BlogHide Resteemscristi (70)in steemit • last yearblankblankcristi (70)in crypto • 4 years agoblankblankcristi (70)in cybersecurity • 5 years agoDefcon Las Vegas 2018 - A Cybersecurity VlogLast August I attended the mega popular cybersecurity conference Defcon in Las Vegas. In short, it was an amazing experience. It was my first time in Las Vegas and it was fabulous! I tried…cristi (70)in cybersecurity • 5 years agoWriting your Own Exploits as a PentesterIn this video I share my thoughts on the difficulty/feasibility of developing your own exploits as a penetration tester.cristi (70)in cybersecurity • 6 years agoHow to Stay Safe in an Online Chaos - A Common Sense GuideIt's been a while... My focus for the past year has been on cybersecurity and most of my videos on my youtube channel are on the topic. In this recent one I give you a few suggestions on how to…cristi (70)in deep-learning • 6 years agoNeural Networks and TensorFlow - Deep Learning Series [Part 25]The 25th video in my deep learning series. In this lesson I begin talking about text and sequence data. Later on we will be implementing sequence models in TensorFlow, training them, determining…cristi (70)in experiment • 6 years agoHow Alpha Lipoic Acid Impacts my Glucose and Ketones - [Self-Experiment]In this quick video I I discuss about alpha lipoic acid and its impact on my blood glucose and blood ketones. My thoughts are not entirely, but partially correct. Why? Because I only control for a…cristi (70)in obesity • 6 years agoNew Obesity Hypothesis - A Talk by Dr. Michael EadesMichael Eades, author of Protein Power, and a long time advocate of low-carbohydrate diets, has recently given a talk at 'Low Carb Down Under' and these folks posted the talk on their Youtube…cristi (70)in experiment • 6 years agoWalkthrough for Quaoar - A Vulnerable Machine from VulnhubIn this video I exploit the vulnerable machine called Quaoar from vulnhub. My demonstrations usually go in two parts. Part one is about getting inside the server - so finding a way in. And part…cristi (70)in cybersecurity • 6 years agoStay Anonymous with Nipe - [Kali Tutorial]For those who are interested in anonymizing online presence, it's like you are familiar with tools like TOR or The Onion Router. TOR is great, but takes a bit of back-and-forth to get it going and…cristi (70)in cybersecurity • 6 years agoCybersecurity Talks - Tech Scams, Ransomware [KingCountyTV]In this briefing from the KingCountyTV, Eric Holdeman talks to cybersecurity expert David Matthews about the latest news in cybersecurity. To be honest, I only recently found out about the tech…cristi (70)in psychology • 6 years agoCBT for Brain Restructuring - [Bioneer]Adam, from TheBioneer youtube channel, posts a lot of interesting videos. To try to describe it in a couple of words, his approach is rather original. Adam is into programming, neuroscience…cristi (70)in science • 6 years agoFirst Transplant of Lab-Grown Lungs - Let's Smoke to ThatSeriously, ignore the second part of the title! But yeah, a recent experiment seems to have been successfully completed. Bio-engineered lungs have been successfully transplanted into pigs for the…cristi (70)in deep-learning • 6 years agoAI in Medicine and Healthcare - [PyData Berlin 2018]David Higgins discussed AI in medicine at the recent PyData Berlin [2018]. For those who don't know, PyData events and talks are in many large cities in the world all throught the year. Sidenote…cristi (70)in cybersecurity • 6 years agoGenetic Company Sells Your Data to Big Pharma - [ThreatWire]ThreatWire became one very good avenue to dissecting cybersecurity information in lay terms. I often share their video newsfeed to those who follow me on my social media channels. In this briefing…cristi (70)in ketosis • 6 years agoHow Does Alcohol Impact Ketosis - My ExperimentWhat better objective way to assess something than to measure it with a device? There are a lot of folks out there saying this and that about the ketogenic diet and how ketosis is to a more or…cristi (70)in science • 6 years agoMalware Analysis - Intro to RE - Lecture 2 [CS7038]This is the second lecture of the malware analysis course taught by Professor Coleman Kane. It's a one hour lecture comprising of the following topics: inspecting raw pdfs creating a python…cristi (70)in deep-learning • 6 years agoNeural Networks and TensorFlow - Deep Learning Series [Part 24]Once you have a trained model for your deep learning experiment, what do you do to improve its performance? As I discuss in the video, there are a couple of tactics that one could implement. And…cristi (70)in programming • 6 years agoLearning to Code in Less than 2 Months - [CleverProgrammer]Rafeh Qazi, who has the the Youtube channel Clever Programmer , is discussing how he taught himself computer programming in less than 2 months, and why you and anyone else can do it as well. As…cristi (70)in cybersecurity • 6 years agoWalkthrough for Bob - Part 2 [Vulnhub]This is the second part of my walkthrough for Bob, a vulnerable virtual machine from vulnhub. In the first part of this walkthrough I demonstrated how you get into the server, which was not a pretty…