Introduction to Machine Learning in 2019

Posted on So 18 November 2018 in Machine Learning • Tagged with introduction, machine learning, basic statistics

Gentle Introduction into machine learning in 2019


Continue reading

Tutorial: Youtube scraping with puppeteer

Posted on Mo 29 Oktober 2018 in Scraping • Tagged with Youtube, Video, Scraping

How to scrape youtube videos using puppeteer


Continue reading

Scraping Amazon Reviews using Headless Chrome Browser and Python3

Posted on Mi 03 Oktober 2018 in Scraping • Tagged with Amazon, Reviews, Scraping

Tutorial that teaches how scrape amazon reviews


Continue reading

GoogleScraper Tutorial - How to scrape 1000 keywords with Google

Posted on Mi 05 September 2018 in GoogleScraper • Tagged with tutorial, GoogleScraper, scraping

Tutorial that teaches how to use GoogleScraper to scrape 1000 keywords with 10 selenium browsers.


Continue reading

Hide related products on shop page in Woocommerce

Posted on Do 30 August 2018 in Wordpress, WooCommerce, functions.php, CSS, related-products • Tagged with Wordpress, WooCommerce, functions.php, CSS, hide-related-products, disable related products

Introduction

I found many instructions and guides in the Internet that describe How to hide related products tab on shop page to be NOT WORKING!

It's a freaking pain in the ass to hide your related products tab on your shop page. The method to actually hide related products depends on the WooCommerce theme that you are using. In this article, we are going to present a method that provably works for every theme and WooCommerce version out there.

How to disable related products - Step by step guide

Step 1 …


Continue reading

Cryptographic properties of MACs and HMACs

Posted on Mo 20 August 2018 in Security, Cryptography, MAC, HMAC • Tagged with Math, MAC, HMAC

Introduction

Similarly as digital signatures, Message Authentication Codes provide message integrity and message authentication. When Alice generates a MAC and sends the message and MAC to Bob, Bob verifies that the message has integrity by calculating the MAC himself. He also authenticates the message, because only Alice could have generated the MAC.

Unlike digital signatures they do however not provide nonrepudiation, since all involved parties share the secret key \(k\). MAC's can be implemented using cryptographically secure hash functions (HMAC) or symmetric block ciphers like AES.

A MAC consists of …


Continue reading