This post starts with a simple question, do you know what happens in your house when you are not in? This tricky question came to me long ago whnevarious a thefts occurred near where I lived. The solution was to…
This post starts with a simple question, do you know what happens in your house when you are not in? This tricky question came to me long ago whnevarious a thefts occurred near where I lived. The solution was to…
Performing a dynamic analysis of a malware sample is quick and can bring large amounts of data to perform a more complete and complex manual analysis. There are many sandboxes (controlled environments) that analyze a binary to know what exactly…
In the last chapter of “Anti-troll tools and techniques”, we described a series of methods for detecting and filtering the so maddening troll users: (i) knowledge discovery, (ii) data mining and (iii) text mining. Here, we present a new batch…
We return with a new post about movies. As mentioned above, more and more Hollywood blockbusters use the latest technology and devices to detect a kidnapping or to hack the highest government system. As a film buff that I am, I…
The console is, for some who know what it is, a black screen that only understand a few “geeks” . Others, however, know not exist without it. It is your tool for all your Swiss Army knife, entering anything. In Windows,…
Artificial intelligence is fashionable. From more apocalyptic visions to the emergence of new frameworks that make it easier for developers to make various applications in the field. Today he are goging to talk about one of these frameworks: TensorFlow. In…