Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.

  • 0 Posts
  • 106 Comments
Joined 1 year ago
cake
Cake day: March 27th, 2024

help-circle


  • Ok, thanks for that clarification. I guess I’m a bit confused as to why a comparison is being drawn between neurons in a neural network and neurons in a biological brain though.

    In a neural network, the neuron receives an input, performs a mathematical formula, and returns an output right?

    Like you said we have no understanding of what exactly a neuron in the brain is actually doing when it’s fired, and that’s not considering the chemical component of the brain.

    I understand why terminology was reused when experts were designing an architecture that was meant to replicate the architecture of the brain. Unfortunately, I feel like that reuse of terminology is making it harder for laypeople to understand what a neural network is and what it is not now that those networks are a part of the zeitgeist thanks to the explosion of LLM’s and stuff.






  • No. You can have control over specific parameters of an SQL query though. Look up insecure direct object reference vulnerabilities.

    Consider a website that uses the following URL to access the customer account page, by retrieving information from the back-end database: https://insecure-website.com/customer_account?customer_number=132355 Here, the customer number is used directly as a record index in queries that are performed on the back-end database. If no other controls are in place, an attacker can simply modify the customer_number value, bypassing access controls to view the records of other customers.






  • I don’t have FDE (BitLocker) enabled on my Windows 11 gaming PC. It sits in my house and has nothing on it but video games and video game related shit. I don’t even have my password manager installed for logging in to Steam, GoG or whatever other launcher. I manually type passwords in from the vault on my phone if the app doesn’t support QR code login like discord. Also I paid for this ridiculous m.2 nvme drive, I’m not going to just give up iops bc i want my game install files encrypted.

    I don’t use FDE on my NAS. Again it doesn’t leave my house. I probably should I guess, bc there is some stuff on there that would cause me to have industry certs revoked if they leaked, but idk I don’t. Everything irreplaceable is backed up off site, but the down time it would take to rebuild my pirated media libraries from scratch vs just swapping disks and rebuilding has me leery.

    I have FDE enabled on both my MacBooks. They leave the house with me, it seems to make sense.

    I don’t use FDE on Linux VMs I create on the MacBooks, the disk is already encrypted.

    My iphone doesn’t have the option to not use FDE I don’t think.

    I use encrypted rsync backups to store NAS stuff in the cloud. I use a PGP key on my yubikey to further encrypt specific files on my MacBooks as required beyond the general FDE.





  • If you have files with a bunch of different formats and codecs you don’t want to use anything Roku, your direct play options are extremely limited. This becomes almost a hard requirement when dealing with hevc 4K hdr/dv stuff unless you’ve got a server with quicksync or some oomph.

    I’m probably going to get a lot of derision for this because it’s Lemmy, but for wide direct play coverage you either want an Nvidia Shield or an Apple TV 4K. I like the Apple TV solution, and everyone in my household is familiar with the UI. The Shield is the only one of the two to support Atmos audio if you have ceiling or upward firing speakers. It’s also not apple if you’re ideologically opposed to owning Apple products.

    I’m not surprised you fell back to a Roku box from the built in TV apps, but if you’re going to go for a dedicated streaming box Roku, Firesticks/Firecubes, and Chromecasts should be the last resort due to ads in the experience and codec support.