grecy ronchidigital-corner.hashnode.dev·Dec 4, 2024Discover the Peace in the Light Summit: Inspiring Change Through ConnectionIntroduction to the Peace in the Light Summit The Peace in the Light Summit stands as a beacon of hope in a fragmented world. It is more than a conference; it is a movement that gathers thinkers, dreamers, and doers under one roof—or across virtual n...Discussdiscovery
arzuyorusec.hashnode.dev·Oct 27, 2024MITRE: Discovery: T1040Lab linki: https://learn.cyberexam.io/challenges/mitre/discovery/mitre-discovery-t1040 Görev Tanımı Tehdit aktörleri hedeflediği sistem hakkında bilgi almak için ağ trafiğini pasif olarak izlemektedir (sniffing). Kimlik doğrulamanın nasıl yapıldığı,...DiscussCyberexam MITRE | ATT&CK Learning Pathsniffing
Aniblog.anirudha.dev·Oct 24, 2024Designing The Perfect Incentivised System - Part 2A lot of the recent rise in isekai anime also suggests a favorable wind towards perfecting our system. In the anime Hunter x Hunter, the incentive system plays a crucial role in driving the narrative and character development, particularly in the con...DiscussPerpetual Incentive Systemsololevelling
Aniblog.anirudha.dev·Oct 22, 2024Designing The Perfect Incentivised System - Part 1As I started writing this, it became apparent as to how deep the rabbit hole really is... 🐰 So, I'm breaking up the discovery phase in multiple parts. If you're just catching up, start at the beginning... 🏆 Incentive systems are frameworks desig...DiscussPerpetual Incentive Systemperpetual
ANGADSINGH OBBIangadsinghobbi.hashnode.dev·May 7, 2024Day 4: How to Identify/ Change the file permissionsWelcome back Champ! Now that we have understood the filesystem let's jump into how we keep it secure. Although there are already a lot of good security features built into Linux-based systems, one very important potential vulnerability can exist when...Discuss·10 likes·48 readsLinux
Redha Bayu Anggararedhabayuanggara.hashnode.dev·Jan 30, 2024Discovery, Monitoring and TroubleShoot | Part 1Chapters: Service Discovery, Monitoring and Troubleshooting | Part 1 Grafana Monitoring Workflow | Part 2 Devops Workflow Troubleshooting | Part 3 Carry away Consistensy Pattern | Part 4 DevSecOps Development, Security and Operation | Part 5 Di...Discussdiscovery
Rhyno Rhetoric rhynorhetoric.hashnode.dev·Dec 7, 2023An Introduction: Reclaiming PowersIn life, we often encounter moments where we feel as though we have lost our sense of power and purpose. These moments can stem from various sources, whether it be the criticism of others, our own self-doubt, or the struggles we face with mental illn...DiscussRediscovery
Abakpa Dominicdtgamer.hashnode.dev·Aug 27, 2023A Day with Java Technology: Embracing Challenges and Discovering JoyIn the world of software development, every new endeavor comes with its own set of challenges and learning opportunities. One such adventure unfolded when I found myself immersed in a virtual internship that introduced me to the dynamic realm of Java...Discuss·10 likes·26 readsJava
Samiksha KolheforTeckbaker's Blogteckbakers.hashnode.dev·Feb 10, 2023Recent Discovery: VALL-E The Voice Of DALL-E by MicrosoftMicrosoft’s new zero-shot text-to-speech model can duplicate everyone’s voice in three seconds. This Article is all about the recent Discovery and research by Microsoft in the field of text-to-speech that come up with the Voice version of DALL-E. Re...Discuss·1 like·30 readsMachine LearningMicrosoft
M S Sripatisripati.hashnode.dev·Jan 2, 2020External Network VAPT: tools, information sourcesPhoto by Sean Musil on Unsplash This is a live post; it will undergo changes, which are captured in change log, provided at the end of this post. Being part of many external VAPT engagements, one thing was clear from outset — methodology is the key, ...Discusstech