Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark – Network packet analyzer Snort – Open-source network intrusion detection system (NIDS) Suricata – High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) – Network security monitoring tool Tcpdump –…… Continue reading Cybersecurity and Cyber Forensics tools – Part 1 (Collated from internet & AI)
Top 100 mathematics keywords for Data Science – Part 1
Whoever is teaching you data science without teaching you Mathematics especially optimization is not teaching it right to you. That’s my biggest learning from Master of Data Science at IIT Gandhinagar – it will take you good 2 years to learn the related mathematics in all four major areas below. It’s not possible to learn…… Continue reading Top 100 mathematics keywords for Data Science – Part 1
PartyRock.aws apps – Part 1
Here is a list of my experimentation with PartyRock@AWS since last 2 days. It seems like an amazing platform. Try out the 11 apps and do provide feedback. What is nice is that it creates apps with widgets and various flows using only one line of description. https://partyrock.aws/u/neil-hsopc/8kdTd2eUX/ResearchMate Welcome to the Research Methodology Assistant. This…… Continue reading PartyRock.aws apps – Part 1
Notes on metadata of LLMs/GAI/AI to tie accountability, liability and more in legal terms plus study it’s evolution and analyze – Part 1
Following up on my thoughts here: https://www.linkedin.com/posts/activity-7296196592175321089-jk1B – I asked ChatGPT on metadata to achieve my goals as in the post. Here are it’s inputs. My focus is on legal accountability and evolution along with visualization / analysis of this meta-data. Some notes on metadata for AI/GAI/LLM and it’s legal ramifications for accountability: Wouldn’t it…… Continue reading Notes on metadata of LLMs/GAI/AI to tie accountability, liability and more in legal terms plus study it’s evolution and analyze – Part 1
Major optimization techniques in Data Science categorized by constrained vs. unconstrained scenarios – Part 1
1. Unconstrained Optimization Methods (Used when there are no explicit constraints on variables) Gradient-Based Methods Second-Order Methods Heuristic & Meta-Heuristic Methods Bayesian Optimization 2. Constrained Optimization Methods (Used when optimization involves constraints on variables) Convex Optimization Methods Augmented Lagrangian Methods Penalty Methods Sequential Quadratic Programming (SQP) Interior-Point Methods Constraint-Specific Heuristic Approaches Here are the Wikipedia…… Continue reading Major optimization techniques in Data Science categorized by constrained vs. unconstrained scenarios – Part 1
List of hacking types you should be protecting your website / portal against – Part 1
Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT SQL Injection Blind SQL Injection Boolean-Based SQL Injection Time-Based SQL Injection Error-Based SQL Injection Cross-Site Scripting (XSS) Reflected XSS Stored XSS DOM-Based XSS Cross-Site Request Forgery (CSRF) Clickjacking Remote File Inclusion (RFI) Local File Inclusion (LFI) Directory Traversal Session Hijacking DNS Spoofing Man-in-the-Middle (MITM) Attack…… Continue reading List of hacking types you should be protecting your website / portal against – Part 1
List of vulnerability databases
Vulnerability databases are used by variety of companies / entities to solidify their defenses in cyber world. Here is a list of vulnerability databases in prime use by various entities that I could find. https://nvd.nist.gov/ https://www.exploit-db.com/ https://msrc.microsoft.com/ https://ubuntu.com/security/notices https://github.com/advisories https://vulners.com/ https://owasp.org/ https://www.kb.cert.org/vuls/ https://www.cisa.gov/ https://www.cisa.gov/topics/industrial-control-systems https://security.snyk.io/ https://access.redhat.com/security/ https://cve.mitre.org/ Email me: Neil@HarwaniSytems.in Website: www.HarwaniSystems.in Blog: www.TechAndTrain.com/blog LinkedIn:…… Continue reading List of vulnerability databases
Information Technology Security Ecosystem – Part 1
While having a discussion, I thought of writing a blog covering all important layers of Information Technology Security ecosystem with some relevant links – so here it goes. Here are some important layers for the same: Physical security Hardware security Network security Endpoint security Application security Data security Identity and access management security Cloud /…… Continue reading Information Technology Security Ecosystem – Part 1
Time series modelling – Part 1 as per ChatGPT and Gemini
Reference: Term 2 – DSDM | IITGNX Here’s a concise list of types of time series, each with a short explanation and example: 1. Univariate Time Series Explanation: Tracks a single variable over time. Example: Daily temperature readings in a city. 2. Multivariate Time Series Explanation: Tracks multiple variables over time, often with interdependencies. Example:…… Continue reading Time series modelling – Part 1 as per ChatGPT and Gemini
How can portals & commerce have intelligence via LLMs/GAI/ChatGPT/Gemini/etc. – Part 1
Here is my solution template for having intelligence from AI/GAI/LLMs in Portals & Commerce – Part 1: Assumptions: Java/PHP/Dot Net/SharePoint/Liferay/WordPress/Drupal type of a portal and / or commerce Just like we have HTML – HEAD / BODY / FOOTER / HEADER / META TAGS / BACKEND LOGIC in Java / Front end JSP / etc.…… Continue reading How can portals & commerce have intelligence via LLMs/GAI/ChatGPT/Gemini/etc. – Part 1