• chevron_right

      ChatALL – L’outil ultime pour interagir avec tous les bots IA

      news.movim.eu / Korben · Sunday, 20 August, 2023 - 07:00 · 1 minute

    ChatALL est un logiciel vachement pratique qui permet d’envoyer simultanément des requêtes à plusieurs bots IA basés sur des modèles de langage (LLMs) pour évidemment en tirer les meilleures réponses.

    Imaginez que vous soyez en train de bosser avec ChatGPT ou un Alpaca (et dérivé) et que les résultats obtenus ne vous conviennent pas vraiment. Parfois, il y a des demandes qui sont difficile pour certaines IA. C’est là que ChatALL entre en scène puisque grâce à cet outil, vous allez pouvoir poser une seule fois votre question et recevoir des réponses de plusieurs bots IA, tels que Bing Chat, Baidu ERNIE, Bard, Poe, MOSS, Tongyi Qianwen, Dedao Learning Assistant, iFLYTEK SPARK, Alpaca, Vicuna, ChatGLM, Claude, Gradio ou encore HuggingChat.

    Ainsi, vous obtiendrez un panel de réponses que vous pourrez analyser d’un seul coup d’oeil.

    Parmi les fonctionnalités de ChatALL, il y a un mode de prompt rapide, la sauvegarde de l’historique de chat en local, la mise en valeur de la meilleure réponse, la suppression des réponses indésirables, la possibilité d’activer/désactiver les bots à tout moment, et la prise en charge de plusieurs langues (anglais et chinois pour l’instant). De plus, ChatALL est compatible avec Windows, macOS et Linux.

    Alors, comment utiliser ChatALL ? Il vous suffit d’avoir des comptes et/ou des clés API pour les bots en question et une bonne connexion réseau. C’est tout !

    ChatALL permet de rendre les interactions avec les bots d’IA plus riches et stimulantes. Soumettre des demandes à un panel de bots est bien plus intéressant que d’interagir avec un bot unique, parfois décevant, surtout que chaque IA a ses points forts et ses points faibles.

    Bref, si ça vous intéresse, c’est par ici .

    • chevron_right

      Twitter gets buggier: Followers don’t display, users restricted in error

      news.movim.eu / ArsTechnica · Tuesday, 27 June, 2023 - 17:20

    Twitter gets buggier: Followers don’t display, users restricted in error

    Enlarge (credit: SOPA Images / Contributor | LightRocket )

    Since the earliest days of Twitter, the easiest way to find out more about an account was to look beyond its tweets and dig deeper into who follows that account and who that account is following. Now, users are discovering that Twitter seems to either be glitching or intentionally limiting access to the complete lists of any given user's followers or who they are following.

    Ars easily replicated the error by clicking on various accounts and finding that Twitter only showed a partial list of accounts a user follows or is following. For Twitter owner Elon Musk's account, for example, instead of seeing all 339 accounts he follows, Twitter only showed 64 accounts. Currently, it seems that users can only review complete lists of their own followers and following lists.

    It's likely that Twitter is simply glitching, but it's possible that the company is planning to restrict who can view an account's followers and following lists, potentially reserving that privilege for paid subscribers someday. Earlier this month, the @TitterDaily account confirmed that the ability to direct message accounts that don't follow you would be restricted to paid Twitter subscribers.

    Read 20 remaining paragraphs | Comments

    • chevron_right

      Report: Twitter secretly boosted accounts instead of treating everyone equally

      news.movim.eu / ArsTechnica · Tuesday, 28 March, 2023 - 18:07

    Report: Twitter secretly boosted accounts instead of treating everyone equally

    Enlarge (credit: Anadolu Agency / Contributor | Anadolu )

    It looks like the Twitter experience is about to change for nearly everybody on the platform—even those who buy into CEO Elon Musk’s Twitter Blue subscription service.

    On Monday, Musk tweeted that after April 15, “only verified accounts will be eligible to be in For You recommendations” and eligible to vote in polls (which can be a way for accounts to boost engagement). Musk claims this is “the only realistic way to address” an otherwise “hopeless losing battle” with “advanced AI bot swarms taking over” the platform.

