Convolutional neural networks are very important in machine learning. If you want to do computer vision or image recognition tasks, you simply can’t go without them. But it can be hard to understand how they work. In this post, we will talk about the mechanisms behind…
Summary:This article provides an overview of different evasion techniques used to bypass security measures in software or tools. Key takeaways: Counter arguments: Introduction Signature-based Detection bypasses are a simple way to attempt to evade detection from antivirus and endpoint security software, relying on a signature…
The task of building a Natural Language Processing (NLP) text summarizer in one night from scratch is a challenging but rewarding endeavor. This project aims to demonstrate the feasibility of quickly creating a basic NLP summarization tool, using various NLP techniques and algorithms. The summarizer…
On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some vulnerability in Chromium Javascript engine v8. At the same time, the regression test case regress-1196683.js for this bugfix was also submitted. Based on this regression test case, some…
AWS Startup Security Baseline (AWS SSB) The Amazon Web Services (AWS) Startup Security Baseline (SSB) is a set of controls that create a minimum foundation for businesses to build securely on AWS without decreasing their agility. The controls in this guide are designed with early…
When a programmer presses ctrl-c inside of a command-line program, that program should stop what it’s doing, return to the nearest sensible restart position, and allow you to continue where you left off. This isn’t much different from insisting on “one-button builds,” except it’s an older phenomenon….
This analysis was the culmination of a ~6 month journey. It is unfortunate, that the software considered the “gold standard” for remote proctored exams is in the current state it is. This post was motivated purely for informational purposes and I do not condone any…