High Scope of Learning Deep

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

woman sat on a sofa with a smartphone.
Oh lord, Z-Daddy is going to talk about the great machine uprising. This is so much better than Netflix and chilling.
Photo by Andrea Piacquadio, please support by following @pexel.com

Have you ever sat on the couch vegging out to your favorite episode of My 600 lb. life and while sitting on your fart box, mindlessly snacking on your way to the ER, have the thought;” I wonder if it would be possible to make a computer think more like a human”? If your answer is no, then you’re not alone in that sentiment as a large amount of us don’t typically have thoughts present themselves in such a matter.

However, if you are a part of the unlucky few that have pondered this question then I’m glad to inform you that even though you are in a niche group you too are not alone. Although, some of the people who have a thought like that pop-up may either be passionate about computers or stoners.

Stoners are a more probable cause because, well, after ascending to a certain level of cloud technology you’re prone to think about anything and certain topics become easier to understand for some reason. Anyway, being half-baked aside, let’s take a deeper look at just how we find ways for computers to learn and how you, whether you are aware or not, are helping in the learning process. And yes, this might be done against your will.

man with hand on head looking at laptop.
How do I get a computer to understand thought? I should use this new Brazzers app I just downloaded.
Photo by Andrea Piacquadio, please support by following @pexel.com

AI and Wrecking Bots

Whether you are into tech or just developing an interest, as of late, there is a chance that you’ve heard about the AI (Artificial Intelligence) chatbot craze which has led to every big tech company coming out with its own “better version” than the others. But in case you haven’t, here’s a brief overview. Weeks back ChatGPT (a chatbot belonging to OpenAI) was released making like Miley Cyrus and “Came in like a wrecking ball” to the industry, taking the internet by storm.

Not only could ChatGPT provide interactions and responses close to that of a human, but it could also aid in coding and in some cases, do college students’ essays for them. This is something I could have used back when I was in college, could’ve had someone to chat with, and probably wouldn’t have dropped out but whatever. Google following this release, released its own clap back in the form of Bard.

Again, they offer the same purpose, it’s just a “my stick is bigger than yours” situation. But the thing these bots have in common is how they process and develop information. This is done by using a subset of machine learning called “Deep Learning”. Deep learning is, in a nutshell, the creation of a neural network with three or more layers.

This is done in an attempt to simulate the neural networks of the behavior in the human brain. Notice, this is an “attempt” as the human brain can be quite complex, and some humans just don’t brain well.

view from bottom of a well
After covid, this is pretty much everyone’s’ current view.
Photo by ArtHouse Studio, please support by following @pexel.com

A High View Over Deep

So, what is meant by the term “Deep”? This term refers to functions with higher complexity in the number of layers and units in a single layer. In English, this breaks down to, for example using the chewing gum Trident Layers. Within the gum is three layers, each layer holds a color, and within each color is a flavor, and within that are ingredients to create said flavor. All these items come together to form a well-known chewing gum whose flavor only lasts for about one minute and thirty seconds.

Disappointment in chewing gum aside, this idea of the data layers and data within them has a play into the concept of Deep Neural Networks (DNN) which were inspired by how the human brain functions. How this differs from machine learning or ML? ML uses algorithms to parse data, withdraw insight from said data, and conclude informed decisions.

Deep learning, on the other hand, structures a neural network similar to the brain that can learn and make decisions on its own. In another nutshell, you’re pretty much putting a ghost in the machine…just hope and pray it doesn’t find out it’s not a real boy.

smiling female traveler holding a hand of lover.
If I can deep learn a computer…then I might be able to deep learn her.
Photo by Vanessa Garcia, please support by following @pexel.com

Computer Brain Assisted

Now, what is your part in the creation and improvement of the developing AI? The use of virtual assistants, voice activation, automatic facial recognition, and completing the mundane task of filling out surveys are direct ways in contributing to the brain of the computer.

Accessing websites such as E-commerce and interacting with the chatbot, which most if not all are utilized nowadays, can swiftly aid you based on the information provided. Although, this isn’t foolproof as sometimes chatbots will churn out prerecorded responses.