    These changes will apparently take effect two weeks after Musk said Twitter will begin “un-verifying” legacy blue checked accounts . That makes it likely that soon some of Twitter’s most beloved and trusted accounts will no longer be promoted widely to users via the “For You” tab if they refuse to pay $8 a month to get access to subscriber benefits.

    Read 16 remaining paragraphs | Comments

    • chevron_right

      Get ready to meet the Chat GPT clones

      news.movim.eu / ArsTechnica · Saturday, 11 March, 2023 - 12:01

    Get ready to meet the Chat GPT clones

    Enlarge (credit: Edward Olive/Getty Images)

    ChatGPT might well be the most famous, and potentially valuable , algorithm of the moment, but the artificial intelligence techniques used by OpenAI to provide its smarts are neither unique nor secret. Competing projects and open source clones may soon make ChatGPT-style bots available for anyone to copy and reuse.

    Stability AI , a startup that has already developed and open-sourced advanced image-generation technology, is working on an open competitor to ChatGPT. “We are a few months from release,” says Emad Mostaque, Stability’s CEO. A number of competing startups, including Anthropic , Cohere , and AI21 , are working on proprietary chatbots similar to OpenAI’s bot.

    Read 17 remaining paragraphs | Comments

    • chevron_right

      Cash-strapped Twitter to start charging developers for API access next week

      news.movim.eu / ArsTechnica · Thursday, 2 February, 2023 - 16:39 · 1 minute

    Cash-strapped Twitter to start charging developers for API access next week

    Enlarge (credit: SOPA Images / Contributor | LightRocket )

    In the middle of the night, Twitter made an announcement that disappointed a wide range of developers whose research, bots, and apps depend on free access to the platform’s API to function. Twitter announced in a tweet that starting on February 9, Twitter “will no longer support free access to the Twitter API.” Instead, many developers will have to either pay to access public data or abruptly shut down their projects.

    Twitter has not yet shared how much its new “paid basic tier” will cost, and the company has only vaguely promised “more details on what you can expect next week.” Thousands of small developers may have to shut down free tools like @ThreadReaderApp or @RemindMe_ofThis, the Verge reported , impacting hundreds of thousands of followers who rely on small developers to build tools that help maximize their engagement with the platform.

    Entrepreneur and developer Tom Coates joined many developers protesting Twitter’s announcement. Coates tweeted that, while “it is not unreasonable to want to find a way to charge those developers who extract more value than they contribute” to Twitter, “one week’s notice and no indication of pricing shows Twitter is chaotic and unreliable. No one’s going to build a business on that.”

    Read 6 remaining paragraphs | Comments

    • Sp chevron_right

      Beware the Email Bomb

      pubsub.slavino.sk / spam_resource · Wednesday, 15 December, 2021 - 13:00 · 1 minute

    I had a customer ask me yesterday, why is their ESP trying to force them to implement CAPTCHA on their signup forms? They're not spammers.

    Well, unfortunately, it's usually because of stuff like this: As Webbula's Jenna Devinney explains , bad guys can easily find and script a bunch of pokes at a bunch of webforms, purely to wreak havoc. Maybe it's random. Maybe it is to annoy somebody they're mad at. But the net is, they go around signing up Joe Email User for 200 email lists and then Joe Email User starts receiving 200 emails a day that are all spam to him, and it makes him mad. It makes him hate the companies sending that mail, even though it wasn't really their fault. It makes him report all that mail as spam, and that'll harm the sender's IP and domain reputation.

    Even worse, the bad guys sometimes script submissions to trigger mail to spamtrap addresses, trying to get senders blocked by Spamhaus, other blocklists, or ISPs.

    So, I would do it -- I recommend that you do go ahead and implement a CAPTCHA. It's probably not hard and it's definitely becoming a best practice. And you're not alone. I implemented ReCAPTCHA on my own WombatMail signup forms , because some goober seemed to think it was fun to try submitting "abuse" and "network" addresses just to see if they could get me in trouble. (Sigh.) If I hadn't have done that, eventually I would have run into problems, too. Even with double opt-in.

