In this blog, I am going to show you how we can create an image, crop it, swap some portions of the image and create a collage using python language.
Part1: Creating an Image using Python
For this, we need to import a library called OpenCV. If you don't have this library pre-installed you can install it using
pip install opencv-python
and import is using
Now, to make this process simple I have created a function for creating an image, create()
nphoto = cv2.circle(photo,(100,100),50,(255,0,0),5)
Hello everyone, in this blog we are going to discuss what is confusion matrix and what role it plays in the world of cybersecurity.
So let's start by answering this simple question
Confusion Matrix is a concept that is used to find the accuracy of the model that we create in Machine learning or we can explain it as a table that is often used to describe the performance of a classification model on a set of test data for which the true values are known.
The basic terms that the Confusion matrix has are:
Hello everyone, in this blog, I am going to tell you how we can run a GUI application inside a Docker container.
After completing all the pre-requisites we can follow these simple steps:
Step1: Pull the docker image. You can use any container image. Here, I am using centos: latest
docker pull centos:latest
Step2: Run the docker container
docker run -it --net=host --env="DISPLAY" --name CONTAINER_NAME centos:latest
While running the docker container, it is mandatory to specify the net= host so that the container will use the local network for…
In this blog, we are going to deploy a Machine Learning Model on the top of Docker container. For this, we need various software as a prerequisite. So let's start this by installing Docker.
To install Docker first we need to configure yum for docker. So paste the below code in your repo dir
In this blog, we are going to create a simple chat app using socket programming. In this, we are going to use UDP protocol to transfer the data from one system to another.
Socket programming is a way of connecting two nodes on a network to communicate with each other. One socket(node) listens on a particular port at an IP, while the other socket reaches out to the other to form a connection. User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. With UDP, computer applications can send messages, in this case, referred to…
Ansible is a handy configuration management tool. It helps in configuring a large number of servers from one single controller instance. It helps automate complex tasks like configuration management, application deployment, creating CI/CD pipelines, etc. Writing ansible code to manage the same service for multiple environments or different products increases code redundancy. With more complexity in functionality, it becomes difficult to manage everything in one ansible-playbook file. Sharing code among teams becomes difficult. So to solve this problem we need to create ansible roles that are easier to share.
Ansible role is an independent component that allows the reuse of…
Network topology refers to how various nodes, devices, and connections on your network are physically or logically arranged in relation to each other. Think of your network as a city, and the topology as the road map. Just as there are many ways to arrange and maintain a city — such as making sure the avenues and boulevards can facilitate passage between the parts of town getting the most traffic — there are several ways to arrange a network. …
In this blog, I am going to tell you how to configure the ha-proxy server using ansible-playbook in simple steps:
Step1: Writing ansible-playbook
Here we are not using Ansible ad-hoc commands to configure haproxy we are writing a playbook to automate the whole process.
- hosts: haproxy
In this blog, I am going to show you how to create a high availability structure over AWS using CLI.
To launch the ec2 instance we can run the following command:
aws ec2 run-instances — image-id ami-xxxxxxxx — count 1 — instance-type t2.micro — key-name MyKeyPair — security-group-ids sg-903004f8 — subnet-id subnet-6e7f829e
After this, we need to install and configure the webserver
Step 1: Installing httpd server in the cloud using CLI.