Posted in InfoSec Software Work

Introduction to reverse engineering

1. Introduction Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. This involves taking some device, system or software and breaking it apart, analyze it and conclude how it works. When reverse engineer conclude how…

OWASP Seraphimdroid
Posted in Artificial intelligence InfoSec Software

New version of OWASP Seraphimdroid (v2.0) is published

Dear users and security aware people, we have a great announcement. The new version of OWASP Seraphimdroid is published with some very interesting breakthrough features. If you liked OWASP Seraphimdroid before, now you will probably love it. We have improved machine learning aided permission scanner, new settings scanner, improved SMS…

Posted in Artificial intelligence Natural language processing and text mining Tales from life

Expirience from Lisbon Machine Learning Summer School

I have participated on Lisbon Machine Learning Summer School (LxMLS), which took place on July 16-23  at Instituto Superior Técnico, a leading Engineering and Science school in Portugal. It is organized jointly by IST, the Instituto de Telecomunicações and the Spoken Language Systems Lab – L2F of INESC-ID. It was quite…

Posted in Artificial intelligence Natural language processing and text mining Science Work

Marvin – semantic annotator

We created Marvin, an semantic text annotation tool that uses external resources such as DBPedia and WordNet to annotate semantically text. Marvin is built in java and can be used as a standalone application or as a library. Marvin semantic annotator already has a lot of knowledge, which will make…

Posted in InfoSec

The art of cyber war

This is the post about a lecture. Very interesting one, held on New York information security meetup by Carl Herberger, Vice President of Security Solutions at Radware. I found this talk quite interesing because he pointed out that in industry we are facing something we can call a war by its…

Posted in InfoSec

Chasing script-kiddies and hackers on my blog

This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers or script-kiddies) trying to hack me. Well, to be hones guess my user name and password. So far, they were failing, but some of them were returning and trying every couple of hours,…

Posted in InfoSec Software

USSD Code List for Android Smartphone

Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the service provider’s computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network. USSD messages…

Posted in Hobbies InfoSec Leadership and management Software Tales from life Work

Hacker’s lament

But did you, in your three-piece psychology and 1950’s technobrain ever take a look behind the eyes of the Hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a Hacker, enter my world…. Mine is a world that begins…

Posted in Hobbies Software

GreatUniHack – impressions from hackathon

This weekend (17th-19th April 2015.) I was participating GreatUniHack, so I would like to share here some impressions and experiences. GreatUniHack is a 36 hour hackathon organised by University of Manchester students and supported by Major League Hacking – an planetary organisation that supports hackathons around the World. It was…

Posted in Artificial intelligence Work

Worries about Artificial Intelligence

Recently big names in science and technology Stephen Hawking and Eon Musk showed publicly their concerns about artificial intelligence. Musk even donated $10 million in order to keep artificial intelligence friendly. However, Forbes stated “Gates and Musk both have an interest in ensuring that artificial intelligence not only stays friendly,…

Posted in Tales from life

Blindfolded nation

Recently a friend of mine pointed me to one interesting Pakistani video. To be honest, I don’t get a word what the video is about, since it is on Pakistani language, but you can kinda get the message from the fact that all the adults in the video are blindfolded….

Posted in Hobbies Leadership and management Tales from life

I vote for Charlie Chaplin

Definitely, if there is a politician who would think and drive as Charlie Chaplin did in the Great Dictator, I would vote for him/her. This speech outlines the value humanity or a community  should strive to. This is quite funny comedy of Hitler at that time, but the speech is…