheese in small pieces and stir infrequently until thoroughly combined.
  14. Combine the remaining sauce and drained ziti in a 9" x 13" casserole dish.
  15. Top with cheese, bread crumbs, and melted butter, in that order.
  16. Cover with aluminum foil and bake until center of dish measures 165F and sauce is bubbling.
  17. Broil uncovered 3-4 minutes, checking frequently to prevent burns until golden brown.

Popular posts from this blog

Savory Dutch Babies

Ingredients: 1/4 Stick butter 1/2C AP flour 3/4C room temp milk 3 room temp eggs Salt pepper mace nutmeg allspice etc if you want it Blend it or whisk it until homogeneous  Put a castiron in a cold oven at 425°.  Remove when preheat finishes and melt in a 1\4 stick of butter.   Pour in batter.  Top with parm and fresh herbs.  Cook 15m.

Malicious OneNote

Anatomy of a Malicious Email Attachment With Microsoft’s recent changes to macros within the Office and M365 suite, Threat Actors have changed their TTPs to utilize the OneNote (.one) file type for Malicious Code Delivery TL;DR (.one) files are a binary blob capable of embedding any file type. Threat actors are utilizing the prolific nature of OneNote to execute malicious code on endpoints. Block (.one) files from incoming email and dissociate commonly abused file extensions. The Problem Microsoft recently modified the way legacy Office applications and M365 applications handle macros within documents. With the restrictions on macros tightening, threat actors have been forced to find new techniques to deliver malicious code to the endpoint. The Attackers Solution Microsoft’s OneNote application has two great benefits to an attacker. It’s present anywhere M365 is being used and the application saves files in binary blobs with no limit on file contents. By targeting the OneNote ap

Show And Tell

Once a week, our security team gathers everyone into a meeting and shares the last week’s worth of security related news and any new security initiatives. This one hour may be the most valuable meeting we attend and has the greatest impact on successful security outcomes. What is it? We call ours a Security Show & Tell. (You can call it whatever fun and exciting name fits your corporate culture.) Regardless of the name, the goal is to set aside an hour each week to share three kinds of security stories and our response to them. Stories that are in the news. Stories that impact our work. Stories that impact our lives. Author’s Note: There’s some helpful tips below on how to gather these stories.  Why you should do it There’s a lot of great reasons to do this, but I want to drive home a few really important ones. How many times has this happened to you? You wake up, open infosec.exchange , and begin scrolling only to find out that $Vendor has a nasty zero-day and organiza