Month: May 2013
Lego Mindstorms NXT 2.0 – First contact
Couple of days ago to our company arrived LEGO Mindstors NXT 2.0 robot. Today I decided to bring it home for the first contact. It was quite successfull, I built starter robot that is avoiding obsticles and speaking. For about 2-3 hours of play, I think it is good enought….
Introduction to Social engineering
Social engineering is one of the main security issues these days. Most of companies invest to infrastructure to be hardly hackable, but they don’t educate people. Social engineering is quite common attack since the begining of 1980′. And many big corporate networks were infiltrated using these attacks. And the only…
Gmail social engineering attack
This morning I recieved email that was signed as Gmail Team and that was saying: Re: Due to recent upgrade in our database, we are terminating all unverified accounts permanently. Reply and give the information below:Username,Password,Date of Birth,Phone&Country. Note! You have one week to comply. Gmail Inc. All rights reserved….
Approaches to artificial intelligence
This is my next article on artificial intelligence. First one was called just Artificial intelligence pt1, but now I am going to talk about different approaches to AI, so it changed name. Currently there is many approaches that drives AI research. There is no established paradigm of AI research, and…
Artificial intelligence pt. 1
Yesterday we created Artificial intelligence section in company I am working (Prelovac media), so it would be great reason to write about AI. I realized that many people are not aware what is current state, where we are heading and what are applications of artificial intelligence at the moment. So…