How many of u are interested in learning ML and AI stuff ...?
Anonymous Poll
30%
I have experience from before and I want to further pursue
56%
I have no experience but want to learn more about it
5%
Have experienced before but don't want to dive deeper into it
0%
No experience and no interest also
9%
Don't know πΆ
sudo jajos pinned Β«this was our session recorded ... I think till like 00:30 it was introduction and staff ... so if u want the actual content start from there ... I havent finished till the end due to time constraints ...Β»
sudo jajos
Video
From the votes I can see that most of u are eager to learn about ML and AI stuff and most of u have no prior experience... So yeah I will think about a scheme that will benefit us all ...
For those of u who depicted as having no prior experience and want to learn I recommend u view this video in the meantime ... But we will figure out the long future ... If u have any recommendations I am welcome
For those of u who depicted as having no prior experience and want to learn I recommend u view this video in the meantime ... But we will figure out the long future ... If u have any recommendations I am welcome
π1π₯1
Forwarded from Yostina | Bytephilosopher
Christos Anesti, Alithos Anesti
Have a beautiful Sunday π€
#sunday
@byte_philosopher
Have a beautiful Sunday π€
"For the oppression of the poor, for the sighing of the needy, Now I will arise," says the LORD; "I will set him in the safety for which he yearns."
Psalm 12:5
#sunday
@byte_philosopher
β€βπ₯8
Forwarded from The Data Guy
Its fully Confirmed now That Anthropic is adding Ethiopia to Supported Countries List!!!
Its rolling from Claude code first!
Its rolling from Claude code first!
π1
After dinner let us not go to bed but to prayer, or we may become more irrational than the irrational beasts.
St. John Chrysostom
Lets pray before we sleep π, one α α‘α αα α°αα«α΅ would suffice
β€βπ₯15π₯3
In all you do, remember the end of your life, and then you will never sin
Sir 7:36
Let us start our day remembering this
β€8
We reached 300 π hoorayy ....
Thanks @all ... and @byte_philosopher almost ~ 45 people joined because of u ...
Thanks @all ... and @byte_philosopher almost ~ 45 people joined because of u ...
π10
Forwarded from Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing.
You think you're talking directly to someoneβ¦
But the attacker is sitting in between, watching and sometimes changing everything.
You think you're talking directly to someoneβ¦
But the attacker is sitting in between, watching and sometimes changing everything.
Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing. You think you're talking directly to someone⦠But the attacker is sitting in between, watching and sometimes changing everything.
https://github.com/jajos12/basic_red_teaming
back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:
back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:
ARP (Address Resolution Protocol) bridges Layer 2 (MAC addresses) and Layer 3 (IP addresses) of the network stack. When your computer wants to send a packet to 192.168.1.1, it needs to know the MAC address of that IP on the local network. It broadcasts:
"Who has 192.168.1.1? Tell 192.168.1.50"
The device at 192.168.1.1 responds:
"192.168.1.1 is at AA:BB:CC:DD:EE:FF"
Your OS stores this in the ARP cache β a table mapping IP addresses to MAC addresses. All subsequent packets to 192.168.1.1 are sent to MAC AA:BB:CC:DD:EE:FF at the Ethernet layer.
The Fatal Flaw
ARP has zero authentication. The protocol was designed in 1982 (RFC 826) when networks were trusted environments. There is:
β No verification that the sender is who they claim to be
β No cryptographic signing of ARP messages
β No way to distinguish legitimate replies from forged ones
β Devices accept unsolicited ARP replies (no request needed!)
This means any device on the network can lie about who owns any IP address.
GitHub
GitHub - jajos12/basic_red_teaming
Contribute to jajos12/basic_red_teaming development by creating an account on GitHub.
β€1π₯1
sudo jajos
https://github.com/jajos12/basic_red_teaming back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:β¦
There are about 10 attacks described there ... and disclaimer it is for learning purposes only βοΈπ I mean it ...
I intentionally left the 7 uncommited but u can experiment with ARP, DNS spoofing and credential sniffing ....
If u have found something useful don't forget to give it βοΈ https://github.com/jajos12/basic_red_teaming
I intentionally left the 7 uncommited but u can experiment with ARP, DNS spoofing and credential sniffing ....
If u have found something useful don't forget to give it βοΈ https://github.com/jajos12/basic_red_teaming
GitHub
GitHub - jajos12/basic_red_teaming
Contribute to jajos12/basic_red_teaming development by creating an account on GitHub.
https://youtu.be/xmkSf5IS-zw?si=Cu83rwaIZB9SzovV
Haven't seen it but it seems a different format ... like with technical rigor I will definitely see it ... those of u comfortable with the basics should check it out ...
Haven't seen it but it seems a different format ... like with technical rigor I will definitely see it ... those of u comfortable with the basics should check it out ...
YouTube
How GPT-5, Claude, and Gemini are actually trained and served β Reiner Pope
Did a very different format with Reiner Pope β a blackboard lecture where he walks through how frontier LLMs are trained and served. It's shocking how much you can deduce about what the labs are doing from a handful of equations, public API prices, and someβ¦
Yostina | Bytephilosopher
This is so shocking @byte_philosopher
I enjoyed A2SV(I was Generation 6) - but when I was leaving it - u know it was a shock also for me ... bcha Emre tchilaleh ... but u are surrounded with ignorant ... bcha mnm albel
π3
Forwarded from Yostina | Bytephilosopher
ααα«α α°αα α΅ π
αα 3 :5-6
@byte_philosopher
α₯α α°αα α ααααααα€ α₯ααα α₯ααα α°ααααα αααα’
α¨αα¨α₯α‘α α¨α α₯αα ααα₯ α ααα«αα’
αα 3 :5-6
@byte_philosopher
β€βπ₯5
https://youtu.be/tpIctyqH29Q?si=eKoLPExAXx6aiHF4
This is an insane playlist for anyone from scratch to understand how computers work in macro level ... and u know literally it is for everyone ...
This is an insane playlist for anyone from scratch to understand how computers work in macro level ... and u know literally it is for everyone ...
YouTube
Crash Course Computer Science Preview
Starting February 22nd, Carrie Anne Philbin will be hosting Crash Course Computer Science! In this series, we're going to trace the origins of our modern computers, take a closer look at the ideas that gave us our current hardware and software, discuss howβ¦
The jealous person would prefer to suffer innumerable troubles rather than to see his neighbor in good repute, even if the cause of the good repute were to benefit him also. What could be more wretched than such a person?
St. John Chrysostom
β€9