Forem

Shahadat Sagor profile picture

Shahadat Sagor

๐ŸŽ“ CS @ BRAC University ๐Ÿ’ก Passionate about AI, Innovation & building the future ๐Ÿ”จ Currently turning ideas into reality โ€” one commit at a time

Education

BRAC University

Pronouns

He/His

How to Save Tokens and Manage Usage Limits in Claude
Cover image for How to Save Tokens and Manage Usage Limits in Claude

How to Save Tokens and Manage Usage Limits in Claude

1
Comments
5 min read
๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป ๐— ๐—ฎ๐—ฐ๐—ต๐—ถ๐—ป๐—ฒ ๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป๐—ถ๐—ป๐—ด ๐—™๐—ฟ๐—ผ๐—บ ๐—ฆ๐—ฐ๐—ฟ๐—ฎ๐˜๐—ฐ๐—ต
Cover image for ๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป ๐— ๐—ฎ๐—ฐ๐—ต๐—ถ๐—ป๐—ฒ ๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป๐—ถ๐—ป๐—ด ๐—™๐—ฟ๐—ผ๐—บ ๐—ฆ๐—ฐ๐—ฟ๐—ฎ๐˜๐—ฐ๐—ต

๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป ๐— ๐—ฎ๐—ฐ๐—ต๐—ถ๐—ป๐—ฒ ๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป๐—ถ๐—ป๐—ด ๐—™๐—ฟ๐—ผ๐—บ ๐—ฆ๐—ฐ๐—ฟ๐—ฎ๐˜๐—ฐ๐—ต

Comments
1 min read
Large Language Models(LLMs)
Cover image for Large Language Models(LLMs)

Large Language Models(LLMs)

1
Comments
2 min read
Navigating the ML Landscape
Cover image for Navigating the ML Landscape

Navigating the ML Landscape

13
Comments
2 min read
Pure ML vs Applied ML
Cover image for Pure ML vs Applied ML

Pure ML vs Applied ML

Comments
2 min read
8 Gmail Hacks that you shouldn't miss
Cover image for 8 Gmail Hacks that you shouldn't miss

8 Gmail Hacks that you shouldn't miss

1
Comments
2 min read
Leading Trends and Threats in Cybersecurity
Cover image for Leading Trends and Threats in Cybersecurity

Leading Trends and Threats in Cybersecurity

Comments
2 min read
How to secure your data?
Cover image for How to secure your data?

How to secure your data?

2
Comments
2 min read
Computer Worm
Cover image for Computer Worm

Computer Worm

1
Comments
2 min read
What is a Rootkit?
Cover image for What is a Rootkit?

What is a Rootkit?

Comments
2 min read
11 tips to spot Phishing Attack

11 tips to spot Phishing Attack

Comments
5 min read
Phishing Attack
Cover image for Phishing Attack

Phishing Attack

1
Comments
2 min read
What is Spyware?
Cover image for What is Spyware?

What is Spyware?

1
Comments
2 min read
What is Adware?
Cover image for What is Adware?

What is Adware?

Comments
2 min read
Brute Force Attack
Cover image for Brute Force Attack

Brute Force Attack

1
Comments
3 min read
What is DDoS attack?
Cover image for What is DDoS attack?

What is DDoS attack?

1
Comments
3 min read
What is Ransomware?
Cover image for What is Ransomware?

What is Ransomware?

1
Comments
3 min read
Payload in Cybersecurity
Cover image for Payload in Cybersecurity

Payload in Cybersecurity

Comments
2 min read
Everything about Malware
Cover image for Everything about Malware

Everything about Malware

1
Comments
2 min read
What is Security Breach?
Cover image for What is Security Breach?

What is Security Breach?

1
Comments
2 min read
What is Attack Vector?
Cover image for What is Attack Vector?

What is Attack Vector?

1
Comments
2 min read
Introduction to CIA
Cover image for Introduction to CIA

Introduction to CIA

1
Comments
2 min read
What is Heartbleed?
Cover image for What is Heartbleed?

What is Heartbleed?

1
Comments
1 min read
What is CyberSecurity?
Cover image for What is CyberSecurity?

What is CyberSecurity?

1
Comments
1 min read
loading...