サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
パリ五輪
danielmiessler.com
This resource is a first thrust at a framework for thinking about how to attack AI systems. At the time of writing, GPT-4 has only been out for a couple of months, and ChatGPT for only 6 months. So things are very early. There has been, of course, much content on attacking pre-ChatGPT AI systems, namely how to attack machine learning implementations. It’ll take time, but we’ve never seen a technol
tmux lets you keep things running persistently on servers, so you can disconnect and connect as needed without interrupting tasks that are in progress.
Over at Hacker News there are often threads about less-traveled UNIX and Linux commands. One particular comment collected a few of the posts, and I decided to parse all of those threads’ commands, plus my own favorite list of obscure entries, and put them in one place. column: create columns from text input tr: translate/substitute/delete input join: like a database join but for text comm: file co
Learn Vim For the Last TimeA tutorial and primer that teaches Vim as language instead of commands The problem with learning Vim is not that it’s hard to do—it’s that you have to keep doing it. This guide will break that cycle, ensuring this is the last time you will learn it. There are dozens of Vim references online, but most of them either go ninja straight away, or start basic and don’t go much
If you enjoy the command line then you don’t need to be sold on efficiency or purity of action. But even those who grok CLI are unaware of a number of ways to be more elegant accomplishing their tasks. Here are a few of my favorites. When was the last time you used your CAPSLOCK key? Yeah, me too. It’s a relic, and it’s right there on the home line wasting useful real estate. Let’s make it functio
Perhaps the most obvious and powerful of changes in our world is the penetration of computers into our personal lives. This is penetration to the point of integration — to the point of augmentation. No surprise there; everyone’s talking about it. One less obvious result of this monumental shift, however, is that the skill of programming will move from a field specialization to a life skill. It wil
Unsupervised LearningUnsupervised Learning is a Security, AI, and Meaning-focused show that looks at how best to thrive as humans in a post-AI world. It combines original ideas and analysis to bring you not just what's happening—but why it matters, and how to respond. NewsletterPhilosophyPersonalInformation SecurityPodcastCreativityEudaimoniaFutureProductivityBlogBusinessAITutorialTechnologyPoliti
Understanding how these components work together is the key to understanding git. First and foremost, it’s important to understand that git has something called an index that sits between your working directory and your commits. It’s basically a staging area, so when you git add you copy a snapshot of your working directory to the index, and when you git commit you copy that same thing from the in
A tcpdump Tutorial with Examples 50 ways to isolate traffic for cybersecurity, network administration, and other technical roles Introduction Overview of tcpdump Basics of traffic isolation Getting Started with tcpdump Viewing traffic on an interface Viewing HTTPS traffic Limiting packets Information Security Examples Capturing credentials Monitoring suspicious domain traffic SMB Traffic Capturing
find is one of the most useful Linux/Unix tools in the toolbelt, but most people use only a fraction of its power. Many Linux/Unix questions seen online can be solved using the find command alone, getting familiar with its main functionality is one of the best things you can do for yourself in the long-term. find lets you do anything from finding all your .jpg files to seeing “all of Michael’s tex
lsof is the sysadmin/security über-tool. I use it most for getting network connection related information from a system, but that’s just the beginning for this powerful and too-little-known application. The tool is aptly called lsof because it “lists open files“. And remember, in UNIX just about everything (including a network socket) is a file. Interestingly, lsof is also the Linux/Unix command w
このページを最初にブックマークしてみませんか?
『Unsupervised Learning』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く