bitcoinblinker (@bitcoinblinker) 's Twitter Profile
bitcoinblinker

@bitcoinblinker

twitch.tv/bitcoinblinker #bitcoin #cybersecurity

ID: 1576309566337417217

calendar_today01-10-2022 20:34:52

256 Tweet

25 Followers

101 Following

Leandro von Werra (@lvwerra) 's Twitter Profile Photo

Did you know that you can train all Llama-2 models on your own data in just a few lines? The script even works with the 70B model on a single A100 GPU thanks to the magic of 4bit and and PEFT! Learn more: huggingface.co/docs/trl/main/… Full script: github.com/lvwerra/trl/bl…

Did you know that you can train all Llama-2 models on your own data in just a few lines?

The script even works with the 70B model on a single A100 GPU thanks to the magic of 4bit and and PEFT!

Learn more: huggingface.co/docs/trl/main/…
Full script: github.com/lvwerra/trl/bl…
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Being a hacker has little to with your job. It's in your blood, your soul— it's a way of thinking. It's curiosity, creativity, and challenging norms. It's a relentless pursuit of knowledge, it's embracing the unconventional. Whatever you do today, bring the hacker mindset.

S.E. Robinson, Jr. (@serobinsonjr) 's Twitter Profile Photo

So, Elon Musk made a statement yesterday during the Tesla Q2 Financial call, that really caught my attention. “I should say another cool thing about Optimus is that there's, just in the U.S. alone, there are 2 million amputees. And I was just talking to the Neuralink team, and

So, <a href="/elonmusk/">Elon Musk</a> made a statement yesterday during the <a href="/Tesla/">Tesla</a> Q2 Financial call, that really caught my attention. 

“I should say another cool thing about Optimus is that there's, just in the U.S. alone, there are 2 million amputees. And I was just talking to the Neuralink team, and
The Hacker News (@thehackersnews) 's Twitter Profile Photo

U.S. #cybersecurity agency warns of a critical flaw (CVE-2023-3519) in Citrix NetScaler ADC and Gateway devices being exploited by hackers to drop web shells on vulnerable systems. Learn more: thehackernews.com/2023/07/citrix… #informationsecurity #infosec #cyberattacks

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

Web Check - All-in-one website OSINT tool for analysing any website Uncover potential attack vectors, analyse server architecture, view security configurations, and learn what technologies a site is using. web-check.as93.net #cybersecurity #infosec #OSINT

Web Check - All-in-one website OSINT tool for analysing any website

Uncover potential attack vectors, analyse server architecture, view security configurations, and learn what technologies a site is using.

web-check.as93.net

#cybersecurity #infosec #OSINT
The Hacker News (@thehackersnews) 's Twitter Profile Photo

Protecting local governments from #ransomware attacks is crucial! Implementing robust password policies is a step towards enhanced security. Check out tools like Specops Password Policy to keep your organization safe! Read: thehackernews.com/2023/07/local-… #cybersecurity

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Beware of BundleBot, a stealthy #malware strain that's stealing sensitive info from compromised hosts! It spreads through #Facebook Ads, cleverly disguised as regular programs, AI tools, or games. Read: thehackernews.com/2023/07/sophis… #cybersecurity #informationsecurity

Shubham Sharma (@shubham_pen) 's Twitter Profile Photo

Practical Threat Intelligence #cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness

Practical Threat Intelligence

#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
Cal J Hudson (@caljhud) 's Twitter Profile Photo

Approaches to cybersecurity interviews vary from company to company. Regardless of the role, it's always good to prepare for some common/basic technical questions to demonstrate your knowledge and competence. Here are 8 Technical Interview Questions that you should prep for 👇

Approaches to cybersecurity interviews vary from company to company.

Regardless of the role, it's always good to prepare for some common/basic technical questions to demonstrate your knowledge and competence.

Here are 8 Technical Interview Questions that you should prep for 👇
Sumanth (@sumanth_077) 's Twitter Profile Photo

K Nearest Neighbors(KNN) implemented from scratch in Python🔥 Here is the step by step explanation with code. Thread 🧵👇

K Nearest Neighbors(KNN) implemented from scratch in Python🔥

Here is the step by step explanation with code.

Thread 🧵👇
Physics In History (@physinhistory) 's Twitter Profile Photo

When Oppenheimer met Einstein: "Einstein, who had witnessed the cataclysmic potential of this energy, was cautiously wary. He cautioned against the unbridled release of such power, fearing its devastating consequences. Oppenheimer, however, saw a glimmer of controlled potential

When Oppenheimer met Einstein:

"Einstein, who had witnessed the cataclysmic potential of this energy, was cautiously wary. He cautioned against the unbridled release of such power, fearing its devastating consequences. Oppenheimer, however, saw a glimmer of controlled potential
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 HotRat, a dangerous variant of the AsyncRAT #malware, is spreading through pirated versions of popular software and games. Read: thehackernews.com/2023/07/hotrat… #cybersecurity #informationsecurity #infosec

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports thehackernews.com/2023/07/azure-…

Moritz Laurer (@moritzlaurer) 's Twitter Profile Photo

Microsoft and Tsinghua U. claim to have found the "Successor to Transformer for Large Language Models": RetNet. They claim better language modelling performance, with 3.4x lower memory consumption, 8.4x higher throughput, 15.6x lower latency. 1/2

Microsoft and Tsinghua U. claim to have found the "Successor to Transformer for Large Language Models": RetNet. They claim better language modelling performance, with 3.4x lower memory consumption, 8.4x higher throughput, 15.6x lower latency. 1/2
Kirk Borne (@kirkdborne) 's Twitter Profile Photo

I love this beautiful and extraordinarily well published book: "Better Data Visualizations" by Jon Schwabish Get it at amzn.to/3s2jIMX —————— #DataViz #DataStorytelling #Statistics #VisualAnalytics #DataScience #DataScientists #BeDataBrilliant

I love this beautiful and extraordinarily well published book: "Better Data Visualizations" by <a href="/jschwabish/">Jon Schwabish</a>

Get it at amzn.to/3s2jIMX 
——————
#DataViz #DataStorytelling #Statistics #VisualAnalytics #DataScience #DataScientists #BeDataBrilliant