RAM – The Heart of a Computer’s Memory

RAM, which stands for Random Access Memory, is a computer’s workspace—a temporary storage area where the computer processes and uses information. Let’s dive into what RAM is and why it’s essential for a computer to function. What is RAM? RAM, or Random Access Memory, is a type of computer memory that temporarily holds data and Read More …

Studio Notes – A Rhythm Guitar Pulse

Sometimes you want to feel a pulse of the track, but maybe the drums and bass are just not enough. If you have a strumming Rhythm guitar you can use your automation to make it pump to emphasize the beat. The pumping Rhythm guitar trick first of all select the Rhythm guitar track that you Read More …

What is an Electronic Press Kit or EPK

In the old days, physical press kits were paper-based and mailed old skool. Today, music artists can use digital media for promotion. This is known as an electronic press kit, or EPK. What is an EPK? An Electronic Press Kit is a digital resume for all audiences that is the promotional materials, giving everyone an Read More …

Quick Note :: Attribute Based Access

We then end up with two main classifications of access control: Role-Based Access Control (RBAC). Define the role for the access to data, eg Policy = Subject (AND/OR) Role –> Permissions. Attribute-Based Access Control (ABCL). Define attributes eg Policy = User (role, nationality) AND/OR Resource (department, owner) AND/OR Action AND/OR Context (time, IP, location) -> Read More …

NOTES :: Retrieval Augmented Generation (RAG)

A solution model pattern in how to leverage large language models. Systems that use LLM but on their own content. Start Large language models can be inconsistent. Sometimes they nail the answer to questions, other times they regurgitate random facts from their training data. If they occasionally sound like they have no idea what they’re Read More …

Some fun AWS reads

Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources https://www.aquasec.com/blog/bucket-monopoly-breaching-aws-accounts-through-shadow-resources/ Capturing Exposed AWS Keys During Dynamic Web Application Tests https://www.praetorian.com/blog/capturing-exposed-aws-keys-during-dynamic-web-application-tests/ AWS Network Firewall egress filtering can be easily bypassed https://canglad.com/blog/2023/aws-network-firewall-egress-filtering-can-be-easily-bypassed/

Changes in net worth of Congress Critters

Brought to you by Open Secrets. Just because I like to read the site. For the first time in history, the majority of America’s elected officials in Washington, D.C. are millionaires. At the same time, 50 percent of Americans cannot afford to spend $5,000 in an emergency.  For many people that number is even lower. Read More …

EDRKillShifter

“EDRKillShifter” is a type of malware specifically designed to disable Endpoint Detection and Response (EDR) security software on a system, allowing attackers to carry out malicious activities like deploying ransomware without detection; it is considered a sophisticated tool often used by cybercriminals to evade security measures. Key points about EDRKillShifter: Function: Its primary purpose is Read More …

I am new to Investing

So all of the folks of wisdom say that the stock market always goes up in the long run, although with plenty of unpredictable bumps along the way. Since you can’t predict those bumps until after they happen, there is no point in trying to dance in and out of it. In other words, the Read More …