Geek Food
Description
All things technology, with a focus on hardware and software engineering.
Brief DescriptionGeek Food - Technology and Engineering
No microblogs were found.
No results found.
- https://prompts.chat/ - If you're looking for great AI prompts, or want to learn how to create good prompts, there is an open source database of prompts for just about any situation.
- github.com - There's a list on GitHub of computers science courses with video lectures from the top universities.
- morningoverview.com - Another safety threat of AI is the ability to hijack AI browsers with a simple hashtag. It's called "HashJacking" where the hashtag is used to conceal a code fragment that only the AI reads and processes. The hacker doesn't need to compromise the...
- github.com - It's important to know how AI models and agents are programmed so you know how and why they answer you the way they do. When do they lie? What ethical and political boundaries are set? This github repository has the leaked system prompts for all of...
- If you want to jailbreak out of the AI's guardrails, you just put your malicious prompt in the form of poetry.
- A new change in MySQL v9.0 to authentication is going to cause a lot of headaches for system administrators.
- Much of the email spam and hack attacks I see against my servers can be blocked up-front by using these techniques.
- I just discovered a computer shop I really like: North Alabama Computer Associates just south of Drake on Memorial Pkwy (in Applebee's parking lot strip mall).
- Gary Wright II bookmarked AI Prompts Open Source DatabaseIf you're looking for great AI prompts, or want to learn how to create good prompts, there is an open source database of prompts for just about any situation.
- There's a list on GitHub of computers science courses with video lectures from the top universities.
- Gary Wright II bookmarked Hack AI Browsers With A HashtagAnother safety threat of AI is the ability to hijack AI browsers with a simple hashtag. It's called "HashJacking" where the hashtag is used to conceal a code fragment that only the AI reads and processes. The hacker doesn't need to compromise the...
- Gary Wright II published a blog post To Hack AI Just Use PoetryIf you want to jailbreak out of the AI's guardrails, you just put your malicious prompt in the form of poetry.
- Gary Wright II bookmarked AI System PromptsIt's important to know how AI models and agents are programmed so you know how and why they answer you the way they do. When do they lie? What ethical and political boundaries are set? This github repository has the leaked system prompts for all of...
- Gary Wright II bookmarked Harvard's CS50Harvard University Computer Science online courses. Audit the courses for free, or earn a certificate through EdX.
- Gary Wright II bookmarked MIT OpenCourseWareOnline lectures and courses from MIT on various subjects including computer science.
- Gary Wright II published a blog post New MySQL Authentication Change Will Break Things!A new change in MySQL v9.0 to authentication is going to cause a lot of headaches for system administrators.
- Gary Wright II bookmarked Python Intermediate CoursePython Intermediate Course by FreeCodeCamp (6 hours)
