Convolutional neural networks are very important in machine learning. If you want to do computer vision or…
Summary:This article provides an overview of different evasion techniques used to bypass security measures in software or…
The task of building a Natural Language Processing (NLP) text summarizer in one night from scratch is…
I was on an engagement where I simply could not elevate privileges, so I had to become…
On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some…
AWS Startup Security Baseline (AWS SSB) The Amazon Web Services (AWS) Startup Security Baseline (SSB) is a…
When a programmer presses ctrl-c inside of a command-line program, that program should stop what it’s doing, return to…
This post is an analysis of a file encryption solution that claimed to implement “AES-1024 military grade…
This analysis was the culmination of a ~6 month journey. It is unfortunate, that the software considered…
CAP Theorem explained You’ll often hear about the CAP theorem which specifies some kind of an upper…
Starting October 28th and fully resolving on October 31st, Roblox experienced a 73-hour outage.¹ Fifty million players regularly…
10 years ago, systemd was announced and swiftly rose to become one of the most persistently controversial…
I recently came up with what I think is an intuitive way to explain Bayes’ Theorem. I searched…
I decoded a recording I made with the Allen Telescope Array. I used an IQ sample rate…
Imagine that you wrote a program for a problem that is very easy to solve. Each thread…
In order to understand the differences between automatic differentiation libraries, let’s talk about the trade-offs that were…
When you start using a new reverse engineering platform for the first time, it can be hard…
Hello there. I took a break from my Internet activity but here I am again. In this…
The dynamics of staking on Ethereum under PoS are complicated by the increased variation in validator income.
Introduction Apple designed the iOS platform with security at its core. When we set out to create…
A few months ago we saw a post on the r/programminghorror subreddit: A developer describes the struggle of identifying a syntax…
Fizz Buzz is a common challenge given during interviews. The challenge goes something like this: Write a…
Why should you learn at least the basic Architecture Patterns as Software Engineer? I believe there are…
Bayesian histograms are a stupidly fast, simple, and nonparametric way to find how rare event probabilities depend…
Let’s dive into the interesting details, breaking down the general ideas into 18 concrete container security best…
Self-Parking Car in 500 Lines of Code TL;DR In this article, we’ll train the car to do…
Introduction It might be a bit funny to call this post “Hello IPv6”, since the first draft…
People sometimes wonder how the set of primitives in BQN was chosen. Outsiders to array programming might…
Convolutional neural networks are very important in machine learning. If you want to do computer vision or…
Summary: In this article we will demonstrate how to trigger an automated end to end data loading,…