BeNN
1.1K subscribers
915 photos
82 videos
115 files
154 links
From simple ML algorithms to Neural Networks and Transformers โ€” and from Number Theory to Topology, Cosmology to QED โ€” dive into the world where code meets the cosmos.๐Ÿ‘จโ€๐Ÿ’ป๐ŸŒŒ

For Any Questions @benasphy
Download Telegram
How To Get Unlimited Instagram Likes
โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ”นStep 1: Head to temp-mail.org and Create a Temporary mail-id for Free.


๐Ÿ”นStep 2: Copy the Mail ID and Head to smmbooster.com and use the temporary mail to sign-up.


๐Ÿ”นStep 3: Make sure to do the confirmation in the Mail and solve the captcha.


๐Ÿ”นStep 4: Click the check mark ON and create the order for the free 300 likes.


๐Ÿ”นStep 5: Enter your post link and wait until youโ€™ve receive them.


๐Ÿ”นStep 6: Repeat the process until you get your desired amount of likes.


โš ๏ธNote: If you get banned from smmbooster.com, just turn on your VPN and clear your browser cookies.


โœ… Thatโ€™s it youโ€™re done, Get unlimited likes on your Instagram page. Make sure to Turn on the Notification in our channel for more cool Updates.

Please Share and Support โค๏ธ
@amazing_space_fact
๐Ÿ”ฅ8๐Ÿค”1
2022 Nobel prize laureate in physics
The Royal Swedish Academy of Sciences has decided to award the 2022 Nobel Prize in Physics to Alain Aspect, John F. Clauser and Anton Zeilinger โ€œfor experiments with entangled photons, establishing the violation of Bell inequalities and pioneering quantum information science.โ€
Alain Aspect, John Clauser and Anton Zeilinger have each conducted groundbreaking experiments using entangled quantum states, where two particles behave like a single unit even when they are separated. Their results have cleared the way for new technology based upon quantum information.
The ineffable effects of quantum mechanics are starting to find applications. There is now a large field of research that includes quantum computers, quantum networks and secure quantum encrypted communication.
One key factor in this development is how quantum mechanics allows two or more particles to exist in what is called an entangled state. What happens to one of the particles in an entangled pair determines what happens to the other particle, even if they are far apart.
For a long time, the question was whether the correlation was because the particles in an entangled pair contained hidden variables, instructions that tell them which result they should give in an experiment. In the 1960s, John Stewart Bell developed the mathematical inequality that is named after him. This states that if there are hidden variables, the correlation between the results of a large number of measurements will never exceed a certain value. However, quantum mechanics predicts that a certain type of experiment will violate Bellโ€™s inequality, thus resulting in a stronger correlation than would otherwise be possible.
John Clauser developed John Bellโ€™s ideas, leading to a practical experiment. When he took the measurements, they supported quantum mechanics by clearly violating a Bell inequality. This means that quantum mechanics cannot be replaced by a theory that uses hidden variables.
Some loopholes remained after John Clauserโ€™s experiment. Alain Aspect developed the setup, using it in a way that closed an important loophole. He was able to switch the measurement settings after an entangled pair had left its source, so the setting that existed when they were emitted could not affect the result.
Using refined tools and long series of experiments, Anton Zeilinger started to use entangled quantum states. Among other things, his research group has demonstrated a phenomenon called quantum teleportation, which makes it possible to move a quantum state from one particle to one at a distance.
โ€œIt has become increasingly clear that a new kind of quantum technology is emerging. We can see that the laureatesโ€™ work with entangled states is of great importance, even beyond the fundamental questions about the interpretation of quantum mechanics,โ€ says Anders Irbaโ€Œck, Chair of the Nobel Committee for Physics.
Learn more
Press release: https://bit.ly/3BLf9gK
Popular information: https://bit.ly/3R3qZYZ
Advanced information: https://bit.ly/3Sa43IS
๐Ÿ”ฅ5๐Ÿ‘1
The explosion of NASA's Challenger Space Shuttle only 73 seconds after it launched in 1986 is one of the U.S. space agency's worst-ever disasters, resulting in the loss of life of all seven crew members onboard, including a schoolteacher taking part in a new NASA initiative.

Find out more at https://ie.social/4xbQV ๐Ÿš€
A robot at Gloucestershire Royal Hospital (GRH), United Kingdom, saved the life of a 61-year-old patient by removing a cancerous tumor from their throat, in what can be called a first in the country.

Grandfather Martin Nugent is in high spirits after a surgical team comprising Gloucestershire Royal Hospital surgeons Simon Higgs and Steve Hornby employed Versius, a modern, cutting-edge robot from CMR Surgical, to operate earlier in July.

Find out more at https://ie.social/V9MxV ๐Ÿš€
๐Ÿคฏ2
Paleontologists have uncovered the first known incident of a mammal being eaten by a dinosaur.

