Technology

7 posts

At Grey Wizard we are constantly working on the development and functionality of Grey Wizard Shield, our own product and the user panel connected to it. One of the recently introduced functionalities is the ability to incorporate image compression and minification of static files. Everything takes place without the need for changes on the client's server side. All you need to do is turn on…

This article is part of a series. Part I can be found here and part II here . The full code of this tutorial was posted on Github . In the previous part we continued work on our binary classifier. We showed how to use scikit-learn's Pipeline class to combine feature calculation and prediction into one simple step. In this part we will improve performance of our model by adding new…

A modern technology causes that we are connected with the entire world. The extended network which is the Internet makes that we have everything within our reach. It is enough to switch your laptop on, take a smartphone or tablet and you can log into social media, do shopping, book a flight, log to your bank account or play your favourite game. Access to information has never been so simple.…

Git - a version control system. It has plenty of functions which can be used for unethical purposes as well. History edition History edition is a very useful function in terms of cybersecurity. Let us imagine the following situation – the Internet website was extended by one person; a repository was kept in a git. Although it is regarded as a negative practice, passwords were kept in…

Machine learning algorithms are more frequently used in applications connected with cybersecurity, in particular in systems for detecting and preventing network attacks. The functioning of these systems is frequently based on network traffic monitoring and detecting the suspicious activities of users. Machine learning enables detecting such activities without the need for the manual creating…

×

For media

Provide us with contact details.

Thank you