Open in app

Sign In

Write

Sign In

Daniel Etzold
Daniel Etzold

212 Followers

Home

About

Jan 26

Improve at Chess by Analyzing Your Openings

Simple steps to take your chess game to the next level. — Introduction Chess is experiencing a resurgence in popularity, with more and more people discovering (or rediscovering) their passion for the game. The goal to improve is shared among chess enthusiasts, regardless of whether they are just starting out or have been playing for a while. With the rise of online chess…

Chess

6 min read

Improve at Chess by Analyzing Your Openings
Improve at Chess by Analyzing Your Openings
Chess

6 min read


Published in

Towards Data Science

·Jul 13, 2022

Best Practices for Writing Reproducible and Maintainable Jupyter Notebooks

Simple steps to make your Jupyter Notebooks great — Introduction Writing Jupyter Notebooks that are reproducible, maintainable, and easy to understand is not as easy as you might think. In fact, it’s quite the opposite. It’s actually really hard. …

Machine Learning

10 min read

Best Practices for Writing Reproducible and Maintainable Jupyter Notebooks
Best Practices for Writing Reproducible and Maintainable Jupyter Notebooks
Machine Learning

10 min read


Published in

Better Humans

·Jun 20, 2022

My Workflow for Reading Scientific Papers

A simple workflow that dramatically improved the way I organize and consume scientific papers and allows me to remember their content forever. — I’ve always been interested in research. Due to my passion for security and machine learning, I’m particularly interested in security weaknesses in machine learning. In the last few years also the interest of the machine learning community in this topic has been increased dramatically and a lot of scientific literature…

Productivity

12 min read

My Workflow for Reading Scientific Papers
My Workflow for Reading Scientific Papers
Productivity

12 min read


Published in

Towards Data Science

·Jun 14, 2022

Training a Neural Network With a Few, Clean Lines of Code

Reusable, maintainable and easy to understand machine learning code — Less code usually results in readable code that is easy to understand and easy to maintain. The Python programming language, that has become very popular in the machine learning community, allows you to achieve great results with less code compared to other programming languages. PyTorch is a popular deep learning…

Machine Learning

7 min read

Training a Neural Network With a Few, Clean Lines of Code
Training a Neural Network With a Few, Clean Lines of Code
Machine Learning

7 min read


Published in

InfoSec Write-ups

·May 9, 2022

The Basics of Subdomain Takeovers

A subdomain takeover is a vulnerability which allows an attacker to serve content from a subdomain which is not owned by that attacker. The most common situations which make a subdomain takeover possible are: 1) the CNAME record of the affected subdomain points to a domain that can be claimed…

Bug Bounty

10 min read

The Basics of Subdomain Takeovers
The Basics of Subdomain Takeovers
Bug Bounty

10 min read


Published in

MLearning.ai

·Jan 12, 2022

MNIST — Dataset of Handwritten Digits

MNIST is a widely used dataset of handwritten digits that contains 60,000 handwritten digits for training a machine learning model and 10,000 handwritten digits for testing the model. It was introduced in 1998 and has become a standard benchmark for classification tasks. It is also called the “Hello, World” dataset…

Machine Learning

5 min read

MNIST — Dataset of Handwritten Digits
MNIST — Dataset of Handwritten Digits
Machine Learning

5 min read


Dec 12, 2021

Logfile Vulnerability Log4Shell for RCE

This article briefly describes a critical zero-day vulnerability called Log4Shell that existed in the widely used Java logging library Log4j used by millions of Java applications reachable from the Internet. …

Log4j

4 min read

Logfile Vulnerability Log4Shell for RCE
Logfile Vulnerability Log4Shell for RCE
Log4j

4 min read


Nov 30, 2021

Enabling Disk Encryption in a Nutshell

The goal of this article is to present the minimal steps required to create an encrypted filesystem on a USB drive on Ubuntu. It is intended for people who are already familiar with the basic concepts and don’t need an explanation for each single step. The Nutshell — Create an Encrypted Device Let’s assume your device is…

Disk

2 min read

Enabling Disk Encryption in a Nutshell
Enabling Disk Encryption in a Nutshell
Disk

2 min read


Oct 4, 2021

Become a Security Expert With Security Flashcards

Due to the dramatically increasing number of cyber security threats, security has become a top priority for many companies and even for people operating only small websites. Unfortunately, due to their countless variants and the constantly and rapidly changing threat landscape keeping track with the latest developments is almost impossible. …

Cybersecurity

4 min read

Become a Security Expert With Security Flashcards
Become a Security Expert With Security Flashcards
Cybersecurity

4 min read


May 11, 2021

Evolution Strategies can be used to create adversarial examples to fool image classifiers in a…

Evolution Strategies can be used to create adversarial examples to fool image classifiers in a black-box setting and three variants are compared in a recently published paper. Compared to a…

Evolutionary Algorithms

1 min read

Evolutionary Algorithms

1 min read

Daniel Etzold

Daniel Etzold

212 Followers

Dev-Sec-ML — https://twitter.com/_etzold — Creator of Security Flashcards https://security-flashcards.com

Following
  • Alex Zelinsky

    Alex Zelinsky

  • crawsecurity

    crawsecurity

  • Cypherdog Security Inc.

    Cypherdog Security Inc.

  • Milan Mosny

    Milan Mosny

  • Kiprono Elijah Koech

    Kiprono Elijah Koech

See all (415)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams