Note: This article is being updated regularly. The latest update is as of 01/06/2021
Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you prevent cyber attacks on your personal or business resources.
At the end of this article, you will be able to conduct an advanced network analysis using one of the most common scanning tools.
Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you to prevent cyber attacks of your personal or business resources.
Note 2: This article is being updated regularly. The latest update is as of 29/05/2021.
At the end of this article, you will be able to perform footprinting and use many kinds of different footprinting tools on your own.
The power of C++ comes from references and pointers. It allows programmers to directly manage a memory — for best and efficient hardware performance. Nevertheless, it requires a very deep understanding of using it efficiently and in a way that will not create many bugs in the code.
This tutorial is an attempt to help programmers write better programs. Step-by-step comprehensive tutorial with many examples. However, even though these are fundamentals, yet very often misunderstood.
This is especially for people interested in learning C++, junior programmers or just for curious programmers from dynamic typed world.
The tutorial is divided into:
Every time when I look for any quality content on the web it usually brings me to articles on Medium. I’m mainly interested with publications on data science, artificial intelligence or programming where the quality matters. From my point of view, quality authors with quality articles have turned Medium one of the most successful content publishing platforms on the Internet. It offers lots of knowledge and, in the era of remote work, many possibilities… well, no wonder it has attracted so many writers.
But, how to take advantage of these opportunities as a writer? …
LexRank is a stochastic graph-based method for computing relative importance of textual units for Natural Language Processing. I used LexRank to summarize and extract the most relevant information from hundreds of articles, e.g. analysis on how to lose weight and how to succeed on a Medium as a writer. LexRank proved to work effectively — in my humble opinion.
At the first glance, the theory behind the algorithm seems complicated, but in reality, it’s very simple.
Let’s start with the official general description of the concept.
We consider a new approach, LexRank, for computing sentence importance based on the concept…
OpenCV is an open source computer vision and machine learning software library. It allows, with little effort, to build a computer vision application like for example a home security system that detects intruders.
OpenCV has already trained classifiers/cascades that may be of low precision in some particular scenarios.
This tutorial is a step-by-step instruction on how to train your own cascade for object detection. Let’s start!
Note: here is the official tutorial on training a custom cascade for advanced users that already have some background in CV and python
Top 3 Jobs that will be replaced by AI in the Near Future (and 3 that are safe)
It’s in human nature to fear of the unknown. Whether it’s a fear of a journey to another continent, changing a work or towards Artificial Intelligence.
“Don’t be afraid of being scared. To be afraid is a sign of common sense. Only complete idiots are not afraid of anything.” — Carlos Ruiz Zafón
On the other hand, without people who were a bit less afraid to try uncertain things, we would not have made such great progress.
In terms of AI the…
It’s easy to get lost among thousands of articles when we’re looking for ways to lose weight. The problem is that most of the articles claim to have an ideal recipe for fast and straightforward fat reduction.
In this article I use Natural Language Processing Techniques (NLP) to compare, extract and analyse hundreds of articles to find a holy grail of a natural, safe and long-lasting weight lost.
Note: remember to always advice with your doctor before kickstart any rigorous diet.
In this tutorial I will show how easy it is to build a cryptographic engine using a deep neural network.
You may ask why would you need that? — there are plenty of open source solutions to be used, yet.
The strength of having its own engine lies in:
Are you afraid of unknowns, and you always stay with only one way of implementation? Or you want to be a better python programmer?
Let me show you on why to use dict instead of if statements in your python program.
If statements and dicts are present in every modern programming language. Whereas if statements are especially designed to control flow of operations of a program, dicts are a data structures. Nevertheless, dicts may be used to control flow of operations the same as if statements, or even better!
Let’s see an example!
This is an example of if statement…