    Indeed, I've seen a lot of mostly-good senders get into trouble with Spamhaus over the past couple of years and I think this type of mailbombing/scriptbombing email form abuse is probably the reason why. If you can prevent it before it ends up causing a Spamhaus listing, do so! This truly is one of those scenarios where an ounce of prevention is worth MORE than a pound of cure. Having to re-confirm a list because of a Spamhaus listing is no fun and will decimate your marketing efforts. It's much less painful to add a bit more logic up front to keep the bots from submitting garbage to your forms, if you ask me.



    Značky: #Webbula, #recaptcha, #spamhaus, #bots, #Network

    • Fo chevron_right

      What Is The Difference: Viruses, Worms, Ransomware, Trojans, Malware, Spyware, Rootkit

      pubsub.do.nohost.me / FossBytes · Monday, 15 March, 2021 - 09:48 · 8 minutes

    types of malware

    If you are among the people who consider malware, worms, and viruses to be the same thing, then you’re on the wrong track. Malware is an umbrella term for malicious software which includes all sorts of harmful elements like viruses, trojans, ransomware, bots, spyware, etc. So, let’s tell you about them in detail.

    Have you ever tried to understand the difference between virus, trojan, worm, spyware, and malware? Even though they are meant to harm your device, steal your data, and spy on you, why are they named so differently? Basically, terms like viruses, trojans are all types of malicious software, or simply, malware.

    Now, the first and foremost question arises, from where did the malware come? Who created the first virus?

    Clearly, they are not some outer planet species, trying to harm us. In fact, the real truth is that they were not even created with an intention to harm someone.

    The mention of malware goes back to 1949 when John von Neumann first developed the theoretical base for self-duplicating automation programs, but the technical implementation was not feasible at that time. The term “Computer Virus” was first used by Professor Leonard M. Adleman in 1981 in a conversation with Fred Cohen.

    World’s first computer virus named ‘Brain’ was coded by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi , who were from Lahore, Pakistan. Brain was meant to infect storage media based on MS-DOS FAT file systems. It was originally designed to infect the IBM PC; it replaced the boot sector of its floppy disk with the virus. The virus program changed the disk label to ©Brain and the defected boot sectors displayed this message:

    Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today – Thank GOODNESS!! BEWARE OF THE er..VIRUS: this program is catching program follows after these messages….$#@%$@!!

    However, as you may presume, there was no evil intention behind this. Alvi brothers once justified Brain in their interview with TIME magazine; they created the virus only to protect their medical software from piracy. It was their countermeasure against copyright infringement acts.

    Coming back to Malware, this is a malicious software designed to harm a computer that may or may not be connected to a network. Malware only gets into action when there is computer hardware involved in the game. Otherwise, the term Malware is of no use.

    What are the types of Malware?

    What is a Worm?

    Worms are malware computer programs which have the ability to replicate themselves. Their sole objective is to increase their population and transfer themselves to another computer via the internet or through storage media. They operate like spies involved in a top-secret mission, hiding their movement from the user.

    Worms don’t cause any harm to the computer; their replicating nature consumes hard drive space, thus, slowing down the machine. A couple of the infamous worms are SQL Blaster which slowed the internet for a small period and Code Red which took down almost 359,000 websites.

    What is a Virus?

    Viruses also have the ability to replicate themselves, but they do damage files on the computer they attack. Their main weakness lies in the fact that viruses can get into action only if they have the support of a host program. Otherwise, they’re just like a defeated warrior. They stick themselves to songs, videos, and executable files and travel all over the internet. W32.Sfc!mod, ABAP.Rivpas.A, Accept.3773 are some of the examples of virus programs.

    The Virus Gang (Types of Computer Virus):

    • File Viruses
    • Macro Viruses
    • Master Boot Record Viruses
    • Boot sector Viruses
    • Multi-Partite Viruses
    • Polymorphic Viruses
    • Stealth Viruses

    Feel free to Google any one of them if you like.

    What is a Trojan?

    Trojans are not like viruses or worms, and they are not meant to damage or delete files on your system. Their principal task is to provide to a backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permission. JS.Debeski.Trojan is an example of Trojan.

    Trojans derive their name from the ‘Trojan Horse’ tale in which the Greeks entered the city of Troy with the help of a wooden horse disguised as a gift. But the Trojan turned out to be a sweet poison, as depicted in the movie Troy.

