logo

Machine Learning Introduction

I completed Andrew Ng’s Machine Learning Specialization course. And somehow, I’m still confused… Course 1: I’ve learned supervised machine learning, including regression and classification. Course 2: I’ve learned some advanced learning algorithms, like neural network and decision trees. Course 3: I’ve learned unsupervised machine learning, recommender systems, and reinforcement learning. But hey, I understood each concept (at some level), but my understanding is not holistic. I still have no idea how to use machine learning as a tool.
4 minutes to read

PAW vs UAW

Recently, I finished reading a book called ‘The Millionaire Next Door’. Most of the content is talking about common sense, like how to live a frugal life, which most people have already done. It actually brings out an interesting formula about how to categorize your financial status. Expected Net Worth = (Age x Annual Income) / 10 If your actual net worth is double than the expected number, then you are a ‘PAW (Prodigious accumulator of wealth)’.
3 minutes to read

What is Good Code

Before saying someone’s code is sh*t code, you should know what is good code. Apart from those that are not readable, in general, the good code should run fast and take up less memory space. Everyone can say their code is good, but how do you prove it? Simply monitoring runtime and memory space may not be accurate due to various factors-the data matters, and hardware also matters. A more scientific way to do so is to look at the “trend”-if the number of items grows, how would the time and space grow?
3 minutes to read

Why Decision Tree > if-else

The other day, our tech lead suggested we implement supervised machine learning to automate our ticket approval system. He said it would be very easy. I had no idea how it worked-and honestly, I was confused. Why not just use if-else statements? Problem Statement We have a ticket approval system, a platform for reviewing tickets that request access to some resource. With an increasing number of tickets being submitted, manually reviewing them has become inefficient.
4 minutes to read

Are you from the Same Origin

Recently, when I debugged a web app, I had to add my own test domain to a CORS allowed list there. Then I remembered having seen a CORS vulnerability report before and decided to delve deeper into this topic. Create a Simple Web App with CORS Misconfiguration Essentially, we require a web application with a straightforward login feature and a data endpoint. With misconfigured CORS, we should be able to see the sensitive data from another origin.
3 minutes to read

Career Change: From Cybersecurity to Software Development

As a young professional in cybersecurity, do you often feel so dumb that you can’t understand some concepts? Maybe my experience can help. My Background I studied Information Security in college. We had the usual foundational CS and math courses, along with cryptography. Back then, the security field seemed straightforward—either you were an attacker or a defender—even though I had no idea how either actually worked. Later, I interned at two companies, where I learned about web pentesting and Active Directory security.
3 minutes to read

First Duplicate Report

So, I almost submit my first valid bug report… What Happened The other night, I finally decided to give bug bounty a try. I found a VDP program and let ChatGPT write me a recon script. That recon script returned with several subdomains, and when I went through them, a weird domain caught my eye. What the hell is ‘whoami.xx.xx.com’? Out of curiosity, I opened that in my browser. Holy cow, it looks like a debugging page with an internal IP!
3 minutes to read