#coder Instagram Photos & Videos

coder - 547.6k posts

Top Posts

Latest Instagram Posts

  • 这谁放我桌子上的
我啊!!咱俩一人一只
你是按肤色买的吗!!
被发现了
🙄
你知道咱公司那**人多大吗
40?
不对
39?
他90后🤨
好的
他是十年怀胎生出来的嘛
🙄🙄🙄🙄
.
.
#office #coder
  • 这谁放我桌子上的
    我啊!!咱俩一人一只
    你是按肤色买的吗!!
    被发现了
    🙄
    你知道咱公司那**人多大吗
    40?
    不对
    39?
    他90后🤨
    好的
    他是十年怀胎生出来的嘛
    🙄🙄🙄🙄
    .
    .
    #office #coder
  • 2 0 4 minutes ago
  • Principal component analysis explained
👇
Principal Component Analysis is the most frequently used concept in data science for dimensionality reduction, Here is visual explanation of the eigenvalues and eigenvector (first principal component) Blue dots the initial data on a 2D space Red dots: the projection of the blue dots onto lines, that are centered at the mean. Notice how the red dots are spread out on the rotating line in different ways depending on the position of the line (vector) on some Iines the red dots have great dispersion compared to other positions of the line. First Principal Component Eigenvectors That particular position of the rotating line (-vector)-shown in purple-where the red dots (projection of the origînal blue data) have the biggest spread out than any other line i.e, have the greatest variance on the rotating line. Eigenvalue: the actual variance of the red dots on that line. Let's say the eigenvalue (explained variance_ in sklearn) is 80 % . It means that if you project all your data to that line , you will be able to reconstruct the points with 80 % of accuracy with using only one dimension.
.
.
.
Credit:Bit.ly/2nd1XeP
.
.
.
Follow us on @smart.ai_
.
.
.
#machinelearning#ml #deeplearning  #cs #it #python #R #iot #mit #blockchain #boats #robots #programming #coding #programmers #tech #technology #bigdata #data #innovation
#techstartup
#engineering
#developer 
#programmerslife #datascience #coder  #artificialintelligence #ai
  • Principal component analysis explained
    👇
    Principal Component Analysis is the most frequently used concept in data science for dimensionality reduction, Here is visual explanation of the eigenvalues and eigenvector (first principal component) Blue dots the initial data on a 2D space Red dots: the projection of the blue dots onto lines, that are centered at the mean. Notice how the red dots are spread out on the rotating line in different ways depending on the position of the line (vector) on some Iines the red dots have great dispersion compared to other positions of the line. First Principal Component Eigenvectors That particular position of the rotating line (-vector)-shown in purple-where the red dots (projection of the origînal blue data) have the biggest spread out than any other line i.e, have the greatest variance on the rotating line. Eigenvalue: the actual variance of the red dots on that line. Let's say the eigenvalue (explained variance_ in sklearn) is 80 % . It means that if you project all your data to that line , you will be able to reconstruct the points with 80 % of accuracy with using only one dimension.
    .
    .
    .
    Credit:Bit.ly/2nd1XeP
    .
    .
    .
    Follow us on @smart.ai_
    .
    .
    .
    #machinelearning #ml #deeplearning #cs #it #python #R #iot #mit #blockchain #boats #robots #programming #coding #programmers #tech #technology #bigdata #data #innovation
    #techstartup
    #engineering
    #developer
    #programmerslife #datascience #coder #artificialintelligence #ai
  • 27 0 18 minutes ago
  • Credit: @hackergirlofficial
• • • • •
How can an attacker take control of your device remotely?
.
Let me tell about how I hacked my Android device and got remote access to the webcam, sms messages, call logs, file system. Scary, huh?
.
◼️THE RUDIMENTS◼️
A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic.
.
A reverse shell (vs bind shell) is a type of shell in which the victim machine acts as a client and initiates a connection to the attacker machine. The attacking machine acts as a server and has a listener port on which it receives the connection.
.
Instead of the attacker initiating connection to the device, which gets blocked by firewall, a backdoor running on the victim's device can easily initiate an outbound connection to a remote host on the Internet.
.
◼️THE HOW◼️
Step 1: Create the payload.
MSFvenom is a combination of Msfpayload and Msfencode. It creates your payload and encodes the code to avoid bad characters and evade IDS.
.
Step 2: Install on victim's machine.
Once the payload is generated, some social engineering is required to get the victim to run the application on their device.
.
Step 3: Meterpreter.
Once the payload is running on the victim's machine, it's time to set up the Meterpreter session.
.
Meterpreter is a command line post exploitation tool by Metasploit.
Meterpreter does not create a new process which helps avoid AV. It uses in memory DLL injection. This means source code is run within an already running process. It uses encrypted communication between attacker and victim.
.
◼️THE OBSTACLE◼️
Getting the victim to install an untrusted android APK is tricky. They need to explicitly allow it.
.
A solution is to inject the meterpreter into an existing APK to make it easier to convince the victim to install the APK and  harder for AV to detect the payload.
.
What can you teach me about steganography?
.
#software #playstation #ai #computer #like4like #python #instagood #follow4follow #technology #tech #php #blog #programmer #programmersday #coding #java #engineer #developer #xbox #softwareengineering #code #codinglife #programminglife #animation #coder #repost #hack #hacker #2019
  • Credit: @hackergirlofficial
    • • • • •
    How can an attacker take control of your device remotely?
    .
    Let me tell about how I hacked my Android device and got remote access to the webcam, sms messages, call logs, file system. Scary, huh?
    .
    ◼️THE RUDIMENTS◼️
    A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic.
    .
    A reverse shell (vs bind shell) is a type of shell in which the victim machine acts as a client and initiates a connection to the attacker machine. The attacking machine acts as a server and has a listener port on which it receives the connection.
    .
    Instead of the attacker initiating connection to the device, which gets blocked by firewall, a backdoor running on the victim's device can easily initiate an outbound connection to a remote host on the Internet.
    .
    ◼️THE HOW◼️
    Step 1: Create the payload.
    MSFvenom is a combination of Msfpayload and Msfencode. It creates your payload and encodes the code to avoid bad characters and evade IDS.
    .
    Step 2: Install on victim's machine.
    Once the payload is generated, some social engineering is required to get the victim to run the application on their device.
    .
    Step 3: Meterpreter.
    Once the payload is running on the victim's machine, it's time to set up the Meterpreter session.
    .
    Meterpreter is a command line post exploitation tool by Metasploit.
    Meterpreter does not create a new process which helps avoid AV. It uses in memory DLL injection. This means source code is run within an already running process. It uses encrypted communication between attacker and victim.
    .
    ◼️THE OBSTACLE◼️
    Getting the victim to install an untrusted android APK is tricky. They need to explicitly allow it.
    .
    A solution is to inject the meterpreter into an existing APK to make it easier to convince the victim to install the APK and harder for AV to detect the payload.
    .
    What can you teach me about steganography?
    .
    #software #playstation #ai #computer #like4like #python #instagood #follow4follow #technology #tech #php #blog #programmer #programmersday #coding #java #engineer #developer #xbox #softwareengineering #code #codinglife #programminglife #animation #coder #repost #hack #hacker #2019
  • 21 3 34 minutes ago