A Content Delivery Network (CDN) is a distributed network of servers strategically located across various geographic locations. Its primary purpose is to deliver web content, such as images, videos, stylesheets, and scripts, to users more efficiently and quickly. By caching content on multiple servers, a CDN reduces the distance data must travel to reach end-users, Read More …
Tag: tmack
Neural Networks
Alright, let’s trace the fascinating journey of Neural Networks within the broader history of Artificial Intelligence. For someone new to AI, understanding this evolution is key to grasping where we are today and where the field might be headed. As we discussed earlier, the early days of AI in the mid-20th century were dominated by Read More …
Conference Video – Why We are Not Building a Defendable Internet
In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Month of AI Video – Hacking AI Infrastructure Providers for Fun
An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …
Notes – About GitHub-hosted runners
GitHub offers hosted virtual machines to run workflows. The virtual machine contains an environment of tools, packages, and settings available for GitHub Actions to use. Overview of GitHub-hosted runners Runners are the machines that execute jobs in a GitHub Actions workflow. For example, a runner can clone your repository locally, install testing software, and then Read More …
AZ 900 – Part II – Architecture & Security I
Microsoft Azure is a comprehensive cloud computing platform that provides a wide range of services, including computing power, storage, networking, databases, analytics, and more. Understanding its global infrastructure involves several key concepts: Regions and Availability Zones Regions: Azure is divided into geographic regions, which are clusters of data centers located in specific areas around the Read More …
Conference Video – Former CIA Officer Will Teach You How to Spot a Lie
In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal Read More …
Malware TV – Reverse Engineering
CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
LLM – Large Language Model
A non-technical definition………. Imagine you have a friend who is an incredible storyteller. This friend has read thousands of books, articles, and conversations, absorbing all kinds of information about the world. When you ask them a question or give them a topic, they can quickly come up with a thoughtful response, tell a story, or Read More …