A thing to note, and this isn’t new or shocking because, like after a few months of forceful fun hugging with a new cellmate it’s something we all are numb to by now; all your interactions either online or off, are being collected and fed through a deep learning model.

Does this violate your privacy…maybe but that’s another topic. The data gathered could then be utilized for metrics that could either be used to recommend, advise, or sell on the dark web. Side note: despite your information may be classified as private for company use, an insider/bad actor could obtain your data and put it up for sale. And before you ask, yes all sales are final.

joyful couple holding hands and running towards a city.
Let’s go embrace the end of the world. Twitter and OpenAI, here we come!
Photo by Samson Katt, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something that I may have missed? Script a comment below.

Cloud, Hackers, and a Wallet

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Cloudy with a chance of emptied accounts.
Photo by Nicolas Jaramillo, please support by following @pexel.com

In the great big world of IT (Information Technology) things in cybersecurity have always been but, even more now, getting more interesting with every new technology or model that pops up.

If you haven’t been living under a rock no less an underground bunker, chances are you have heard about the cloud and all the wonders it has to offer to make your life and even your business flow a little easier however, in the landscape having access to a monolith of services and your choice of pay models looms something in the midst.

Whatever pay model you choose, you may be offering the same choice for an unwanted guest. Don’t know what I mean, let me script it for you.

I could be reading script right now, but I have to fix this stupid car.
Photo by Malte Luk, please support by following @pexel.com

Cloud from Underground

For those who finally came out from underneath that rock or finally believe the air is breathable and things in America and around the world are getting better, I welcome you. Let me give you this quick overview of the cloud and all its glory, all hail Hydra- I mean the mighty cloud.

The cloud or better known as cloud computing is a massive network of distributed services. There are services for housing and examining big data, environments for building applications, and creating automation to execute certain tasks are some of the things you can do in a cloud.

The list of what you can do goes to no end and it’s still expanding. As far as providers go you have the big three and yes this will be biased so be prepared to not agree which you’re welcome to do. They are AWS (Amazon Web Services), Google Cloud, and Azure from Microsoft. What about IBM’s cloud, you ask? Simple, IBM and I don’t talk, AWS all the way baby.

Back on the point, the cloud offers serverless computing, this is the execution model where the CSP puts together machine resources on demand and is done on behalf of the customer.

So, in short, the term serverless doesn’t actually mean there aren’t any servers, serverless means that all of the backend infrastructure is handled by the vendor. For all of you who came out of a bunker, you can go back in now, things haven’t gotten any better.

Enjoying so far?

Check out this other script on cloud. Click here.

It’s just a DDoS, there’s nothing to worry about. It’s not like I need to keep my job or anything like that.
Photo by SHVETS production, please support by following @pexel.com

Denial of a Panic

So, why is this important? How does this information benefit you? Again, you’re offered a pay-as-you-use model for a lot of services. This means attackers have more options when it comes to performing an attack.

DoS (Denial of Service) or DDoS (Distributed Denial of Service) are events where someone is trying to access a website but can’t because the website’s servers are being overwhelmed by traffic from zombies (slave bots).

This is a somewhat normal event and SOC (Security operation center) teams are prepared, for the most part, to deal with them. However, with the addition of the cloud, things have become more complex.

The name of the new challenger is called DoW (Denial of Wallet). And before you ask, yes, I’ll tell you what’s in your wallet when this attack is done.

I don’t think this is what Z-Daddy meant by denial of wallet, it’s more like denial of money.
Photo by Andrea Piacquadio, please support by following @pexel.com

Wallets Racking Up Prices

As mentioned before a DoS/DDoS is not having access to a resource like a website because the server is being overwhelmed by traffic. DoW works similarly but the difference is you run out of money to request resources and services in the cloud.

An attacker can gain access to your account in a variety of flavors and once in, they can begin to rack up charges in your name or your business’s name. This is because to use or to have access to a cloud a credit card must be on file to charge.

Once the card on file reaches its limit and money can no longer be drawn for services, resources are stopped until the bill is paid. Here’s some small math for you, let’s say you were using a server and it cost $0.10 per minute to run that server but you have it scheduled to run between business hours, five days a week. $240.00 USD in a week isn’t a problem because you may have that amount on hand.