    The Trojan Gang (Types of Trojan):

    • Remote Access Trojans
    • Data Sending Trojans
    • Destructive Trojans
    • Proxy Trojans
    • FTP Trojans
    • Security Software Disabler Trojans
    • Denial-Of-Service Attack Trojans

    Feel free to Google anyone of them if you like.

    What is an Adware?

    Adware are used to display advertisements on your computer’s desktop or inside individual programs. They generally come attached with free-to-use software. They are the primary source of revenue for the developers of those software programs.

    Adware can’t be entirely described as Malware as they have no intention to harm your machine, they only track what advertisements you’re more interested in viewing and display the relevant ads on your computer screen. For some people, this can be alarming as it’s a breach of their privacy. Also, an attacker can stuff malicious code inside an adware program and use it to monitor users’ machine and even compromise it.

    What is Rootkit?

    Rootkits are a very dangerous category of malware as they are created with an aim to get remote access to a computer with full administrative privileges. Generally, a rootkit is a collection of different programs that work in a coordinated fashion to gain access and conceal its existence. They are also difficult to stop as they employ additional obfuscation mechanisms to hide their presence on the computer.

    What is a Spyware?

    Spyware programs also come attached with freeware. They track your browsing habits and other personal details and send it to a remote user. They can also facilitate installation of unwanted software from the internet. Unlike Adware, they work as a standalone program and do their operations silently.

    What is a Spam?

    You get very irritated when you receive unwanted emails from unknown senders; these are called Spams or junk emails. And the process of flooding the internet with the same message is called Spamming, done for the purpose of commercial advertising. These junk emails may sometimes contain Viruses or Trojans that enter your system as soon as you open the mail.

    What is a Bot?

    Bots or robots are automated processes that are designed to interact over the internet without the need of human interaction. They can be used for good and bad intentions. An evil-minded person can create a malicious Bot that is capable of infecting the host on its own. After transmitting itself to the host device, a Bot creates a connection with central servers which act as the command centers for the all infected hosts attached to that network called Botnet.

    A bot’s skills include stealing passwords, logging keystrokes, analyzing network traffic, relay spam, launching DoS (Denial of Service) attacks, and opening backdoors on infected hosts.

    Bots can be seen as the advanced form of Worms. Their infection rate and the tactic is more effective than that of Worms. These malicious Bots are created after a lot of hard work done by their malignant creators.

    What is a Ransomware?

    Ransomware is a type of malware that can alter the normal operation of your machine. It encrypts the data and prevents you from using your computer partially or wholly. Ransomware programs also display warning messages asking for money to get your device back to normal working condition.

    What is a Keylogger?

    As its name suggests, keylogger software is used to record the keystroke actions of a computer user. While it may be used for ethical purposes of measuring user behavior and engagement, the term is generally used for software that aims to record such actions without the knowledge of users. With a help of a keylogger, a notorious actor can know your email details, password, credit card details, messages you type, etc.

    Why people create malware?

    After reading all this, you might be thinking why people create malware. Here are some reasons which might compel a coder to write malware programs:

    • Take control of a person’s computer for personal or professional reasons.
    • To get financial benefits. This also includes hackers raising money for a cause. Last year, we heard about a ransomware attack where hackers were collecting money to feed people. But it doesn’t mean what they were doing was right.
    • To steal confidential data.
    • To prove their point. For instance, by performing a security breach on a vulnerable system.
    • To take down an individual computer or a complete network.

    and the list goes on….

    How can you protect your computer from malware?

    • Keep your system up to date.
    • Use genuine software.
    • Install an antivirus software and update it regularly.
    • Set-up a firewall, may it be custom as provided by antivirus software. Windows has an inbuilt firewall option in case you don’t want to use a custom firewall.
    • Never open unknown emails that generally reside in your Spam folder.
    • Never open unknown links, use online website safety checker tools if you’re not sure to open a website.

    By taking these simple measures, you can effectively keep your machine free from Malware and other potential threats.

    The post What Is The Difference: Viruses, Worms, Ransomware, Trojans, Malware, Spyware, Rootkit appeared first on Fossbytes .