Thinking about Machine Learning Data Pipelines

cyberpunk

Machine learning involves tasks that include data sourcing, data ingestion, data transformation, pre-processing data for use in training, training a model, and hosting the model. Additionally, to get value out of machine learning models, we need an architecture and process in place to repeatedly and consistently train new models and ...

more ...

A Tor Proxy in a Raspberry Pi

Sun 29 March 2015 Category DevOps

tor

In this tutorial, I walk through all the steps to set up a Tor proxy in a Raspberry Pi (Model B). This work was based on some of the tutorials from Adafruit.

Setting Up a Raspberry Pi

Installing an Operating System in the SD card

You can either install NOOBS ...

more ...

Deploying a Flask App at Heroku

Sat 21 March 2015 Category DevOps

antisocial

I was playing with Flask, and I wrote my own Anti-Social Network.

Heroku platform is very flexible, and it supports several programming languages. To deploy an application to Heroku, use Git to push the application to Heroku’s server.

Running in a Production Server

Heroku does not provide a web ...

more ...

Functional Python Stuff Super Quick

Sun 01 March 2015 Category DevOps

Python has First Class Functions

def create_adder(x):
    def adder(y):
        return x + y
    return adder

Such that:

>>> add_10 = create_adder(10)
>>> add_10(3)  
13

Python has Anonymous Functions

(lambda x: x > 2)(3)   # => True

Python has Built-in Higher Order Functions

map(add_10, [1, 2, 3])   # => [11, 12, 13]
filter(lambda ...
more ...

8 Reasons why Go is Awesome

cyberpunk

Go is a programming language developed by Google, introduced to the public in 2009. Go's developers had the goal of creating a language based on the syntax of the C programming language, elimination some "garbage" of older languages (such as C++) while containing many features of modern languages.

1 ...

more ...

Python & Algorithms Just For You

cyberpunk

Do you want to learn Python? Do you want to learn algorithms by solving the exercises from Cracking the Code Interview?

You got it! Check out an entire (free) book that I wrote for that!

Update: This book has been bought by Hanbit, to be published in Korean!

more ...

Black Hat Python: Infinite possibilities with the Scapy Module

This is a review about one of my favorites libraries in Python: Scapy, which is a very powerful packet manipulation resource.

Scapy is able to forge and decode packets of several protocols, send and capture them, match requests and replies, and much more. It can be used to handle most ...

more ...

Black Hat Python: Building a UDP Scanner

When it comes to the reconnaissance of some target network, the start point is undoubtedly on host discovering. This task might come together with the ability to sniff and parse the packets flying through the network.

A few weeks ago, I talked about how to use Wireshark for packet sniffing ...

more ...

Black Hat Python: The Paramiko Module

This is the second post based on my readings from Black Hat Python. Yesterday I talked about Python's socket module and today I'm talking about the paramiko module.

Paramiko is awesome!!! It uses my dear PyCrypto to give us access to the SSH2 protocol, and it has a ...

more ...

Black Hat Python Networking: The Socket Module

Last week I got my copy of Black Hat Python, the new Justin Seitz's book. The compilation talks about network programming, web hacking, and Windows exploitation. All in Python!

In this first post, I discuss Python's socket module, which contains all the tools to write TCP/UDP clients ...

more ...