Requirements
MikTek (https://miktex.org/download)
Strawberry Perl (https://strawberryperl.com/)
Vscode Extension :image
image
Install any type of pdf reader , ex: vscode-pdf
MikTex
Install MikTex
I. Install for all user.
Liuming9124 changed 7 months agoView mode Like Bookmark
Architecture
User Story :
From Client connect to Target by using ssh tunnel through Public Server
image
Prepare
Target-Windows需要 Windows 專業版
開啟遠端桌面 (https://support.microsoft.com/zh-tw/windows/%E5%A6%82%E4%BD%95%E4%BD%BF%E7%94%A8%E9%81%A0%E7%AB%AF%E6%A1%8C%E9%9D%A2-5fe128d5-8fb1-7a23-3b8a-41e636865e8c)
Allow Firewall: Remember to do this
Click Red -> Blue
Liuming9124 changed 9 months agoView mode Like Bookmark
Disable netdata
service netdata stop
TrueNAS SCALE 24.04 指令apt不可用問題
sudo install-dev-tools
Truenas Scale 24.04.1.1 Use apt & Access Dev mode
In DragonFish you can enable apt / toggle "developer" mode by running the command "install-dev-tools" or /usr/local/libexec/disable-rootfs-protection.
Docker
Liuming9124 changed a year agoView mode Like Bookmark
Conversation & Memory
ConversationBufferMemory
可以記錄所有對話並傳遞至下一次對話中
ConversationSummaryMemory
會將對話紀錄總結後傳遞至下一次對話中
ConversationBufferWindowMemory
可以將指定次數的最新對話傳遞至下一次對話中
# We set a low k=2, to only keep the last 2 interactions in memory window_memory = ConversationBufferWindowMemory(k=2)
Liuming9124 changed 2 years agoView mode Like Bookmark
文章來源: https://www.promptingguide.ai/
Zero-shot Prompting
現今的LLM已受過許多訓練了,因此可以透過單次的Prompt來完成目的
Prompt:
Classify the text into neutral, negative or positive.
Text: I think the vacation is okay.
Sentiment:
Result
Neutral
Liuming9124 changed 2 years agoView mode Like 1 Bookmark
Introduction to Information Security and FIDO2
Definition of Information Security and its Importance
Chapter 1: Introduction to Information Security and FIDO2
Paragraph 1: Definition of Information Security and its Importance
Information security is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. The importance of information security is increasing rapidly due to the exponential growth of information and communication technologies, coupled with the growing sophistication of cyber threats and attacks. The impact of security breaches and data theft on individuals, organizations, and societies can be devastating, leading to financial losses, reputational damage, legal liabilities, and even physical harm. Therefore, it is essential to deploy robust and effective security measures that can safeguard the confidentiality, integrity, and availability of sensitive information. This book focuses on one such measure, Fast IDentity Online 2 (FIDO2), which is a cutting-edge authentication technology that promises to revolutionize the way we manage online identities and access digital services.
Overview of FIDO2 and its Significance in Information Security
Paragraph 2: Overview of FIDO2 and its Significance in Information Security
Liuming9124 changed 2 years agoView mode Like Bookmark
Understanding the Principles of NodeJS
Introduction to NodeJS and its advantages
Chapter 1: Understanding the Principles of NodeJS
Paragraph 1: Introduction to NodeJS and its Advantages
NodeJS is an open-source server-side JavaScript runtime environment, which is designed to provide a faster and scalable way to build network applications. It has gained popularity over the years because of its unique features such as high performance, event-driven architecture, and asynchronous I/O operations. This chapter aims to go into detail about the fundamental principles of NodeJS, the event-driven model, and best practices when developing with NodeJS.
Furthermore, developers can use NodeJS to build a wide range of applications as it is not restricted to building HTTP servers only. For instance, it can be used to develop tools for automating repetitive tasks, building real-time chat applications, and desktop applications.
Liuming9124 changed 2 years agoView mode Like Bookmark