AI Security Intro

AI security is a burgeoning field concerned with safeguarding artificial intelligence systems from a wide array of threats. As AI becomes increasingly integrated into critical infrastructure and decision-making processes, its vulnerability to malicious attacks and unintended consequences becomes a paramount concern. Protecting AI involves more than just securing the underlying infrastructure; it requires a holistic …
Continue reading AI Security Intro

AI Fields

Artificial intelligence, a field dedicated to creating machines capable of intelligent behavior, can be broadly categorized into several key areas, each with its unique focus and applications. These categories, while often overlapping and intertwined, represent distinct approaches to achieving artificial intelligence. These categories, while distinct, often work together to create complex AI systems. For instance, …
Continue reading AI Fields

Intro to Pentesting

Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a crucial practice in the field of cybersecurity. It involves the deliberate and authorized simulation of cyberattacks on computer systems, networks, or web applications to identify security vulnerabilities that could be exploited by malicious hackers. Penetration testing helps organizations assess the robustness of …
Continue reading Intro to Pentesting

The history of AI

Artificial Intelligence (AI) is a field of computer science that focuses on creating machines capable of performing tasks that would typically require human intelligence. Its roots can be traced back to ancient history, where myths and stories of intelligent automatons captured human imagination. However, the scientific foundations of AI were laid much later, in the …
Continue reading The history of AI

VPN Router (Road Warrior)

A machine in the middle between a VPN server and a Local Network, acting as a client for the VPN server (on the external interface) and as a Router for the Local Network (on the internal interface) is known as “Road Warrior”. The overall goal is to provide clients on the Local Network transparent communication …
Continue reading VPN Router (Road Warrior)

Netplan – Set a static IP

From Ubuntu 18+ netplan is the embedded configurator tool for the server edition. When there is not carrier, even if correctly set from a syntax perspective in yaml netplan config file, the network interface will not show an IP address. The solution is to add the keyword “ignore-carrier: true” like below that by default is …
Continue reading Netplan – Set a static IP

OpenVPN Server – AWS EC2

Elastic Cloud Instances are on demand virtual machines wtih pre-configured OS images. Some types of them are free of charge the first year such as the T2.micro (1vCPU, 1GB of RAM etc.) The first step is to create a AWS account and link a payment method. Then navigate to EC2 and create a new instance. …
Continue reading OpenVPN Server – AWS EC2