Blog

15 Results / Page 1 of 3

Background
Woman standing in front of a projected image of data.

today7 September 2024

  • 67
close

Machine Learning Justin

Machine Learning Concepts – Part 2 – Problem Definition and Data Collection

This entry is part 2 of 2 in the series Machine Learning Concepts

  In part 1 of this Machine Learning Concepts series of posts I provided an introduction to the necessary steps to deploy a machine learning model. Check that out if you missed it. Now that we understand the requirements for deploying machine learning models we need to begin by defining ...

Photo by Mikhail Nilov:

today1 September 2024

  • 57
close

Penetration Testing Justin

SSH “Wide-Compatibility Mode” in Kali Linux

I am in the process of taking the Practical Junior Penetration Tester (PJPT) course from TCM Security and immediately started experiencing problems as I was following the course material. One such issue actually prevented me from utilizing SSH to its full capacity. As of Kali Linux 2022.1, it’s possible to ...

Gears

today25 August 2024

  • 15
  • 1
close

Machine Learning Justin

Machine Learning Concepts – Part 1 – Deployment Introduction

This entry is part 1 of 2 in the series Machine Learning Concepts

  Machine Learning models are key to the continued improvement of artificial intelligence. This article is the first in a series of articles that I’ll be publishing introducing reads to various Machine Learning concepts. First up, we introduce some typical steps involved in producing a machine learning model. 1. Problem ...

Microsoft Excel computer desktop image.

today3 August 2024

  • 6
close

General Justin

Displaying Exchange Rates in Microsoft Excel Desktop

In typical Microsoft fashion, the online version of Excel offers the native capability to add currency exchange rates in your Excel spreadsheets. It’s a little trickier in the desktop version of Excel, but I found the following to the best solution. It uses publicly available data from x-rates. Locate the ...

Photo by Pixabay: https://www.pexels.com/photo/close-up-of-figurine-326616/

today17 February 2024

  • 382
close

Application Security Justin

A Guide to Public Key Authentication Using SSH

The SSH (Secure Shell) protocol allows an ability to remotely, and securely, access hosts. SSH has various options for authenticating to a host including — password authentication, public-key authentication, and host-based authentication. Before we get into all of that, let’s generate an SSH keypair. Generating an SSH Keypair Most Linux ...