Fast Neural Networks a no brainer The Actor model as neuron by Riccardo Terrell

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=wUjXS40PFm0



Duration: 56:32
4 views
0


CarolinaCon - 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CarolinaCon
https://carolinacon.org/
CarolinaCon is a regional, technology hacking and InfoSec conference, held annually in North Carolina.

The conference was founded in 2004 by members of the Raleigh 2600 group. CarolinaCon has focused on presenting educational materials from a variety of guest speakers on various aspects of computing, technology, and information security.

The event is currently sponsored by the 501(c)3 non-profit organization "The Carolinacon Group". The goal of hosting the event is to provide an intimate, informal, and inexpensive venue for knowledge sharing.

A variety of side events has been an annual part of the conference, such as Wardriving, Lockpick Village, Capture The Flag, an "unofficial" Shooting event, Crypto Challenges, LAN gaming, Guitar Hero battle, Ham Radio, Crypto Key Signing, Vintage Tech Museum, etc. The Con generally closes with a game of Hacker Trivia.




Other Videos By All Hacking Cons


2022-01-31Zero day NET and Nvidia GFE Vulnerabilities Explained
2022-01-31Catching the CAN Bus Car Hacking on a Budget
2022-01-31Hacking Humans Using OSINT to put together Social Engineering Scenarios that Always Work
2022-01-31DNS tunneling down the rabbit hole
2022-01-31Your IPv6 is Showing
2022-01-31Crash Course on Web Application Penetration Testing Thinking Outside the OWASP 10
2022-01-31Hack in Your Sleep
2022-01-31Hacking The Invasion of Things or as my wife calls it, what did you spend our money on this time
2022-01-31Kernel Mod Rootkits on Modern Linux Systems by Alex Caceres
2022-01-31How playing CTF made me a better hacker is this your password by Jeff Macko
2022-01-31Fast Neural Networks a no brainer The Actor model as neuron by Riccardo Terrell
2022-01-31Presenting P@cketR@quet An Auditory IDS Network Auralizer by Killian Ditch
2022-01-31OOM OOM POW Deserialization by Jason Gillam
2022-01-31Blockchain The New Digital Swiss Army Knife by G Mark Hardy
2022-01-31OSINT for Everyone Understanding Risks and Protecting Your Data by Micah Hoffman and Josh Huff
2022-01-31Master Baiting Don’t Click Bait, Click Yourself by BACE16
2022-01-31Honeypots, Deception, and Frankenstein by Phillip Maddux
2022-01-31Writing FreeBSD Malware by Shawn Webb
2022-01-31The GHS Shoot house for WiFi Pat Wylie and Shawn Brown YouTube
2022-01-31HideNSneak A framework to obfuscate attack traffic by Mike Hodges
2022-01-31Show the Threat Data Visualization and InfoSec by TJ @reonfleek



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering