Plato Data Intelligence.
Vertical Search & Ai.

Tag: Python

Is Xbash the Swiss Army Knife of Windows and Linux malware?

Reading Time: 4 minutes Recently discovered Xbash malware fits an emerging trend. It’s not just one type of malware, it’s at least four different...

Xbash Combines Botnet, Ransomware That Targets Windows And Linux

Reading Time: 4 minutesRecently discovered Xbash malware fits an emerging trend. It’s not just one type of malware, it’s at least four...

The Batch Normalization layer of Keras is broken

April 17, 2018 Vasilis Vryniotis . 28 Comments UPDATE: Unfortunately my Pull-Request to Keras that changed the behaviour...

5 tips for multi-GPU training with Keras

January 21, 2018 Vasilis Vryniotis . 1 Comment Deep Learning (the favourite buzzword of late 2010s along with...

Ubuntu 17.10: a last minute review

October 8, 2017 Vasilis Vryniotis . 3 Comments On October 19 2017, Ubuntu 17.10 will be released and...

Learn how Comodo mod security will protect your web against attack

Reading Time: 6 minutesContents:1. Introduction2. Preparing the environment3. Attack analysis and prevention4. Conclusion1) IntroductionWeb applications are arguably the most important element of...

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Reading Time: 6 minutes Contents: 1. Introduction2. Preparing the environment3. Attack analysis and prevention4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s...

Getting the GPU usage of NVIDIA cards with the Linux dstat tool

February 11, 2017 Vasilis Vryniotis . 6 Comments The dstat is an awesome little tool which allows you...

Comodo One. Understanding Windows Profiles in ITSM

Reading Time: 36 minutesComodo One. Understanding Windows Profiles in ITSM How to hide/show security client and communication client tray icons in devices? Step 1: Go...

Comodo One. Understanding Procedures | Schedule Procedure

Reading Time: 17 minutesComodo One. Understanding ProceduresHow to filter proceduresStep 1: Go to ITSM > CONFIGURATION TEMPLATES > ‘Procedures’ and click Filter...

Comodo One. Understanding Procedures

Reading Time: 17 minutesComodo One. Understanding Procedures How to filter procedures Step 1: Go to ITSM > CONFIGURATION TEMPLATES > ‘Procedures’ and click Filter icon Step...

Beware the impossible smart contract

The three most common smart contract misconceptionsAs the developers of a popular blockchain platform, we sometimes get asked whether Ethereum-like smart contracts are...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?