Search the Community

Showing results for tags 'algorithm'.

• Search By Tags

Type tags separated by commas.

Forums

• Talk
• Everything Else
• Gaming
• Questions
• Security
• Hacks & Mods
• Applications & Coding
• Hak5 Gear
• Hak5 Cloud C²
• New USB Rubber Ducky
• WiFi Pineapple
• Bash Bunny
• Key Croc
• Packet Squirrel
• Shark Jack
• Signal Owl
• LAN Turtle
• Screen Crab
• Plunder Bug
• WiFi Coconut
• O.MG Cable
• O.MG DemonSeed EDU
• Legacy Devices
• Classic USB Rubber Ducky
• WiFi Pineapple TETRA
• WiFi Pineapple NANO
• WiFi Pineapple Mark V
• WiFi Pineapple Mark IV
• Pineapple Modules
• WiFi Pineapples Mark I, II, III
• Hak5 Shows
• Community
• Forums and Wiki
• #Hak5
• Projects
• SDR - Software Defined Radio
• Community Projects
• Interceptor
• USB Hacks
• USB Multipass
• Pandora Timeshifting

Found 3 results

1. Coding Challenge: Compound fibonacci sequence?

I was kinda curious how other people would do this. So you take a regular Fibonacci sequence like this: 0 1 1 2 3 5 8 13 21 34 55 89 144 233 377 610 987 1597 2584 4181 6765 10946 17711 28657 46368 75025 121393 196418 317811 514229 832040 1346269 2178309 3524578 5702887 9227465 But I'm changing it up a bit so I get a different sequence like this one: 1, 2, 4, 7, 11, 20, 33, 54, etc The math looks something like this and I can do it on paper. 1+1+2+3+5+8+13+21+34+45+79 1+1+2+3+5+ 8+13+21+34+45 1+1+2+3+ 5+ 8+13+21+34 1+1+2+ 3+ 5+ 8+13+21 1+1+ 2+ 3+ 5+ 8+13 1+ 1+ 2+ 3+ 5+ 8 1+ 1+ 2+ 3+ 5 1+ 1+ 2+ 3 1+ 1+ 2 1+ 1 1 So in a regular fibonacci sequence it's something like this: #include<iostream> using namespace std; int main() { int fib1 = 0, fib2 = 1, fib3 = 1; cout << "The Fibonacci Series is : " << endl << fib1 << " " << fib2 << " "; while (fib1 + fib2 < 1000000) { fib3 = fib1 + fib2; fib1 = fib2; fib2 = fib3; cout << fib3 << " "; } cout << endl; return 0; } Not sure if the best way to to do this is write all of the possible fibonacci numbers to an array then loop through the array to add up the numbers for the sequence or if I should use the final fib values and count backward from the final two fib values just doing a backwards subtaction pattern. These are hypothetical questions. Question: Can you create a dynamic multi-dimensional array without knowing how many dimensions the array will have. I understand the part about creating a dynamic array where you can load in any number of variables. I suppose I could just load all of those values into an array then use nested for loops for each iteration. So int a =x; int b =x-1; int c= x-2; etc. Peronally I like array idea because it is easy but that's not the most optimal way to do it. I'm sure someone a little more savvy could make this happen using less memory and faster. Using Fibonacci's sequence to describe timeline forks. So say you have computer virus that spread from one machine to the next in a given amount of time. The first machine will continue to also infect machine until there are no more machines to infect. But that's not the only application for this.
2. Which encryption is best?

I've been reading up on encryption a bit. I'm probably still not on the level to have an educated conversation on the subject. But I wanted to ask a question about encryption programs. What is the a recommended program for encrypting a file or folder for secure storage? It's been mentioned that truecrypt is no longer secure. People are recommending using veracrypt? There's another program I've seen called zulucrypt but that also looks a lot like truecrypt? In your opinion what is the best encryption program? Why? Also was curious about which block ciphers are the hardest to crack? Have you cracked a truecrypt file? How long did it take? What cracker did you use?
3. Machine Learning : Naive Bayes Rule for Malware Classification

This article provides a step by step approach from ground up to devising your own malware classifier using machine learning fundamentals. Naive Bayes Rule, statistics and ranking algos. This is more like AV - Heuristics and other methods that dont have to depend exclusively on signatures, which are little more than file specific fingerprints based on byte pattern hashes or format anomalies that are boiled down to a detection checklist. However, this is still not a 100 percent perfected method though enougl calibration will certainly provide a workable and reliable enough engine. This discussion should encourage you to build your own variations and share their results Link 1 : http://resources.infosecinstitute.com/machine-learning-naive-bayes-rule-for-malware-detection-and-classification/ Link 2 : http://resources.infosecinstitute.com/naive-bayes-rule-building-your-own-malware-classifier-ii/ Link 3 : http://resources.infosecinstitute.com/machine-learning-part-3-ranking/
×
×
• Create New...