• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    What is a “False Positive”?

    June 3, 2021 /

    A true positive is an outcome where the model correctly predicts the positive case. Ex: Downloaded file is malware, and the A.V. detected it as malware. A true negative is an outcome where the model correctly predicts the negative case. Ex: Downloaded file is NOT malware, and the A.V. did NOT detect it as malware. A false positive is an outcome where the model incorrectly predicts the positive case. Ex: Downloaded file is NOT malware, but the A.V. detected it as malware. A false negative is an outcome where the model incorrectly predicts the negative case. Ex: Downloaded file is a malware, AV did NOT detect it as malware. True…

    read more
    Aaron Comments Off on What is a “False Positive”?

    You May Also Like

    Covid-19 “Dramatically accelerated” e-Commerce Up to 5+ Years: Kohl’s CEO…

    December 30, 2020

    Function Overloading–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021

    Blockchain & Money: Session 7: Technical Challenges by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 16, 2021
  • Tech

    What is Attack Surface?

    June 2, 2021 /

    Attack surface. First thing I start thinking is the surface area, or the exposed area that is susceptible to a cyber onslaught by threat actors, or bad people with malicious intent. According to Wikipedia: “The attack surface of a software environment is the sum of the different points (for “attack vectors”) where an unauthorized user (the “attacker”) can try to enter data to or extract data from an environment. Keeping the attack surface as small as possible is a basic security measure.” via Wikipedia “KEEPING THE ATTACK SURFACE AS SMALL AS POSSIBLE IS A BASIC SECURITY MEASURE.” **clap, clap** Does that last line stick out to anyone else?? It should.…

    read more
    Aaron Comments Off on What is Attack Surface?

    You May Also Like

    Blockchain & Money: Session 20: Primary Markets, ICOs, and Venture Capital, Part 2, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    Metaverse security is a thing because security is still a thing…

    December 3, 2021

    Blockchain & Money: Session 9: Permissioned Systems by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 19, 2021
  • Tech

    Start With Why — How Great Leaders Inspire Action | Simon Sinek | TedX [VIDEO]

    June 2, 2021 /

    read more
    Aaron Comments Off on Start With Why — How Great Leaders Inspire Action | Simon Sinek | TedX [VIDEO]

    You May Also Like

    More Notes!!! [Ruby Programming Language Notes]

    May 19, 2021

    What is a password manager and why do you need one…

    November 29, 2021

    Remote Connectivity–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021
  • Tech

    What is Traffic Light Protocol (TLP)?

    June 2, 2021 /

    Traffic Light Protocol (TLP) is a system for classifying sensitive information created in the early 2000s in order to facilitate greater sharing of information. “TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s).”[1] TLP is “optimized for ease of adoption, human readability and person-to-person sharing”.[1] It is to be noted that TLP is distinct from the Chatham House Rule, BUT may be used in conjunction, if deemed appropriate by the information exchange participants. Chatham House Rule— “when a meeting, or part thereof, is held under the…

    read more
    Aaron Comments Off on What is Traffic Light Protocol (TLP)?

    You May Also Like

    Ruby Programming Language Notes

    May 17, 2021

    Metaverse security is a thing because security is still a thing…

    December 3, 2021

    The Covid-19 Crisis Highlights the Need for “Digital Upskilling”…

    December 30, 2020
  • Tech

    What is Remote Code Execution?

    June 2, 2021 /

    What is Remote code execution (RCE)? A simple web search brings up a Wikipedia page on Arbitrary code execution (ACE). According to Wikipedia: In computer security, arbitrary code execution (ACE) is an attacker’s ability to execute arbitrary commands or code on a target machine or in a target process. An arbitrary code execution vulnerability is a security flaw in software or hardware allowing arbitrary code execution. A program that is designed to exploit such a vulnerability is called an arbitrary code execution exploit. The ability to trigger arbitrary code execution over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution…

    read more
    Aaron Comments Off on What is Remote Code Execution?

