recentpopularlog in


« earlier   
Dumping Domain Password Hashes
There are various techniques that can be used to extract this file or the information that is stored inside it however the majority of them are using one of these methods:

Domain Controller Replication Services
Native Windows Binaries
hash  activedirectory  pentest 
3 days ago by whip_lash
Controlled experiments on the web: survey and practical guide
The web provides an unprecedented opportunity to evaluate ideas quickly using controlled experiments, also called randomized experiments, A/B tests (and their generalizations), split tests, Control/Treatment tests, MultiVariable Tests (MVT) and parallel flights. Controlled experiments embody the best scientific design for establishing a causal relationship between changes and their influence on user-observable behavior. We provide a practical guide to conducting online experiments, where endusers can help guide the development of features. Our experience indicates that significant learning and return-on-investment (ROI) are seen when development teams listen to their customers, not to the Highest Paid Person’s Opinion (HiPPO). We provide several examples of controlled experiments with surprising results. We review the important ingredients of running controlled experiments, and discuss their limitations (both technical and organizational). We focus on several areas that are critical to experimentation, including statistical power, sample size, and techniques for variance reduction. We describe common architectures for experimentation systems and analyze their advantages and disadvantages. We evaluate randomization and hashing techniques, which we show are not as simple in practice as is often assumed. Controlled experiments typically generate large amounts of data, which can be analyzed using data mining techniques to gain deeper understanding of the factors influencing the outcome of interest, leading to new hypotheses and creating a virtuous cycle of improvements. Organizations that embrace controlled experiments with clear evaluation criteria can evolve their systems with automated optimizations and real-time analyses. Based on our extensive practical experience with multiple systems and organizations, we share key lessons that will help practitioners in running trustworthy controlled experiments
ab-testing  hash  md5 
3 days ago by foodbaby
[1409.3174] Designing and Deploying Online Field Experiments
Online experiments are widely used to compare specific design alternatives, but they can also be used to produce generalizable knowledge and inform strategic decision making. Doing so often requires sophisticated experimental designs, iterative refinement, and careful logging and analysis. Few tools exist that support these needs. We thus introduce a language for online field experiments called PlanOut. PlanOut separates experimental design from application code, allowing the experimenter to concisely describe experimental designs, whether common "A/B tests" and factorial designs, or more complex designs involving conditional logic or multiple experimental units. These latter designs are often useful for understanding causal mechanisms involved in user behaviors. We demonstrate how experiments from the literature can be implemented in PlanOut, and describe two large field experiments conducted on Facebook with PlanOut. For common scenarios in which experiments are run iteratively and in parallel, we introduce a namespaced management system that encourages sound experimental practice.
ab-testing  facebook  hash 
3 days ago by foodbaby
Contribute to LinusU/rev-hash-cli development by creating an account on GitHub.
node.js  node  npm  javascript  hash  md5  bash  cli  linusu  rev-hash-cli 
4 days ago by moalex
arriqaaq/xring: An implementation of Consistent Hashing with Bounded Loads (using Red-Black tree)
An implementation of Consistent Hashing with Bounded Loads (using Red-Black tree) - arriqaaq/xring
golang  hash 
14 days ago by geetarista
An Intensive Introduction to Cryptography
These are lecture notes for lecture notes for an introductory but fast-paced undergraduate/beginning graduate course on cryptography. I am using these notes for Harvard CS 127.
cryptography  PRNG  PRF  Hash  functions  lattice  ZKP  Homomorphic  MPC  Quantum 
16 days ago by FredericJacobs

Copy this bookmark:

to read