https://www.microsoft.com/en-us/research/blog/high-resolution-network-a-universal-neural-architecture-for-visual-recognition/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Microsoft Research
High-Resolution Network: A universal neural architecture for visual recognition - Microsoft Research
HRNet, created from general vision tasks, leads in many computer vision fields like semantic segmentation, human pose estimation, and object detection. Discover how HRNet achieves better results with fewer parameter and computation complexities.
#technews #cybersecurity
Hundreds of malicious Chrome browser extensions used to spy on you!
https://securityaffairs.co/wordpress/105007/cyber-crime/chrome-browser-extensions-surveillance.html?utm\_source=rss&utm\_medium=rss&utm\_campaign=chrome-browser-extensions-surveillance
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Hundreds of malicious Chrome browser extensions used to spy on you!
https://securityaffairs.co/wordpress/105007/cyber-crime/chrome-browser-extensions-surveillance.html?utm\_source=rss&utm\_medium=rss&utm\_campaign=chrome-browser-extensions-surveillance
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Security Affairs
Hundreds of malicious Chrome browser extensions used to spy on you!
Malicious Chrome extensions were employed in surveillance campaign on a large scale, millions of users potentially impacted.
How to Avoid Data Leakage When Performing Data Preparation
https://machinelearningmastery.com/data-preparation-without-data-leakage/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
https://machinelearningmastery.com/data-preparation-without-data-leakage/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
MachineLearningMastery.com
How to Avoid Data Leakage When Performing Data Preparation - MachineLearningMastery.com
Data preparation is the process of transforming raw data into a form that is appropriate for modeling. A naive approach to preparing data applies the transform on the entire dataset before evaluating the performance of the model. This results in a problemβ¦
ββπ°GetAltName β Discover Sub-Domains From SSL Certificatesπ°
GetAltName itβs a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers. Itβs useful in a discovery phase of a pen-testing assessment, this tool can provide you with more information about your target and scope.
πDownload: https://bit.ly/2AiTrEM
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
GetAltName itβs a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers. Itβs useful in a discovery phase of a pen-testing assessment, this tool can provide you with more information about your target and scope.
πDownload: https://bit.ly/2AiTrEM
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#technews
A group of hacktivists and transparency advocates has published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement agencies across the United States. Dubbed BlueLeaks, the exposed data leaked by the DDoSecrets group contains hundreds of thousands of sensitive documents from the past ten years with official and personalMedia
https://thehackernews.com/2020/06/law-enforcement-data-breach.html
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
A group of hacktivists and transparency advocates has published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement agencies across the United States. Dubbed BlueLeaks, the exposed data leaked by the DDoSecrets group contains hundreds of thousands of sensitive documents from the past ten years with official and personalMedia
https://thehackernews.com/2020/06/law-enforcement-data-breach.html
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Learn To Invest All Your Money Someplace where it grows ( not in banks , but in such platforms )
There are More platforms other than these one's where you can invest all your money but this are THE TOP 4 Money Investing Platform which gives lot of profit over the time ...
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
There are More platforms other than these one's where you can invest all your money but this are THE TOP 4 Money Investing Platform which gives lot of profit over the time ...
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Missing Photoshop on Linux? Use PhotoGIMP and Convert GIMP into Photoshop
Itsfoss --> kutt.it/fN8USo
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Itsfoss --> kutt.it/fN8USo
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Hey Guys (Announcement) β οΈ
Β» For the growth of our channel, we'll be doing some list promotions and cross promotions, so Please don't be irritated by it βΌοΈ
Β» Please Support us by staying Active... Pin our channel to top and unmute it π€
Thanks for your cooperation π
#share & #support
π @geekcode π
Β» For the growth of our channel, we'll be doing some list promotions and cross promotions, so Please don't be irritated by it βΌοΈ
Β» Please Support us by staying Active... Pin our channel to top and unmute it π€
Thanks for your cooperation π
#share & #support
π @geekcode π
GeekCode pinned Β«Hey Guys (Announcement) β οΈ Β» For the growth of our channel, we'll be doing some list promotions and cross promotions, so Please don't be irritated by it βΌοΈ Β» Please Support us by staying Active... Pin our channel to top and unmute it π€ Thanks for your cooperationβ¦Β»
Null Pointer References: The Billion Dollar Mistake
https://link.medium.com/tMntsbVju7
#share & #support
π @geekcodeπ
Don't forget to join us ππ»
https://link.medium.com/tMntsbVju7
#share & #support
π @geekcodeπ
Don't forget to join us ππ»
Medium
Null Pointer References: The Billion Dollar Mistake
You have a function that takes 3 parameters, but 2 of them are optional. If you call that function with 2 parameters, does that make thatβ¦
Linux tools for improving your time management | Opensource.com
https://opensource.com/article/20/6/linux-time-management
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://opensource.com/article/20/6/linux-time-management
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Opensource.com
Linux tools for improving your time management
Productivity is a subjective term, but essentially, it's a measurement of how efficiently a particular task is completed.
https://machinelearningmastery.com/time-series-datasets-for-machine-learning/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
Enumeration Course For Ethical Hackers
Comprehensive Ethical Hacking guide! Learn the basics of Ethical Hacking from scratch.
Link: https://www.udemy.com/course/enumeration-course-for-ethical-hackers/?couponCode=BVGGR1
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Comprehensive Ethical Hacking guide! Learn the basics of Ethical Hacking from scratch.
Link: https://www.udemy.com/course/enumeration-course-for-ethical-hackers/?couponCode=BVGGR1
#share & #supportus
π @geekcode π
Don't forget to join us ππ»