How is Artificial Intelligence already being used in everyday life?

By Joey Pepka of Peptronics

This is a second part of Joey’s article from last week, and discusses current uses of AI in our daily lives.

1.   Open your phone with face ID

One of the first things many people do each morning is to reach for their smartphones. And, when your device gets unlocked using biometrics such as with face ID, it’s using artificial intelligence to enable that functionality. Apple’s FaceID can see in 3D. It lights up your face and ...

Continue Reading →
1

Emerging Trends in the Solar Industry

This is a little off the usual trail for me, but electric power redundancy and backup power systems do come of often in CISSP and other certification exams.  So here goes.

It has been a turbulent year for the solar industry. The cancellation of the solar tax credit and the subsequent market turmoil have taken a toll on everyone in the solar industry.  But there are always upcoming trends to look forward to. Some of these trends you will enjoy, while others ...

Continue Reading →
0

ChatGBT and Artificial Intelligence

By Joey Pepka of Peptronics

What is ChatGPT?

ChatGPT is a natural language processing tool driven by AI technology that allows you to have human-like conversations and much more with the chatbot. The language model can answer questions and assist you with tasks like composing emails, essays, and code.

 How does ChatGPT work?

Usage is currently open to the public free of charge because ChatGPT is in ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 3

URL (%) Percent Encoding , Base64 Encoding, and SQL Injection

By Bob Weiss

As we discussed in our first two articles, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  ...

Continue Reading →
4

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 2

Character Encoding

by Bob Weiss

Happy Pi Day.  It is also Albert Einstein’s birthday.

As we discussed in our first article, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  I ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 1

Numbering Systems

By Bob Weiss

Many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  I am planning to show examples to help you identify these types of use cases or ...

Continue Reading →
2

Stop Social Security Related Scams

On National Slam the Scam Day and throughout the year, we give you the tools to recognize Social Security-related scams and stop scammers from stealing your money and personal information. Share scam information with your loved ones. Slam the Scam!

Recognize the four basic signs of a scam:

  1. Scammers pretend to be from a familiar organization or agency, like the Social Security ...
Continue Reading →
0
Page 4 of 105 «...23456...»