Skip to content

Pagan Coder

  • Coding
  • Thoughts
  • Artificial Intelligence
  • Python & C
  • Nature & science
  • History & stories
  • The Forest of Crooked Logs
  • Philosophy
  • About me
Search

Category: Cyber security

What I do? 🙂 Coding Cyber security

What I do? 🙂

17. 3. 2025Přemysl Lúa Černý

I am developing a system for the real-time detection of cyberattacks. From a programming perspective, this involves highly interesting data processing in real time. Incoming events, such as user logins…Continue readingWhat I do? 🙂

How to Deal with Cyberpoachers Artificial Intelligence Coding Cyber security Memory Thoughts

How to Deal with Cyberpoachers

15. 2. 2024Přemysl Lúa Černý

Dear friends, I have good news for you. From today on, you can download my little e-book called How to Deal with Cyberpoachers. It is available on my second page…Continue readingHow to Deal with Cyberpoachers

Combining asynchronous with parallel: Boosting both I/O bound and CPU bound tasks Algorithms Coding Cyber security Python & C Web server

Combining asynchronous with parallel: Boosting both I/O bound and CPU bound tasks

23. 6. 202223. 6. 2022Přemysl Lúa Černý

From the performance perspective, there can be two types of issues or bottlenecks. One of them occurs when there are too many inputs or outputs requested from the application, the…Continue readingCombining asynchronous with parallel: Boosting both I/O bound and CPU bound tasks

How to store cyber security data using MMAP in C Algorithms Coding Cyber security Memory Python & C

How to store cyber security data using MMAP in C

8. 6. 2022Přemysl Lúa Černý

In the previous article, I described the importance of having fast access to a memory that is also being automatically persisted to the file system to use more space than…Continue readingHow to store cyber security data using MMAP in C

Serializing structures and graphs with LevelDB Coding Cyber security Databases Memory Python & C

Serializing structures and graphs with LevelDB

1. 6. 20221. 6. 2022Přemysl Lúa Černý

In cyber security, especially when detecting threats such as port scan, there are many algorithms that require quick serialization of relationships among objects. Imagine a graph, where each node represents…Continue readingSerializing structures and graphs with LevelDB

Read and write operations for memory-heavy cyber security data using MMAP Algorithms Coding Cyber security Memory Python & C

Read and write operations for memory-heavy cyber security data using MMAP

31. 5. 20222. 6. 2022Přemysl Lúa Černý

I really enjoy living in the woodland area. You can walk for hours without meeting anyone, which helps to clear up your mind of the constant thinking and pictures it…Continue readingRead and write operations for memory-heavy cyber security data using MMAP

Copyright © 2022-2025 Pagan Coder (PÅ™emysl Lúa ÄŒerný). All rights reserved.
Scroll Up

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

Pagan Coder
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.