However, your account gets hacked and changes the server schedule to run every hour including the weekends changing that $240.00 to $1,008.00 USD in the first week. But not only that, other resources were added and set to run every hour including the weekends. Money runs out quickly in the cloud when you’re hacked and not paying attention. Just when you thought the sky was the limit.

Kim: Girl, you never use the root account. Ain’t you read Scriptingthewhy?
Sarah: What’s that?
Kim: Girl, here. go to the site and you’ll be hip to the games.
Photo by Andrea Piacquadio, please support by following @pexel.com

Accounting for the Root

At this junction, you’re probably sitting at your computer wondering how you can prevent from seeing another bill you either can’t or simply don’t want to pay sneaking its way into your email. Well, I have some good news, following best practices when setting up your or someone else’s cloud.

Always employ the use of setting up a general account, and do not for the love of Sam Smith’s Unholy, do not use the root account because if that account gets hacked, you can kiss your cloud goodbye.

For those who might not know why not to use the root account, it’s like using the admin account on your computer, if someone gains access to it, they can do whatever they want since it’s the highest level of privilege. And if you set up someone’s cloud and the only account is the root, well needless to say unemployment is in your future, that’s cloud 101 and you should know better.

Shaming aside, using multifactor authentication adds another layer of security for accounts and the most important action to take is setting up a budget with multiple avenues, like emails and text messages to reach you as this will alert you when you are approaching your undesired limit for your budget.

And checking in periodically with billing and usage along with checking logs could see you better off as this helps to keep you alert as well. It’s great to have your head in the cloud but fending off unwanted bills can help keep you grounded and employed.

Scriptingthewhy has helped me keep money in my wallet. Z-Daddy, you strike again.
Photo by Lukas, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Did you have a time where you may have encountered a DoS situation? Script about it below.

Paying with Options All Around

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I will not turn around until someone explains the cloud to me.
Photo by Felix Mittermeier, please support by following @pexel.com

Heading Onward

The cloud, for most people, is a mystery, for others, it’s a place for people to brag about where they house their data, and for the growing population of others, it’s a place where all the payment plans come from.

Since Cloud has stepped or more likely floated on the scene, depending on who you ask, there has been a slew of payment plans being offered that weren’t thought of before. And the people who benefit most from it aren’t big-name companies, they’re cybercriminals.

Payment plans in cloud computing are different methods that customers can pay for the services and resources they use from cloud providers.

There are different types of payment plans, such as pay-as-you-go, subscription, reserved instances, spot instances, and free tier. Each payment plan has its own advantages and disadvantages, depending on the customer’s needs and preferences.

Pay-as-you-go is the most flexible and common payment plan, where customers only pay for what they use, without any upfront or long-term commitment. A subscription is a payment plan where customers pay a fixed amount per month or year for a certain level of service or resource allocation.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

We’re cloud providers and you can pay-as-you-go, we promise.
Photo by Timur Weber, please support by following @pexel.com

Reserved instances are a payment plan where customers pay upfront for a specific number of resources for a certain period of time, usually at a discounted rate.

Spot instances are a payment plan where customers bid for unused resources at a variable price, which can be lower or higher than the regular price. The free tier is a payment plan where customers can use a limited number of resources for free, usually for a trial period or for testing purposes.

What’s that? These are all great things; they’re offering different ways for people to be able to make payments on their bills. We can you hear say, and we say to you; Remember this is the internet we’re talking about here. Nothing here stays pure.

However, with this same concept for payment options in the cloud comes similar payment options on hacking forums and other seedy places to trade data. A few of the payment plans (feel free to look them up as we’ll be sure that you’ll find them and more) are phishing-as-a-service, scam-as-service, malware-as-a-service, ransomware-as-a-service, and many more.

We’re not too sure how some of these services actually work, the idea could be similar to cloud payment plans, but the fact that they’re out there and growing in numbers seems promising for the cyber problems to come.

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on various as-a-service payment plans? Script a comment below.