Improve at Chess by Analyzing Your OpeningsSimple steps to take your chess game to the next level.Jan 26, 2023Jan 26, 2023
Published inTowards Data ScienceBest Practices for Writing Reproducible and Maintainable Jupyter NotebooksSimple steps to make your Jupyter Notebooks greatJul 13, 20224Jul 13, 20224
Published inBetter HumansMy Workflow for Reading Scientific PapersA simple workflow that dramatically improved the way I organize and consume scientific papers and allows me to remember their content…Jun 20, 20226Jun 20, 20226
Published inTowards Data ScienceTraining a Neural Network With a Few, Clean Lines of CodeReusable, maintainable and easy to understand machine learning code.Jun 14, 2022Jun 14, 2022
Published inInfoSec Write-upsThe Basics of Subdomain TakeoversA subdomain takeover is a vulnerability which allows an attacker to take the control of a subdomain which is not owned by that attacker.May 9, 2022May 9, 2022
MNIST — Dataset of Handwritten DigitsMNIST Cheat Sheet — MNIST is a widely used dataset of handwritten digits that contains 60,000 handwritten digits for training …Jan 12, 2022Jan 12, 2022
Logfile Vulnerability Log4Shell for RCEThis article briefly describes a critical zero-day vulnerability called Log4Shell that existed in the widely used Java logging library…Dec 12, 2021Dec 12, 2021
Enabling Disk Encryption in a NutshellThis article describes the minimal steps required to create an encrypted filesystem on a USB drive on Ubuntu. It is…Nov 30, 2021Nov 30, 2021
Become a Security Expert With Security FlashcardsUse security flashcards to get an overview of application and machine learning vulnerabilities and become an expert on these topics.Oct 4, 2021Oct 4, 2021
Evolution Strategies can be used to create adversarial examples to fool image classifiers in a…Evolution Strategies to Create Adversarial ExamplesMay 11, 2021May 11, 2021