Maciej Zalwert

Sign in

Machine Learning Operations: how to deploy and manage (not only) machine learning models reliably and efficiently.

Introduction

Kubernetes is an undisputed leader in terms of scalability and modern application orchestration. Nevertheless, its capabilities comes with a price — it’s complexity.

In this article, I introduce a general view on Kubernetes architecture. At the end of the article, you will be equipped with a broad picture on how Kubernetes works, which is a fundament of understanding the tool deeply.

Interested in Kubernetes? Go and check out:

This article will cover:

  • Kubernetes pods
  • Kubernetes nodes
  • Kubernetes clusters

Kubernetes pods


Machine Learning Operations: how to deploy and manage (not only) machine learning models reliably and efficiently.

Image by Tara Winstead from Pexels

Introduction

In the first part of MLOps series, I introduced Kubernetes and showed on how to install it. In this article, I will introduce Kubernetes tools in more details.

This article will cover:

  • Kubectl: command-line tool for Kubernetes
  • Kubeadm: admin tools to create clusters
  • Kubelet: process that checks if all is running and healthy
  • Kind: tool to test Kubernetes

Kubectl: command-line tool for Kubernetes

Note: here’s a link to the official documentation

You can install the tool as follows:

apt-get install -y kubectl

Kubectl controls the Kubernetes cluster manager. You may think of a…


How counterintuitive birthday probability paradox helps hackers in cryptographic brute force attacks

Image by Craig Adderley from Pexels

Introduction

In its most interesting form hacking employs sophisticated techniques from different fields like: probability, programming and hardware.

In this article, I introduce how cyber criminals optimize brute force attacks with a fact that there is more than 50% chance of 2 or more people in a group of 23 sharing a birthday on the same day.

This article will cover:

  1. Birthday probability paradox
  2. Brute force birthday attack

Birthday probability paradox

Birthday paradox means:

The probability that a two or more people in a group of 23 share the same birthday is greater than 50%.

The…


Machine Learning Operations Series: how to deploy (not only) machine learning models reliably and efficiently.

Image by Tara Winstead from Pexels

This article is divided into two sections:

  1. In-depth introduction to Kubernetes. This section is for students, aspiring developers or managers that want to know the basics and what’s possible in this technology.
  2. Hands-on tutorial on how to set up Kubernetes with nodes. This should be especially interesting for AI engineers, DevOps and data engineers.


Note: The goal is to keep the content fresh and up to date. The latest update is as of 25/08/2021.

Image by Soumil Kumar from Pexels

Note: All the provided knowledge is to prevent cyber criminals by sharing the knowledge of existing vulnerabilities, tools and countermeasures.

Introduction

From the user perspective, login and logout seems like easy operation. However, in the background, there is a lot of going on. This complex operation allows hackers to lurk in the depths of this process awaiting to hijack your session.

I have bad news — current technology and countless vulnerabilities give a lot of ways for hackers to hijack a…


Intuition, Python, Excel and Math

www.pexels.com

I’ve never been interested in working for Google, but I’ve been seeing a lot of people that post interesting questions they ask in interviews.

Also, I don’t know how Google interview looks like, but I hope there’s a computer at hand if you need to use it.

The question that grab my attention recently was:

What’s the expected value of minimum of two random variables with uniform distribution between 0 and 1.

Mathematically, X and Y:


Note: This article is being updated regularly. The latest update is as of 19/08/2021.

Image by Tim Mossholder from Pexels

Note: All the provided knowledge is to prevent cyber criminals by sharing the knowledge of existing vulnerabilities, tools and countermeasures.

This article introduces one of the most common type of the cyberattack — Denial-of-Service (DoS) attack. The main goal behind DoS attack is to slow down or completely stop an online service or a computer like: email service, website, streaming platform or even a nuclear power plant station.

Let’s see what this article will cover:

  1. Introduction to Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
  2. Three of the most famous DDoS attacks
  3. Botnets explained —…


Note: This article is being updated regularly. The latest update is as of 19/08/2021.

Image by KEMAL HAYIT from Pexels

Note: All the provided knowledge is to prevent cyber criminals by sharing the knowledge of existing vulnerabilities, tools and countermeasures.

This article aims to provide knowledge on different kind of viruses that can infect our computers. It also describes ways on how to detect and defend against malware. A reader will also gain knowledge on the tools hackers use for writing malicious software.

This article will cover:

  1. Introduction to Malware and how to protect against them
  2. Advanced Persistent Threats (APTs) concept
  3. Types of trojans, viruses and other threats
  4. How to…

There is a lot of the usual stuff that we should do to protect our computers against viruses like: installing antivirus software or not clicking on every file from the web.

But, there are also some unusual things we can do as well.

Let’s check out!

1. Install Russian virtual keyboard in your computer

As discovered by cybersecurity experts, many viruses has a hard-coded DO-NOT-INSTALL list of countries. The list comes from the principal members of the Commonwealth of Independent States (CIS).

The full list of countries, in which some viruses will not install itself by default, as published by Cybereason, are:


Note: This article is being updated regularly. The latest update is as of 16/07/2021

Image by Markus Spiske from Pexels

Hacking is a very complex process. To defend against cybercriminals, you need to think as one and know how they operate. In this article I’m introducing tools and ways on how to gain and maintain access, escalate privileges and clear the traces.

This article will cover:

  1. Introduction to Operating System Hacking concepts
  2. How to escalate privileges
  3. How to maintain access
  4. Clearing logs by hackers
  5. How hackers gain access to victims’ machines

Introduction to Operating System Hacking concepts

System hacking is a process of identifying and exploiting vulnerabilities in OS and network systems to gain access to…

Maciej Zalwert

Experienced in AI/risk/quant/programming and passionate in data/hacking/tech

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store