In this post, I explored the application of Llama2(https://ai.meta.com/llama/), a powerful language model, for fine-tuning on Kaggle datasets. Specifically, I focus on the task of scoring student text summaries. By leveraging Llama2's capabilities, I aim to enhance the accuracy and efficiency of this task. You can even treat this post as a guideline of fine tuning Llama2 on your own dataset.
Interesting Thoughts on Data Flow Analysis and Taint Tracking Mechanism of SAST Tool(Coverity)
Some SAST tools introduce data flow and taint tracking technology to improve the accuracy of scanning results. Coverity is one of the greatest SAST tools that are able to significantly reduce code defects. This post will illustrate some interesting points while performing code scanning with Coverity.
Sonar Code Quality Gate Integration with CI - Part 3
This post is to solve the potential problems of sonar scanner TLS verification, if the certificate in use is a self-signed certificate.
The Kubernetes Image Pulling Modifications
It's hard to pull some kind of kubernetes images by some reasons. So I just wrote down some approaches to deal with that tricky problem, which may save a lot of time.
Sonar Code Quality Gate Integration with CI - Part 2
As Sonarqube and Gitlab CI integration described in the previous post, this time we're going to talk about the quality gate integration for Gitlab and Jenkins CI.
Sonar Code Quality Gate Integration with CI - Part 1
Basically, there are a couple of approaches to handle the code quality checking in different stage, such as pre-commit, pre-merge and post-merge. This post is to state the code quality checking process and the integration with CI in the pre-merge stage, which is usually known as quality gate.
Android Anti-debugging Tricks - Part 1
This is a series of Android anti-debugging proposals, in particular for the dynamic debugging. Maybe a little more anti-anti-debugging tricks will be mentioned in this series.
Cryptography - Comparison of Encryption Algorithms
A brief comparison of common encryption and encoding algorithms, and some supplementary content may be useful.
Accelerate Services Blacklisted by Gateway through CDN
There are some useful methods to accelerate services that are blacklisted by the gateway, CDN is one of the most efficient methods. The reasonable combination of the CDN and protocol will make your services robust from the gateway blacklist.
Secure Coding Practice - Insecure Deserialization
This series is about secure coding during development. The OWASP TOP 10 is our guide to define vulnerability type. For this part, it will focus on the vulnerable points and the mitigation of insecure deserialization problems.