Skip to main content
All Posts By

Luis Alvarez

The AI that will change the way we interact with technology: ChatGPT and BARD

Artificial Intelligence

ChatGPT and BARD: The Leaders in Language Models

Artificial Intelligence

These language models developed by OpenAI are one of the most exciting innovations in the field of artificial intelligence. Using machine learning technology and natural language processing techniques, ChatGPT and BARD are capable of answering questions and generating text with surprising coherence and naturalness.

In simple terms, ChatGPT and BARD learn from large amounts of existing text on the internet and in books to understand how human language works. Based on this knowledge, they are capable of answering questions and generating text with great accuracy and naturalness.

These language models have a wide range of applications, from customer service to automatic summarization and news generation. In the future, we are likely to see a greater adoption of ChatGPT and BARD in industries such as banking, health and education, which will change the way we interact with technology.

In conclusion, ChatGPT and BARD are a demonstration of the potential of artificial intelligence to transform the way we live and work. With their ability to answer questions and generate text with naturalness, these language models represent an exciting future for technology and artificial intelligence

Experience the technological revolution today!

Contact us, we know how to help you

Contact us

100% optical network, high availability, savings and flexibility

The Laserway solution is based on the GPON technology that provides converged IP connectivity to different structured cabling environments. Combines a modern totally passive optical network with highly compatible equipment, prioritizing an easy installation, modularity and infrastructure reduction. To adapt to the most varied network scenarios in new and already existing environments, the solution can be installed in the options of field termination or pre-terminated optical cables.

BENEFITS

 

Simplified Infrastructure: with the reduction of technical rooms, cable trays and ducts, due to the fact that each fiber distributes information from various users to each optical OLT port.

Reduced Power Consumption: due to the reduced number of technical rooms necessary for the local network, also reduces the need for cooling and power equipments of the rooms. In addition to this factor,  Laserway solution equipment have low power consumption as they transmit data through an optical, not electrical medium.

Better Bandwidth Control: as in the Laserway solution, the OLT and ONT equipment are located only in the terminations of the optical network, the bandwidth control used in each of the ONTs becomes facilitated. This characteristic of having the centralizing equipment of the traffic switching in one central point of the network eliminates bottlenecks and fits perfectly with the traffic profile of the current local networks.

Future-Proof Network: the Laserway solution distribution network, consists  of optical fiber, splitters and optical accessories, has a transmission capacity in Terabps (Terabits per second). It is known that the active equipment, with the evolution of technologies and user demand, has significantly increased its data transmission rates. The optical infrastructure for  solution implemented today is ready to support such rates.

Network for Green Buildings: many of the characteristics of the Laserway solution are essential to serve the programs that encourage the use of efficient resources, because they contribute to the reduction of power consumption, cooling systems and quantity of petroleum derived material used for cabling, in addition to providing a longer lifespan  than that of a traditional cabling solution.

Investment Savings: brings significant reductions in investments with materials (CAPEX) and costs related to operation and maintenance (OPEX), thus providing continuous savings during the years of use of the network.

Read more

Securely harness the power of the cloud with Azure Advanced Threat Protection

Get real-time security at enterprise scale

Use the power and scale of the cloud to help safeguard against threats that are increasing in frequency, severity and sophistication.

Detect threats quickly

Azure Advanced Threat Protection monitors behaviour of users, devices and
resources, and detects anomalies straight away.

Stay focused on what’s important

Get a clear, efficient and convenient feed that surfaces the right issues on a simple attack timeline.

Why trust Microsoft with your security?

Microsoft invests more than USD $1 billion annually on cybersecurity research
and development
Microsoft employs more than 3,500 security experts completely dedicated to data security and privacy
Azure has more compliance certifications than any other cloud provider

Ransomware: the path of a kidnapping

There is no denying that the ransomware threat has surged dramatically into an epidemic that has plagued not just endpoint users but also public and private organizations. The malware type is made very effective because it exploits and cashes in on the fear of its would-be victims.

From the simple loss of access to files found in a user’s system to a smeared reputation due to empty threats, ransomware infections heavily rely on an array of scare tactics to coerce its victims to pay up. But much of what makes ransomware so effective is the fact that victims usually don’t know they’ve been infected until they see the ransom note popping up on screen—and it’s too late by then, as the malware has already done its damage.

What makes ransomware so effective?

Much of the coverage on ransomware either focuses on how it arrives in a system and the damaging repercussions that comes after. But what happens in between? Here’s what happens in the background, before victims see the ransom note.

Arrival

The moment an unknowing victim clicks on a harmful link or downloads an infected file opens the gates for the malware’s arrival onto a system. It drops a copy of itself, usually in the form of an executable file, into a user directory. In Windows, the malware usually drops the files either in the %appdata% or the %temp% folder. These folders are usually used because operating systems allow normal users to write to these directories without administrator privileges. The ransomware then starts to run stealthily in the background.

Contact

As soon as the malware has established itself onto the system, it connects to the network and begins to communicate to its server. At this stage, the ransomware sends and receives configurations to and from its command and control (C&C) server. In the case of the recently-discovered Pogotear ransomware (detected by Trend Micro as RANSOM_POGOTEAR.A) based on the Pokemon GO app, the malware connects to a particular website to send and receive information.

Search

It then goes through the infected system’s directories, searching for specific file types to encrypt. The file types to be encrypted depend on the ransomware family—from identifying folders to target and exempt, down to the file types and extensions.

For ransomware families that delete mirror files and backups, this is also done during this stage, prior to the encryption process.

Encryption

Before it starts encrypting files, the cryptographic keys that the ransomware uses for encryption are generated.

Encrypting the files of the infected system varies on the type of encryption method a particular ransomware family uses—either AES, RSA, or the combination of the two, among others. The length of time it takes to encrypt files may differ depending on the number of files, the affected system’s processing power, and encryption method used.

Several ransomware variants are capable of creating auto-start entries that continue the encryption routine in cases the when encryption process is halted by a system shutdown.

Ransom

The display of the ransom note will signify the success of the file-encrypting process of most ransomware variants. This could either happen instantaneously after the encryption process is complete, or after a system reboot, for ransomware types that modify the boot sector. Interestingly, some ransomware types do not even show a ransom note at all—at least not automatically. Some would drop its ransom notes into the affected folders, or resort display an HTML page with its ransom demand and payment instructions. Lockscreen ransomware would render the machines inaccessible, displaying a ransom note that can’t be closed.
The Signs:

In an incident at the Colorado allergy clinic reported in July, employees reported difficulty accessing computer files and documents. This led the organization’s IT department to shut down servers in fear of a virus attack on its network. Later on, evidence of an interrupted ransomware infection—including a ransom note draft left in the system—were uncovered by the health clinic’s IT team and the third party cybersecurity partner commissioned to analyze the incident. Unfortunately, not all cases of ransomware infections have been thwarted as easily.

Ransomware behavior varies per family or variant, but there are telltale signs that could alert a vigilant user or an IT admin to a ransomware infection. For instance, during the encryption process, a would-be victim could experience system slowdown due to the extra processes running in the background. A hard drive light that’s constantly flickering—without any legitimate process running—means that the hard drive is being accessed. Unfortunately, this could mean that the search and encryption process has begun.

Close Menu

Our telephones

[+54] 911 2611 8466
[+55] 11 4230 9510
[+57] 1 508 8484
[+44] 20 3290 9696
[+351] 21 060 6168
[+41] 79 571 98 76
[+34] 647 659 491