Raspberry Pi watchman

This post starts with a simple question, do you know what happens in your house when you are not in? This tricky question came to me long ago whnevarious a thefts occurred near where I lived. The solution was to

Dynamically detecting and classifying malware

Performing a dynamic analysis of a malware sample is quick and can bring large amounts of data to perform a more complete and complex manual analysis. There are many sandboxes (controlled environments) that analyze a binary to know what exactly

Anti-troll tools and techniques (II)

In the last chapter of “Anti-troll tools and techniques”, we described a series of methods for detecting and filtering the so maddening troll users: (i) knowledge discovery, (ii) data mining and (iii) text mining. Here, we present a new batch

Computing fails in Hollywood (II)

We return with a new post about movies. As mentioned above, more and more Hollywood blockbusters use the latest technology  and devices to detect a kidnapping or to hack the highest government system. As a film buff that I am, I

The system console in Windows

The console is, for some who know what it is, a black screen that only understand a few “geeks” . Others, however, know not exist without it. It is your tool for all your Swiss Army knife, entering anything. In Windows,

Deep in the machine learning

Artificial intelligence is fashionable. From more apocalyptic visions to the emergence of new frameworks that make it easier for developers to make various applications in the field. Today he are goging to talk about one of these frameworks: TensorFlow. In