    You May Also Like

    The Essentials of Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 11, 2021

    Remote Connectivity–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021

    Portable Computing—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 8, 2021
  • Tech

    Security Engineering Analysis Framework Notes…

    June 1, 2021 /

    Good security engineering requires 4 things: Policy: what you’re supposed to achieve Mechanism–the ciphers, access controls, hardware tamper-resistance, and other machinery that you assemble in order to implement the policy. Assurance–the amount of reliance you can place on each particular mechanism. Incentive–the motive that the people guarding & maintaining the system have to do their job properly.

    read more
    Aaron Comments Off on Security Engineering Analysis Framework Notes…

    You May Also Like

    Blockchain & Money: Session 16: Central Banks and Commercial Banking, Part 2 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    BIOS & Intro to Core Hardware & Firmware—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021

    TCP/IP Applications–Making TCP/IP Work–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 13, 2021
  • Tech

    Security + Course Notes

    June 1, 2021 /

    Threats, Attacks & Vulnerabilities Malware Malicious software; Broad term; there are many kinds of malware. Viruses Cyrpto-malware Ransomware Worms Trojan Horse Rootkits Keyloggers Adware/Spyware Botnets How do you get malware? These all work together. A worm takes advantage of a vulnerability. Or, installs malware that includes a remote-access backdoor. Bot may be installed later. Your computer must run a program. Email link–Don’t Click Links! Web page pop-ups Drive-by download Worm Your computer is vulnerable Operating System–keep updated! OS & applications. Viruses & Worms Viruses–malware that can reproduce itself; it doesn’t need you to click anything; it needs you to execute a program; Just simply running a program can spread a…

    read more
    Aaron Comments Off on Security + Course Notes

    You May Also Like

    What is GIT? GIT–Version Control System

    May 20, 2021

    Internet & The Cloud—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 6, 2021

    Linked In, Microsoft, GitHub Offer Pandemic Relief through Online Education Training Courses & Certification…

    December 30, 2020
  • Tech

    More C++ Notes…

    June 1, 2021 /

    More C++ Notes… Step 1–Define the problem to solve. Step 2–Define a solution. Step 3–Write a program that implements the solution. Step 4–Compile the program. Step 5–Link object files. Step 6–Test program. Step 7–Debug. C++ files should end in ‘.cpp‘ extension to indicate a C++ source file. Ex: name.cpp Use a C++ compiler to compile a C++ (.cpp) program. The C++ compiler sequentially goes through each source code (.cpp) file in your program & does 2 important tasks: First, it checks the code to make sure it follows the rules of the C++ language. If it does not, the compiler will give you an error to help pinpoint what needs…

    read more
    Aaron Comments Off on More C++ Notes…

    You May Also Like

    What is Hurricane Electric? Let’s Find Out Whilst Learning About Some Computer/Cyber Network Fundamentals!!!

    April 14, 2021

    “The Truth About Blockchain” from HBR by Marco Iansiti & Karim Lakhani

    April 20, 2021

    Working With the Command-Line Interface–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021
  • Tech

    Slackware Linux Configuration Notes

    June 1, 2021 /

    After the initial install of Linux, I am now configuring my install of Slackware Linux: Slackware Linux Configuration Notes Configure Info The first screen prompt in this next process was to “Make USB Flash Boot”. “If your computer supports booting from a USB device, it is recommended that you make a USB boot stick for your system at this time. It will boot your computer straight into the root filesystem on ‘/dev/sda2’. “Please insert a USB flash memory stick and then press ENTER to create a boot stick. WARNING! The existing contents of the USB stick will be erased.” The options are: Create–Make a USB Linux boot stick, or, Skip–Skip…

    read more
    Aaron Comments Off on Slackware Linux Configuration Notes

    You May Also Like

    Enumeration–Functions–STRUCTURED PROGRAMMING Course Notes

    May 27, 2021

    The Visible Computer—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021

    Display Technologies—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021
  • Tech

    Arch Linux/Slackware Linux Install Notes

    June 1, 2021 /

    (Note: I first downloaded Arch Linux, and after doing that process noticed that much of the same below also applies to the install of Slackware. Also, more on Slackware install below starting with the “a” series section below.) I downloaded the Arch Linux ISO image from the Arch download site. Used “SHASUM” to verify. Now in Terminal on Mac, I entered the following (after using Disk Utility to erase the USB device): $ diskutil list (This showed a list of storage devices including my 32GB USB drive, as /dev/disk2 (external, physical). I made sure to verify the name & size so as NOT to touch my main Mac storage drive!)…

    read more
    Aaron 1 Comment

    You May Also Like

    What is Hurricane Electric? Let’s Find Out Whilst Learning About Some Computer/Cyber Network Fundamentals!!!

    April 14, 2021

    Blockchain & Money: Session 14: Blockchain Payments, Part 2 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 20, 2021

    Blockchain & Money: Session 7: Technical Challenges by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 16, 2021
 Older Posts
Newer Posts 

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2025 Starby Four.
Ashe Theme by WP Royal.