DanielImprove at Chess by Analyzing Your OpeningsSimple steps to take your chess game to the next level.·6 min read·Jan 26, 2023----
DanielinTowards Data ScienceBest Practices for Writing Reproducible and Maintainable Jupyter NotebooksSimple steps to make your Jupyter Notebooks great·10 min read·Jul 13, 2022--4--4
DanielinBetter HumansMy Workflow for Reading Scientific PapersA simple workflow that dramatically improved the way I organize and consume scientific papers and allows me to remember their content…·12 min read·Jun 20, 2022--6--6
DanielinTowards Data ScienceTraining a Neural Network With a Few, Clean Lines of CodeReusable, maintainable and easy to understand machine learning code.·7 min read·Jun 14, 2022----
DanielinInfoSec Write-upsThe Basics of Subdomain TakeoversA subdomain takeover is a vulnerability which allows an attacker to take the control of a subdomain which is not owned by that attacker.·10 min read·May 9, 2022----
DanielMNIST — Dataset of Handwritten DigitsMNIST Cheat Sheet — MNIST is a widely used dataset of handwritten digits that contains 60,000 handwritten digits for training …·5 min read·Jan 12, 2022----
DanielLogfile Vulnerability Log4Shell for RCEThis article briefly describes a critical zero-day vulnerability called Log4Shell that existed in the widely used Java logging library…·4 min read·Dec 12, 2021----
DanielEnabling Disk Encryption in a NutshellThis article describes the minimal steps required to create an encrypted filesystem on a USB drive on Ubuntu. It is…·2 min read·Nov 30, 2021----
DanielBecome a Security Expert With Security FlashcardsUse security flashcards to get an overview of application and machine learning vulnerabilities and become an expert on these topics.·4 min read·Oct 4, 2021----
DanielEvolution Strategies can be used to create adversarial examples to fool image classifiers in a…Evolution Strategies to Create Adversarial Examples·1 min read·May 11, 2021----