• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    What is a “False Positive”?

    June 3, 2021 /

    A true positive is an outcome where the model correctly predicts the positive case. Ex: Downloaded file is malware, and the A.V. detected it as malware. A true negative is an outcome where the model correctly predicts the negative case. Ex: Downloaded file is NOT malware, and the A.V. did NOT detect it as malware. A false positive is an outcome where the model incorrectly predicts the positive case. Ex: Downloaded file is NOT malware, but the A.V. detected it as malware. A false negative is an outcome where the model incorrectly predicts the negative case. Ex: Downloaded file is a malware, AV did NOT detect it as malware. True…

    read more
    Aaron Comments Off on What is a “False Positive”?

    You May Also Like

    Routing–The World of TCP/IP–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 13, 2021

    What is a “Function” in Programming?, & What is “Object Oriented Programming” (OOP)–Notes

    May 24, 2021

    Internet & The Cloud—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 6, 2021
  • Tech

    What is Attack Surface?

    June 2, 2021 /

    Attack surface. First thing I start thinking is the surface area, or the exposed area that is susceptible to a cyber onslaught by threat actors, or bad people with malicious intent. According to Wikipedia: “The attack surface of a software environment is the sum of the different points (for “attack vectors”) where an unauthorized user (the “attacker”) can try to enter data to or extract data from an environment. Keeping the attack surface as small as possible is a basic security measure.” via Wikipedia “KEEPING THE ATTACK SURFACE AS SMALL AS POSSIBLE IS A BASIC SECURITY MEASURE.” **clap, clap** Does that last line stick out to anyone else?? It should.…

    read more
    Aaron Comments Off on What is Attack Surface?

    You May Also Like

    Blockchain & Money: Session 17: Secondary Markets and Crypto-Exchanges, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    April 14, 2021

    What is Multi-Factor Authentication and Why is It Necessary?

    December 30, 2020
  • Tech

    More Programming Notes…

    May 31, 2021 /

    Value–the representation of some entity that can be manipulated by a program. The members of a ‘type‘ are the values of that type. Data are characteristics, or information, usually numerical, that are collected through observation. In a more technical sense, data are a set of values of qualitative or quantitative variables about one or more persons or objects, while a datum (singular of data) is a single value of a single variable. In academic treatments, data are simply units of information. Data re employed in virtually every form of human organizational activity. Data are measured, collected & reported, and analyzed. Raw data (“unprocessed data” is a collection of numbers or…

    read more
    Aaron Comments Off on More Programming Notes…

    You May Also Like

    Sorting &Swapping Elements, & Bubble Sort Algorithms!!! [Ruby Programming Language Notes]

    May 19, 2021

    USB (Universal Serial Bus) Standards—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021

    Troubleshooting Operating Systems–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021
  • Tech

    Computer Organization–Notes

    May 25, 2021 /

    Computer Organization Input Unit–the “receiving” section. It obtains info from input devices & places it at the disposal of the other units for processing. Output Unit–the “shipping” section takes information that the computer has processed & places it on various output devices to make it available for use outside the computer. (i.e.–displayed on screens, printed on paper, played on audio devices, or used to control other devices. Can also be output to networks, such as the Internet. Memory Unit–this rapid-access, relatively low-capacity “warehouse” section retains info that has been entered through the input unit, making it immediately available for processing when needed. Also retains processed info until it can be…

    read more
    Aaron Comments Off on Computer Organization–Notes

    You May Also Like

    What is a ‘NOC’? What is a ‘SOC’? The Battle of ‘NOCs’ vs. ‘SOCs’…

    June 3, 2021

    Understanding Permissions: Notes: List of Terminal Commands

    May 20, 2021

    Building a P.C.—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 9, 2021

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2026 Starby Four.
Ashe Theme by WP Royal.