Imagine you have two artists: a forger and an art critic. The forger tries to create fake paintings that look just like the real ones, while the critic tries to distinguish the fakes from the authentic pieces. As they both get better at their jobs, the forger becomes more skilled at creating convincing fakes, and Read More …
Tag: tmack
Hacker TV – Hacker Course Buffer Overflow
A first step to become a true Hacker.
RNN – Recurrent Neural Networks
In the realm of Artificial Intelligence, many tasks involve understanding data that unfolds over time or has a sequential structure. Think of comprehending spoken language, predicting stock prices, or even generating music. Traditional neural networks, designed to process independent inputs, often fall short in these scenarios. This is where Recurrent Neural Networks (RNNs) come into Read More …
CNN – Convolutional Neural Networks
Convolutional Neural Networks (CNNs) were inspired by the way the human visual cortex works, CNNs are a specialized type of neural network particularly adept at analyzing and understanding images. They are the engine behind many impressive AI applications, from recognizing faces in photos to powering autonomous vehicles. Traditional neural networks, while powerful, can struggle with Read More …
RAG: Giving AI a Better Memory
Imagine you’re trying to answer a tough question, but your brain doesn’t have the specific information. What do you do? You probably look it up – maybe on the internet or in a book. Retrieval-Augmented Generation, or RAG, is a way to give AI models a similar ability. Think of a powerful AI language model as Read More …
AZ 900 – Part II – Architecture & Security II
Microsoft Azure is a powerful cloud computing platform that provides a wide range of services and resources for building, deploying, and managing applications and services through Microsoft-managed data centers. Understanding the structure of Azure is essential for effectively utilizing its capabilities. Key components of Azure’s organizational structure include subscriptions, management groups, resource groups, and resources. Read More …
CDN – Content Delivery Network
A Content Delivery Network (CDN) is a distributed network of servers strategically located across various geographic locations. Its primary purpose is to deliver web content, such as images, videos, stylesheets, and scripts, to users more efficiently and quickly. By caching content on multiple servers, a CDN reduces the distance data must travel to reach end-users, Read More …
Neural Networks
Alright, let’s trace the fascinating journey of Neural Networks within the broader history of Artificial Intelligence. For someone new to AI, understanding this evolution is key to grasping where we are today and where the field might be headed. As we discussed earlier, the early days of AI in the mid-20th century were dominated by Read More …
Conference Video – Why We are Not Building a Defendable Internet
In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …