Hi everyone, my name is P Swyom Sanjog. Welcome back to my blog—I hope you’re all doing well. Today, I’m bringing a new topic: Virtual DOM. Let’s understand what the Virtual DOM is in simple terms. We’ll cover key questions like what it is, why it’s used, and how it works. So, let’s get started! Virtual Dom So, let’s break down the topic into “Virtual” and “DOM.” Virtual means something that exi
Your phone will connect to the strongest tower it hears. It does not ask for ID first. It assumes trust, and that assumption is the entire problem. I first noticed this in 2019 outside a security conference in Las Vegas. My test Android dropped from LTE to 2G for 47 seconds, then returned to normal. No user notification. The baseband logs showed a cipher downgrade to A5/0, a location area code tha
Hello everyone! We are two 13-year-old students from Russia, and we want to show QwenSeek-2B! For us, this is a big result! We released the model on Hugging Face, and the 1000+ downloads! We are just incredibly Training Details: https://huggingface.co/datasets/Jackrong/DeepSeek-V4-Distill-8000x We will continue to release new models, even cooler! And maybe in the near scratch! But for now, we are
I Trained My Own LLM from Scratch in 2025: What That Viral HN Tutorial Doesn't Tell You About the Real Cost I was scrolling HN on a Tuesday night when I saw the post: "Train Your Own LLM from Scratch", 241 points, 87 comments, and an energy in the thread I recognized immediately — the same one from "I built my own email server" or "I replaced Docker with bash scripts" threads. A mix of genuine t
This technical post walks through the design and implementation of Secure Playground: a local web app that simulates prompt-injection attacks against large language models and demonstrates simple defenses. Provide a minimal, reproducible environment to test payloads and defensive strategies. Make it easy to add new providers and run mutation-based red-team experiments. Offer a leaderboard and scor
Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor 1. Objective To identify and exploit a known vulnerability in an FTP service running on a vulnerable target machine using industry-standard reconnaissance and exploitation techniques. 2. Lab Environment Component Description Attacker Machine Kali Linux Target Machine Metasploitable2 Network Type Host-only / NAT
Hi everyone! I've been working on a personal project to create a desktop virtual assistant that doesn't rely on the cloud. I wanted something that felt like JARVIS but kept my data 100% private. Brain: It uses Ollama as the backend, so you can run models like Llama 3, Mistral, or Phi-3 locally. Interface: Built with PyQt6 featuring a "holographic" glassmorphism effect (transparent and sleek).
This is Part 1 of a two-part series. Part 2 (coming soon): Connecting to spoke clusters from a controller using multicluster-runtime, driven by ClusterProfile. The Cluster Inventory API (multicluster.x-k8s.io) is driven by SIG-Multicluster and centered on the ClusterProfile resource. It only delivers value when something produces those ClusterProfiles. That something is a cluster manager. Today, t