I want to create a toolkit for fast deployment of very small virtual machines that would easily and quickly isolate software and hide information about host hardware and its identifiers with randomization of virtual machine hardware, pass machine traffic through Tor, create temporary virtual machines placed in RAM to leave no traces based on qemu/kvm and live-build
Maybe use GNU and FSF approved free distributions as a base?
Maybe use GNU and FSF approved free distributions as a base?
Forwarded from Hacker News
Forwarded from Hacker News
📚 Cs/books/uwu
i need people on my discord
For privacy lovers
Mail - https://www.minuteinbox.com/
Proxy - https://github.com/IMakeShit/SSPublicSubList
Mail - https://www.minuteinbox.com/
Proxy - https://github.com/IMakeShit/SSPublicSubList
MinuteInbox
MinuteInbox | 10 Minute Mail Service
10-minute mail service provides temporary email for 10 minutes. Stay safe with MinuteInbox, the online service for temporary email addresses. Set the timer for 10 minutes to one month.
📚 Cs/books/uwu
For privacy lovers Mail - https://www.minuteinbox.com/ Proxy - https://github.com/IMakeShit/SSPublicSubList
GitHub
GitHub - constverum/ProxyBroker: Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS :performing_arts:
Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS :performing_arts: - constverum/ProxyBroker
Forwarded from Linuxgram 🐧
New Ubuntu Linux security bypasses require manual mitigations
https://www.bleepingcomputer.com/news/security/new-ubuntu-linux-security-bypasses-require-manual-mitigations/
https://www.bleepingcomputer.com/news/security/new-ubuntu-linux-security-bypasses-require-manual-mitigations/
BleepingComputer
New Ubuntu Linux security bypasses require manual mitigations
Three security bypasses have been discovered in Ubuntu Linux's unprivileged user namespace restrictions, which could be enable a local attacker to exploit vulnerabilities in kernel components.
reinforcement learning
Youtube: https://www.youtube.com/watch?v=NFo9v_yKQXA&list=PLzvYlJMoZ02Dxtwe-MmH4nOB5jYlMGBjr
https://spinningup.openai.com/en/latest/
https://rltheorybook.github.io/rltheorybook_AJKS.pdf
Youtube: https://www.youtube.com/watch?v=NFo9v_yKQXA&list=PLzvYlJMoZ02Dxtwe-MmH4nOB5jYlMGBjr
https://spinningup.openai.com/en/latest/
https://rltheorybook.github.io/rltheorybook_AJKS.pdf
YouTube
Reinforcement Learning, by the Book
The machine learning consultancy: https://truetheta.io
Join my email list to get educational and useful articles: https://mailchi.mp/truetheta/true-theta-email-list
#reinforcementlearning
Part one of a six part series on Reinforcement Learning. If you…
Join my email list to get educational and useful articles: https://mailchi.mp/truetheta/true-theta-email-list
#reinforcementlearning
Part one of a six part series on Reinforcement Learning. If you…