In this tutorial, I will share my experience installing the web-based user interface for Stable […]
Author: Radovan Brezula
Running Large Language Models on CPU
Large language models (LLM) can be run on CPU. However, the performance of the model […]
Running Alpaca AI on Low Cost PC with DALAI
This tutorial will guide you through the process of running LLaMA and Alpaca models on […]
Stable Diffusion Installation on Linux
Stable Diffusion is a text-to-image latent diffusion model created by the researchers and engineers from […]
MAC Flooding Attack
Unlike a hub, a switch is a network device that typically does not forward a […]
OpenVPN Windows Client with MikroTik
In a previous tutorial, we discussed the configuration of an OpenVPN Server on a Mikrotik […]
ARP Spoofing Attack with Scapy
When an IP packet is sent from one host to another in a local area […]
DoS Attack Using Spanning Tree Protocol
The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology […]
Capturing Decrypted TLS Traffic with Arkime
In a previous post, we have discussed how to decrypt TLS traffic using a transparent […]
Debian 11 After Install Guide
I find Debian as one of the best Linux distros available. End users should generally […]