cyber security BlueSmack Attack Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
cyber security OS Command Injection Attack OS Command Injection is a form of shell injection attack, mostly used for execution of unauthorized OS commands in the operating system (OS) to target the system (usually a web server) and degrade its performance. In this attack, the hacker aims to find and exploit some of the vulnerable application
cyber security Malvertising Attack Malvertising is a type of cyber attack in which an hacker use the online advertising to spread the malware. The attack can infect a system pre-click or post-click. A pre-click malvertisement can be embedded in the main scripts of the page. It can even initiate drive-by-download on visiting the site
cyber security Fork Bomb Attack Fork Bomb Attack is a type of denial of service attack which causes the degradation of a system by making it run out of the memory. The attack forks the processes recursively to fill the entire available memory, thus choking system resources. Locating and terminating a Fork Bomb is a tedious process
Data Structures Fenwick Tree (Binary Indexed Tree) Fenwick Tree / Binary indexed tree (BIT) is a data structure used to process interval/range based queries. Compared to segment tree data structure, Fenwick tree uses less space and is simpler to implement. One disadvantage is that it can be only used with an operation that is invertible.
Data Structures Segment Tree A segment tree is a divide and conquer based data structure used to store information about intervals of some linear data structure. It is a height-balanced binary tree where every node corresponds to an interval of the array. It allows processing interval or range queries in logarithmic time
cyber security Drive By Login Attack Drive-By Login is a form of phishing attack in which a hacker sets up the malicious code on the victim's favorite website through through various methods of social engineering and bugs in website. Use anti-phishing tools and keep browser upto date to stay safe from this attack
Software Engineering Check memory usage in Linux Five tools to check memory usage on Linux are free, /proc/meminfo, vmstat, top and dmidecode. The difference between clock speed and memory access is increasing day by day. To keep our machines healthy, we want to check the memory usage of several processes and in Linux, we have five tools to do so.
cyber security Tabnabbing Attack Tabnabbing is a form of cyber attack which enables an hacker to take the advantage of the idle tabs in the browser and use them for carrying out the phishing attacks. The attack can be carried out even if the javascript is disabled, using the HTML attribute or a "meta refresh" meta element
cyber security UDP Flood Attack UDP Flood Attack is a type of Denial of Service attack in which a hacker floods the random ports on the victim host with UDP packets. In this attack, the hacker spoofs the IP Address of the packets, to make sure that the returning ICMP packets don’t reach back to the hacker.
Machine Learning (ML) Convolutional Neural Networks (CNN) Convolutional Neural Network (CNN) is an neural network which extracts or identifies a feature in a particular image and is the basis of GoogleNet and VGG19 and used for object detection and classification. CNN has five basic components Convolution, ReLU, Pooling, Flattening and Full connection.
Machine Learning (ML) Understand basic TensorFlow programming concepts We understand basic TensorFlow programming concepts using a code to add two numbers in TensorFlow. We created placeholders like tf.placeholder, operations like tf.constant and tf.add, sessions using tf.session and configuration using tf.configProto
Machine Learning (ML) Training vs Inference Training and Inference are two major processes of Machine Learning and is deeply connected. Training is the process by which we generate various parameters such as weights and biases which are used in a particular model. Inference is the process of using the trained model to do a particular task
cyber security DNS Amplification Attack DNS (Domain Name System) Amplification is a form of reflection based DDoS attack, in which a hacker spoofs the look-up requests to spoof the DNS servers to hide the source of an exploit and also to direct the response to the target. The attack exploits the disparity in the bandwidth consumption
cyber security IP Spoofing Attack IP (Internet Protocol) Spoofing is a form of cyber attack in which hacker crafts the IP packets which are used to carry out the DDoS attacks as well as MitM attack. In this attack, the fake crafted IP packets are used to impersonate another system or is used to hide the identity of the hacker.
cyber security MAC Flooding Attack MAC (Media Access Control) Flooding is a type of cyber attack done in a network to compromise the security of the network switches. In this attack the network is flooded with the fake MAC addresses. The hacker uses this attack to steal sensitive data that is being transferred in the network.
cyber security Ping Of Death Attack Ping of Death (PoD) Attack is a form of DDoS attack, which is used for disrupting the victim network by sending the packets larger then the max size allowed using some arbitrary commands. The attack degrades the targeted system or even freeze the system.
Machine Learning (ML) Hidden Markov Model Hidden Markov Model is a stochastic model describing a sequence of possible events in which the probability of each event depends on the state attained in the previous event. Markov model can be used in real life forecasting problems. Simple Markov model cannot be used for customer level predictions
Machine Learning (ML) Markov Chain Markov chain is a stochastic model describing a sequence of possible events in which the probability of each event depends only on the state attained in the previous event. It refers to the sequence of random variables such a process moves through, with the Markov property of serial dependence
cyber security Smurf Attack Smurf Attack is a type of DDoS Attack, which floods the system with the spoofed ping messages. The attack has an amplification vector that increases the damage by exploiting the characteristics of the broadcast network. The attack swamps the internet with the replies to ICMP echo requests.
cyber security BlueBugging Attack Bluebugging is a type of cyber attack done on the Bluetooth enabled devices. The attack allows the hacker to access the cell commands and infiltrate the phone calls, read and send SMS. This allows any hacker to modify the contact list, connect to the internet and eavesdrop on any phone conversation
Machine Learning (ML) Deep Learning on 2-Dimensional Images Applying deep learning concepts on images has proved to be one of the important work which has resulted in early detection of diseases resulting in saving millions of life to monitoring activities on the entire Earth We take a look at medical images, Satellite Images and the various Python libraries
Machine Learning (ML) Deep Learning for Medical Imaging and Diagnosis One of the major medical challenges that we face today is the early detection of diseases so that the proper threatment can be applied. This can be solved by applying machine learning to analyse MRI scan, CT Scan, Xray Scans, InfraRed Images, Arthoscopy, UV radiation, Scintigraphy and Ultrasound
Data Structures Trie data structure A trie (digital tree, radix tree, prefix tree) is a kind of an ordered search tree data structure that is used to store a dynamic set or associative array where the keys are usually strings. Worst case search time complexity is Θ(key_length) and trie is widely used in real life applications
Machine Learning (ML) Recurrent Neural Networks (RNN) Recurrent Neural Network is one of the widely used algorithms of Deep Learning mainly due to is unique Design. It is the only algorithm that remembers the most recent Input and makes use of memory element. It is used by Apple Siri and Google Voice Search. RNN is used for sequential data.