Skip to content

Machine Learning Engineer

  • Story
  • Guides
  • Portfolio
  • NLP
  • Machine Learning
    • Predictive Analytics
    • Graph Analytics
    • Unsupervised Learning
    • Supervised Learning
    • Ensemble Methods
    • Deep Learning
    • Reinforcement Learning
  • Intelligence
    • Decision Intelligence
    • Threat Intelligence
    • Cognitive Intelligence
    • Financial Intelligence
  • MLOps
    • ML Design
    • ETL
    • EDA
    • Feature Engineering
    • Model Development
    • Model Training
    • Model Deployment
    • Model Monitoring
  • Programming
    • Bash
    • Python
  • Math
  • Resources

Author: jbower

  • Home
  • jbower
  • Page 2
Memory Forensics

Linux Memory Analysis: How to Start and What You Need to Know

August 7, 2017April 21, 2023 jbower

Are you ready to dive into the exciting world of memory analysis?!? No? Well that’s too bad because you need to know it. There’s an

Read More
Threat Intelligence

Threat Profile: Killer Swag

June 13, 2017April 21, 2023 jbower

Introduction I’ve been monitoring an interesting threat for the past several days, a group I’m referring to as “Killer Swag”. Mainly because the initial dropper

Read More
NIDS Threat Hunting

Threat Hunting with Bro IDS

February 20, 2017April 21, 2023 jbower

This post is a quick look at how I personally use Bro IDS for threat hunting. Specifically some of the queries I run when I

Read More
NLG NLP

Explore The Foundations: Natural Language Generation & Processing For Better Understanding

November 13, 2016April 21, 2023 jbower
Natural Language Generation & Processing For Better Understanding

Natural Language Generation & Processing Basics Both Natural Language Generation and Processing have been of interest to me for the past few years. My work

Read More
CTF

SkyDog Con 2016 CTF – Walk Through Guide

October 23, 2016April 21, 2023 jbower

Download LinkThe VM is now available for download on Vulnhub at the link below. InstructionsThe CTF is a virtual machine and works best in Virtual

Read More
NIDS

How to Install Bro IDS 2.5 on Ubuntu 16.0x

September 5, 2016April 21, 2023 jbower

I decided to write out the steps I took to for installing Bro IDS 2.5 on Ubuntu 16.0x. Before we begin installing Bro from source

Read More
Security Tools Threat Intelligence

DNS Enumeration Uncut: The Best Guide for Hackers

April 17, 2016April 21, 2023 jbower
DNS Enumeration

DNS enumeration and DNS reconnaissance is a critical threat intelligence skill to learn. In literally every aspect of threat intel you will end up running

Read More
Entity Recognition Sentiment Analysis Text Analytics Topic Modeling

Unlock the Potential of Text Analytics with Python NLTK

March 1, 2016April 21, 2023 jbower

Introduction Let’s start at the beginning. As businesses and organizations collect more data than ever, it’s essential to make sense of it so we can

Read More
CTF

SkyDog Con CTF – The Legend Begins

November 2, 2015April 21, 2023 jbower

Sky Dog Con CTF – Over but not forgotten. Download Linkhttps://download.vulnhub.com/skydog/SkyDogCTF.ova InstructionsThe CTF is a virtual machine and works best in Virtual Box. This OVA

Read More
Operating Systems

Quick and Dirty: Installing Htop on FreeBSD 10.x

August 31, 2015April 21, 2023 jbower

Htop is an interactive system-monitor process-viewer written for Linux. On most of my servers I have it up and running continually if I’m not actively

Read More

Posts navigation

Previous 1 2 3 4 Next

Categories

  • AWS
  • Books
  • CTF
  • Entity Recognition
  • Health
  • Linux
  • LLM
  • Memory Forensics
  • NIDS
  • NLG
  • NLP
  • Operating Systems
  • Productivity
  • Python
  • Security Tools
  • Sentiment Analysis
  • Tech
  • Text Analytics
  • Threat Hunting
  • Threat Intelligence
  • Topic Modeling
  • Twitter
  • GitHub
  • YouTube
  • LinkedIn

Videos

https://www.youtube.com/watch?v=FEb8KZoEyzI&t=1291s

Recent Posts

  • An LLM Ensemble for Better Large Language Model Results
  • XGBoost Classifier: The Best for Uncovering DDoS Attacks Easily
  • Decision Intelligence and Cyber Espionage: Navigating the Digital Shadows Now
  • Data Augmentation Using LLMs for Better Phishing Datasets
  • VSCode SSH and SSM: The Ultimate Combo for Sleek Remote Dev in AWS

Tags

Apache BERT Boot2Root classification Conda Data Augmentation ddos Diet Dirb Ensemble featured Firewall FreeBSD GPT-3 Hacking Hacking Challenge Htop Kioptrix LiME LLM Miniconda Mod_jk Monitoring NetworkMiner Nikto NLP NLTK Nmap Nokia 770 OpenAI OpenBSD PCAP pdfminer Peak Performance PF Productivity recon Security SSM Tomcat Visualize VSCode Word2Vec Workout xgboost

Archives

  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • February 2023
  • July 2018
  • August 2017
  • June 2017
  • February 2017
  • November 2016
  • October 2016
  • September 2016
  • April 2016
  • March 2016
  • November 2015
  • August 2015
  • September 2014
  • August 2014
  • July 2014
  • January 2014
  • June 2013
  • January 2012
  • September 2009
  • August 2009
  • September 2008
  • September 2006
Bower Enterprises All Rights Reserved 2023.
Proudly powered by WordPress | Theme: Fairy Blog by Candid Themes.