Como estudar na área de Tecnologia?

Introdução Nos últimos dois meses, várias pessoas me procuraram para saber como organizo meus estudos. Decidi, então, compilar um resumo das minhas técnicas e métodos. Espero que encontrem aqui ferramentas úteis! Método de estudos Primeiramente, o método de estudo é algo muito pessoal. As práticas que mencionarei tiveram êxito para mim. A primeira e mais importante tarefa é começar a desenvolver o seu método: Com que frequência você deseja estudar? Como você vai organizar o conhecimento?...

May 7, 2024 · 6 min · Caio Ferreira

How to learn in the Tech field?

Introduction Over the past two months, several people have approached me to find out how I organize my studies. Therefore, I decided to compile a summary of my techniques and methods. I hope you find useful tools here! Study Method Firstly, the study method is something very personal. The practices I will mention have been successful for me. The first and most important task is to start developing your method:...

May 7, 2024 · 6 min · Caio Ferreira

Notes on Dos and Don'ts of Machine Learning in Computer Security

Following the subject from my last post, Reflections about Supervised Learning on Security, I put down some more thoughts about the implementation of learning-based systems in the Security domain. This is my extension to the problems and recommendations presented on the paper Dos and Don’ts of Machine Learning in Computer Security (Quiring, et al, 2022). I encourage you to also read the paper, as it’s excellent and provide a lot of insights about how to better build machine learning models....

June 22, 2023 · 6 min · Caio Ferreira

Reflections about Supervised Learning on Security

April 23, 2023 · 6 min · Caio Ferreira

Implementing a safe and sound API Key authorization middleware in Go

A common requirement that I face on multiple projects is to safeguard some API endpoints to administrative access, or to provide a secure way for other applications to consume our service in a controlled and traceable manner. The usual solution for it is API Keys, a simple and effective authorization control mechanism that we can implement with a few lines of code. However, when doing, so we also need to be aware of threats and possible attacks that we may suffer, specially due to the usual privileges that these keys provides....

February 5, 2022 · 10 min · Caio Ferreira