Hold your horses. Scientists have confirmed that the mammal would not have been a human ancestor.

Find out more at https://ie.social/4aE64 ๐Ÿš€
๐Ÿ‘1๐Ÿ˜ฑ1
Colonizing space will undoubtedly be one of humanity's most important future achievements. Establishing a colony in space is a big part of the work of the world's leading technology giants. But colonizing space isn't just for big tech giants, of course.

Engineers at the University of California, Irvine said microbes could help colonize the Moon and Mars.

Find out more at https://ie.social/4LmBe ๐Ÿš€
๐Ÿ‘1
The National Institute of Standards and Technology researchers have developed a deep learning algorithm called BreatheSmart that can monitor your breathing based on minuscule changes in Wi-Fi signals.

Prior research has already looked into using Wi-Fi signals to sense people or movement, but they required custom sensing devices, and data from those studies were limited.

Find out more at https://ie.social/V01QN ๐Ÿš€
โค1๐Ÿ‘1
Do u wanna get Netflix account and telegram premium for free from bot?
Anonymous Poll
82%
Yeah
18%
Nope
BeNN
https://t.me/Nathan_generator_bot?start=5099158819
Use it 100% guaranteed
๐Ÿ‘1
โ€‹โ€‹๐Ÿ‘น MAN IN THE MIDDLE ATTACKโœˆ

Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website.

Attackers have many different reasons and methods for using a MITM attack. Typically, theyโ€™re trying to steal something, like credit card numbers or user login credentials. Sometimes theyโ€™re snooping on private conversations, which might include trade secrets or other valuable information

๐Ÿ˜‰Usefull Types of Man-in-the Middle Attacks

โญ Wi-Fi Eavesdropping

If youโ€™ve ever used a laptop in a coffee shop, you may have noticed a pop-up that says โ€œThis network is not secure.โ€ Public wi-fi is usually provided โ€œas-is,โ€ with no guarantees over the quality of service.

However, unencrypted wi-fi connections are easy to eavesdrop. Itโ€™s much like having a conversation in a public restaurant โ€“ anyone can listen in

Another Wi-Fi Eavesdropping attack happens when a hacker creates its own wi-fi hotspot, called an โ€œEvil Twin.โ€ They make the connection look just like the authentic one, down to the network ID and passwords. Users may accidentally (or automatically) connect to the โ€œevil twin,โ€ allowing the hacker to snoop on their activity.


โญ Email Hijacking

In this type of cyber security attack, a hacker compromises a userโ€™s email account. Often, the hacker silently waits, gathering information and eavesdropping on the email conversations. Hackers may have a search script that looks for specific keywords, like โ€œbankโ€ or โ€œsecret Democrat strategies.โ€

Email hijacking works well with social engineering. Hackers might use information from a hacked email account to impersonate an online friend. They may also use spear-phishing to manipulate a user to install malicious software.


โญ Session Hijacking

This type of Man-in-the attack is typically used to compromise social media accounts. With most social media sites, the website stores a โ€œsession browser cookieโ€ on the userโ€™s machine. This cookie is invalidated when the user logs off. But while the session is active, the cookie provides identity, access, and tracking information.

A Session Hijack occurs when an attacker steals a session cookie. This can happen if the userโ€™s machine is infected with malware or browser hijackers. It can also happen when an attacker uses a cross-scripting XSS attack โ€“ where the attacker injects malicious code into a frequently-used website.
๐Ÿ‘1
Have you heard of the mysterious hacking group known only as Anonymous? Behind their trademark Guy Fawkes masks lurks a global collective of cyber-vigilantes who hijack computer systems in pursuit of their own brand of justice.

Anonymous first caught the public's attention by taking down the Church of Scientology's websites after the church tried to censor an embarrassing video. But their technological prowess was only just beginning.

In 2011, Anonymous launched attacks on Middle Eastern governments to support Arab Spring protestors. Calling themselves "hacktivists," they disabled government websites and accessed sensitive documents to expose corruption. Authorities scrambled to stop their infiltration but with little success against these digital rebels!

Perhaps most brazen was Anonymous' revenge on the FBI for shutting down the dark web site Silk Road. Within days, Anonymous hackers seized control of FBI servers and released sensitive files revealing the irony of the FBI's own hacking programs! A bold attack on the world's top law enforcement agency.
While their methods are legally and ethically questionable, Anonymous continues to thrive. This decentralized collective has proven nearly impossible to stop, going wherever their unique code of online vigilantism takes them.

Does Anonymous' brand of rogue hacking do more good than harm? Or are they cyber-terrorists who should be stopped? What do you think? Share your thoughts below!
๐Ÿ˜ฑ3๐Ÿ‘2๐Ÿ”ฅ1