Articles

Twinning: A Simple Jailbreak That Bypasses AI Image Protections

Twinning: A Simple Jailbreak That Bypasses AI Image Protections

By asking an AI image generator to create a "twin sibling who looks identical" to a protected public figure, you can bypass celebrity protections entirely. I'm calling this attack "Twinning." Even worse, it can be chained with Crescendo attacks to progressively generate more extreme content, ending in exactly the kind...

What I Learned Taking CS6601: Artificial Intelligence

What I Learned Taking CS6601: Artificial Intelligence

I expected my earlier OMSCS classes to prepare me for CS6601, but I quickly realized they hadn't. Artificial Intelligence has a reputation as one of the toughest classes in the program, and that's true. You can't just fit it in after work and expect to keep up. I was surprised...

When BGP Goes Rogue: Dissecting Verizon's September 30th Outage

When BGP Goes Rogue: Dissecting Verizon's September 30th Outage

On Monday, September 30, 2024, Verizon Wireless customers spent most of the day staring at "SOS-only" on their phones. Downdetector logged somewhere between 66,000 and 1.5 million user reports. Estimates vary widely, but it is clear this was not a minor hiccup. While Verizon's official statement blamed a vague "network...

OMSCS Course Review: CS 6200 Graduate Introduction to Operating Systems

OMSCS Course Review: CS 6200 Graduate Introduction to Operating Systems

I took an operating systems class in college and remembered the basics like processes, threads, virtual memory, and scheduling. CS 6200 went over these topics again, but in much more detail. After years of working with real systems, the material meant more to me this time. This course isn't an...

OMSCS Course Review: CS 6250 Computer Networks

OMSCS Course Review: CS 6250 Computer Networks

When I signed up for CS 6250, I thought I knew networking. Years of configuring routers and troubleshooting connectivity issues in my home lab and for cloud customers have given me confidence. What I didn't expect was to discover how much of the internet runs on what amounts to a...

Why I Chose Georgia Tech's OMSCS Program

Why I Chose Georgia Tech's OMSCS Program

In the tech industry, continuous learning isn't just optional; it's essential. After several years in the industry, I found myself at a familiar crossroads: how do I advance my knowledge and credentials while maintaining my career momentum? The answer came in the form of Georgia Tech's Online Master of Science...

My First OMSCS Course: Human-Computer Interaction (CS 6750)

My First OMSCS Course: Human-Computer Interaction (CS 6750)

When I started Georgia Tech's OMSCS program, I knew I wanted to ease back into school before diving into the more programming-heavy courses. Human-Computer Interaction seemed like the perfect choice. It was a way to get my feet wet with the rhythm of grad school without immediately drowning in code....

New Beginnings: From Classrooms to Cloud Computing

New Beginnings: From Classrooms to Cloud Computing

Summer is almost over, pumpkin-spiced lattes are already sneaking in, and children are strapping on their backpacks as they head back to school. My household is no exception to the back-to-school buzz. As my kids gear up for another academic year, so do I, albeit in a slightly different arena....

An Open Letter to the Ohio Legislature on the EdChoice Expansion

An Open Letter to the Ohio Legislature on the EdChoice Expansion

Dear Senator Coley and Representative Lang, I'm writing today out of extreme concern with the recently updated list of public schools eligible for EdChoice scholarships. Although I live in a district now eligible for EdChoice scholarships and send my children to a private school, I do not support the EdChoice...

Smart Home, Insecure Home

Smart Home, Insecure Home

At 7:00am EST on October 21, 2016 internet users began having connectivity problems to a large number of major internet properties including Netflix, Twitter, Spotify, Amazon.com, as a key internet service provider was hit by a distributed denial of service attack facilitated by the Mirari botnet. The attack was unusual...

Scroll for more articles...