サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
2024年ランキング
danielmiessler.com
A visual map for understanding attacks against AI and AI systems Click for full-size Introduction This resource is a first thrust at a framework for thinking about how to attack AI systems. At the time of writing, GPT-4 has only been out for a couple of months, and ChatGPT for only 6 months. So things are very early. There has been, of course, much content on attacking pre-ChatGPT AI systems, name
tmux lets you keep things running persistently on servers, so you can disconnect and connect as needed without interrupting tasks that are in progress.
Over at Hacker News there are often threads about less-traveled UNIX and Linux commands. One particular comment collected a few of the posts, and I decided to parse all of those threads’ commands, plus my own favorite list of obscure entries, and put them in one place. column: create columns from text input tr: translate/substitute/delete input join: like a database join but for text comm: file co
The problem with learning Vim is not that it’s hard to do—it’s that you have to keep doing it. This guide will break that cycle, ensuring this is the last time you will learn it. There are dozens of Vim references online, but most of them either go ninja straight away, or start basic and don’t go much deeper.
If you enjoy the command line then you don’t need to be sold on efficiency or purity of action. But even those who grok CLI are unaware of a number of ways to be more elegant accomplishing their tasks. Here are a few of my favorites. Remap Your CAPSLOCK KeyUse ctrl-r For History AutocompleteSwitch to iTerm on OS XSwitch to ZshRemap your Vim Escape KeyRemap your Vim Leader KeyUse vi-mode in Your Sh
Perhaps the most obvious and powerful of changes in our world is the penetration of computers into our personal lives. This is penetration to the point of integration — to the point of augmentation. No surprise there; everyone’s talking about it. One less obvious result of this monumental shift, however, is that the skill of programming will move from a field specialization to a life skill. It wil
The page you requested doesn't existWe could not locate the page: /p/using-git-to-maintain-your-website Try one of the featured posts or search the archive below.
Understanding how these components work together is the key to understanding git. First and foremost, it’s important to understand that git has something called an index that sits between your working directory and your commits. It’s basically a staging area, so when you git add you copy a snapshot of your working directory to the index, and when you git commit you copy that same thing from the in
A tcpdump Tutorial with Examples 50 ways to isolate traffic for cybersecurity, network administration, and other technical roles Introduction Overview of tcpdump Basics of traffic isolation Getting Started with tcpdump Viewing traffic on an interface Viewing HTTPS traffic Limiting packets Information Security Examples Capturing credentials Monitoring suspicious domain traffic SMB Traffic Capturing
OptionsBasicsFind by UserFind by TypeFind by SizeFind by Modification TimeFind by PermissionsForensics InformationXargs vs. ExecMore Examplesfind is one of the most useful Linux/Unix tools in the toolbelt, but most people use only a fraction of its power. Many Linux/Unix questions seen online can be solved using the find command alone, getting familiar with its main functionality is one of the bes
lsof is the sysadmin/security über-tool. I use it most for getting network connection related information from a system, but that’s just the beginning for this powerful and too-little-known application. The tool is aptly called lsof because it “lists open files“. And remember, in UNIX just about everything (including a network socket) is a file. Interestingly, lsof is also the Linux/Unix command w
このページを最初にブックマークしてみませんか?
『Unsupervised Learning』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く