AI security is a burgeoning field concerned with safeguarding artificial intelligence systems from a wide array of threats. As AI becomes increasingly integrated into critical infrastructure and decision-making processes, its vulnerability to malicious attacks and unintended consequences becomes a paramount concern. Protecting AI involves more than just securing the underlying infrastructure; it requires a holistic …
Continue reading AI Security Intro
AI Fields
Artificial intelligence, a field dedicated to creating machines capable of intelligent behavior, can be broadly categorized into several key areas, each with its unique focus and applications. These categories, while often overlapping and intertwined, represent distinct approaches to achieving artificial intelligence. These categories, while distinct, often work together to create complex AI systems. For instance, …
Continue reading AI Fields
Intro to Pentesting
Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a crucial practice in the field of cybersecurity. It involves the deliberate and authorized simulation of cyberattacks on computer systems, networks, or web applications to identify security vulnerabilities that could be exploited by malicious hackers. Penetration testing helps organizations assess the robustness of …
Continue reading Intro to Pentesting
The history of AI
Artificial Intelligence (AI) is a field of computer science that focuses on creating machines capable of performing tasks that would typically require human intelligence. Its roots can be traced back to ancient history, where myths and stories of intelligent automatons captured human imagination. However, the scientific foundations of AI were laid much later, in the …
Continue reading The history of AI
VPN Router (Road Warrior)
A machine in the middle between a VPN server and a Local Network, acting as a client for the VPN server (on the external interface) and as a Router for the Local Network (on the internal interface) is known as “Road Warrior”. The overall goal is to provide clients on the Local Network transparent communication …
Continue reading VPN Router (Road Warrior)
How to enable ssh root access in Ubuntu
This is not recommended for security reasons but in some cases can be useful to temporarily enable it Edit the file /etc/ssh/sshd_config Command: add the line: Code: reboot the system or type the command below Command: *Note: When root ssh access is not needed anymore remember to comment the added line with a # at …
Continue reading How to enable ssh root access in Ubuntu
Netplan – Set a static IP
From Ubuntu 18+ netplan is the embedded configurator tool for the server edition. When there is not carrier, even if correctly set from a syntax perspective in yaml netplan config file, the network interface will not show an IP address. The solution is to add the keyword “ignore-carrier: true” like below that by default is …
Continue reading Netplan – Set a static IP
OpenVPN Server – AWS EC2
Elastic Cloud Instances are on demand virtual machines wtih pre-configured OS images. Some types of them are free of charge the first year such as the T2.micro (1vCPU, 1GB of RAM etc.) The first step is to create a AWS account and link a payment method. Then navigate to EC2 and create a new instance. …
Continue reading OpenVPN Server – AWS EC2