After all, what is ChatGPT?

ChatGPT is an artificial intelligence language model developed by OpenAI that is capable of generating natural language responses to a wide range of queries and conversations. This innovative technology represents a major leap forward in the field of natural language processing (NLP) and has the potential to change the way we communicate with machines, as well as the way machines interact with us. At its core, ChatGPT is powered by deep learning algorithms that allow it to analyze and learn from vast amounts of text data....

March 3, 2023 · doreox

Essential areas of knowledge to get started in Cybersecurity

Cybersecurity is a rapidly growing field, and with the increasing prevalence of cyberattacks, it has become more important than ever before. Whether you’re interested in becoming a cybersecurity professional or simply want to learn more about protecting your own online presence, there are several essential areas of knowledge you should familiarize yourself with. Keep in mind that you don’t need deep knowledge in any of these topics to get started, but a general overview and understanding of the subjects mentioned....

February 24, 2023 · doreox

Perceptron: The most simple form of an artificial neural network

The Perceptron was created in 1958 by Rosenblatt, being the most simple form of an artificial neural network, built of one single neural layer and a single neuron. The following image shows how a perceptron works. For inputs, we have a vector of values and a vector of weights. The computation of a single layer perceptron is performed over the calculation of the sum of the input vector each with the value multiplied by the corresponding element of the vector of the weights....

July 19, 2022 · doreox

The Hacking Methodology

The hacking methodology is a methodical and logical process that every hacker follows to accomplish a penetration test. This ensures consistency and a pattern to be followed by the industry. The Process that pentesters follow is: Reconnaissance Enumeration/Scanning Exploitation Privilege Escalation Covering Tracks Reporting Reconnaissance Reconnaissance is the most important step of the process, it is a pretty simple concept. In this phase, the hacker must collect the maximum amount of useful information about the target....

October 5, 2021 · doreox

Ex Machina Easter Egg Code

Recently I watched Ex Machina (2015) and a scene made me curious. During a scene that Caleb is hacking into Nathan’s computer, you can see him typing a code, clearly in Python if you know the language. I decided to rewrite this code and run it to see the output. You can check the code below or download it from my GitHub: https://github.com/doretox/ex-machina-easter-egg Just looking at the code it says nothing, but if you run it using Python 2 you will get the following output:...

March 20, 2021 · doreox