Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.

  • 0 Posts
  • 152 Comments
Joined 1 year ago
cake
Cake day: March 27th, 2024

help-circle









  • Ok, thanks for that clarification. I guess I’m a bit confused as to why a comparison is being drawn between neurons in a neural network and neurons in a biological brain though.

    In a neural network, the neuron receives an input, performs a mathematical formula, and returns an output right?

    Like you said we have no understanding of what exactly a neuron in the brain is actually doing when it’s fired, and that’s not considering the chemical component of the brain.

    I understand why terminology was reused when experts were designing an architecture that was meant to replicate the architecture of the brain. Unfortunately, I feel like that reuse of terminology is making it harder for laypeople to understand what a neural network is and what it is not now that those networks are a part of the zeitgeist thanks to the explosion of LLM’s and stuff.



  • I’m not saying radiation like nukes. I’m saying that you treat cancer with radiation even though it kills nearby healthy cells. We tried surgery by electing Biden, but he didn’t get all the cancer. Maybe if a fucking rabid dog had been appointed to the DoJ instead of the feckless Garland it could have worked, idk.

    The weaknesses in the American systems of government have been both discovered and exploited. There’s no coming back from these systems being broken. It’s time to treat the cancer with radiation by building new systems.

    What kind of person reads my first post on context and assumes I’m talking about nuclear war? I feel sorry for you bro.




  • No. You can have control over specific parameters of an SQL query though. Look up insecure direct object reference vulnerabilities.

    Consider a website that uses the following URL to access the customer account page, by retrieving information from the back-end database: https://insecure-website.com/customer_account?customer_number=132355 Here, the customer number is used directly as a record index in queries that are performed on the back-end database. If no other controls are in place, an attacker can simply modify the customer_number value, bypassing access controls to view the records of other customers.