Unleashing GPU Power: Parallel Computing with CUDA

Introduction # With the recent advancements in AI, the demand for more and more calculations has increased. GPUs have been used for many AI projects as their computation ability can be better than CPU’s for certain tasks. What is parallel computing? # Parallel computing is a type of computation where you can perform calculations independently, and therefor in parallel. This allows you to solve complex problems faster than a sequential approch.
Read more →

An Introduction to Buffer Overflow Attacks

Introduction # This summer I took CS161 at UC Berkeley, an introductory course in computer security. One of the topics covered in the course was buffer overflows, which are a common type of vulnerability that can be used to execute arbitrary code on a system. With nearly 60% of all cyber attacks involving some form of buffer overflow, it is crucial to understand how they work and how to prevent them.
Read more →

Implementing a Neural Network in Python

Introduction # This past summer, I enrolled in CS188 at UC Berkeley, an introductory course in Artificial Intelligence. Additionally, for my third semester project at Epita, I worked with neural networks. These experiences inspired me to write a blog post on the topic. What is the XOR problem? # The XOR problem is a problem in which we have two inputs. True or False for each input. and we want to return True if the two inputs are different, and False if they are the same.
Read more →

Enhancing Threat Detection with JA3 in Cybersecurity

Introduction # As the frequency of DDoS attacks has been on the rise in recent years, along with their growing complexity, it becomes increasingly crucial to explore more effective methods for identifying malicious requests targeting web servers. According to CloudFlare’s report, despite a year-long decline, the final quarter of the year witnessed a significant 79% surge in HTTP DDoS attack traffic. Overview # To keep it short JA3 is a method for fingerprinting clients.
Read more →