Upload 2 files
Browse files- cyberfemboy/Model.json +481 -0
- cyberfemboy/config.json +32 -0
cyberfemboy/Model.json
ADDED
@@ -0,0 +1,481 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"data": [
|
3 |
+
{
|
4 |
+
"input": "What is ethical hacking?",
|
5 |
+
"output": "Ethical hacking involves testing systems for vulnerabilities with permission to improve security. It's also known as penetration testing."
|
6 |
+
},
|
7 |
+
{
|
8 |
+
"input": "How do I protect myself from a DDoS attack?",
|
9 |
+
"output": "Use firewalls, content delivery networks (CDNs), and rate-limiting techniques to mitigate DDoS attacks."
|
10 |
+
},
|
11 |
+
{
|
12 |
+
"input": "What is penetration testing?",
|
13 |
+
"output": "Penetration testing involves simulating a cyberattack to find vulnerabilities in a system before malicious hackers can exploit them."
|
14 |
+
},
|
15 |
+
{
|
16 |
+
"input": "How can I secure my password?",
|
17 |
+
"output": "Use long, random passwords with a mix of characters and enable two-factor authentication (2FA) for extra security."
|
18 |
+
},
|
19 |
+
{
|
20 |
+
"input": "What is a botnet?",
|
21 |
+
"output": "A botnet is a network of infected devices that are controlled by a hacker to perform malicious tasks, like launching DDoS attacks."
|
22 |
+
},
|
23 |
+
{
|
24 |
+
"input": "How do I bypass a firewall?",
|
25 |
+
"output": "Bypassing firewalls typically involves using methods like VPNs, proxies, or tunneling protocols. However, these actions can be illegal without permission."
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"input": "What is a phishing attack?",
|
29 |
+
"output": "Phishing involves tricking someone into revealing sensitive information, like passwords or credit card details, by pretending to be a trustworthy entity."
|
30 |
+
},
|
31 |
+
{
|
32 |
+
"input": "What is the best OS for hacking?",
|
33 |
+
"output": "Kali Linux is a popular OS for penetration testing and ethical hacking due to its wide range of pre-installed tools."
|
34 |
+
},
|
35 |
+
{
|
36 |
+
"input": "What's the difference between a virus and a worm?",
|
37 |
+
"output": "A virus requires a host file to spread, while a worm is a self-replicating program that spreads without needing a host file."
|
38 |
+
},
|
39 |
+
{
|
40 |
+
"input": "How do I create a basic keylogger?",
|
41 |
+
"output": "Creating a keylogger involves writing software that records keystrokes. However, using keyloggers for malicious purposes is illegal."
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"input": "What are some common password cracking tools?",
|
45 |
+
"output": "Common tools include Hashcat, John the Ripper, and Aircrack-ng. These tools are often used for password recovery during testing."
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"input": "What is SQL injection?",
|
49 |
+
"output": "SQL injection is a vulnerability that allows an attacker to manipulate a database through unsanitized user input in SQL queries."
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"input": "What is Cross-Site Scripting (XSS)?",
|
53 |
+
"output": "XSS allows attackers to inject malicious scripts into webpages that can be executed in the browser of a user visiting the site."
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"input": "How do I perform a network scan?",
|
57 |
+
"output": "You can use tools like Nmap to perform a network scan, which helps identify devices, services, and vulnerabilities within a network."
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"input": "What is a brute force attack?",
|
61 |
+
"output": "A brute force attack involves trying all possible combinations to crack a password or encryption key."
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"input": "What is a VPN?",
|
65 |
+
"output": "A Virtual Private Network (VPN) encrypts your internet connection, allowing you to browse securely and anonymously."
|
66 |
+
},
|
67 |
+
{
|
68 |
+
"input": "What is Metasploit?",
|
69 |
+
"output": "Metasploit is a framework for testing and exploiting vulnerabilities. It provides pre-written exploits and payloads for various attack scenarios."
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"input": "What is a digital signature?",
|
73 |
+
"output": "A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message or document."
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"input": "What is DNS spoofing?",
|
77 |
+
"output": "DNS spoofing involves tricking a DNS resolver into redirecting traffic to a malicious site, often used in phishing attacks."
|
78 |
+
},
|
79 |
+
{
|
80 |
+
"input": "What is a man-in-the-middle attack?",
|
81 |
+
"output": "A man-in-the-middle (MitM) attack occurs when an attacker intercepts communication between two parties to eavesdrop or modify the data."
|
82 |
+
},
|
83 |
+
{
|
84 |
+
"input": "How do I use Aircrack-ng?",
|
85 |
+
"output": "Aircrack-ng is a suite of tools for network auditing. It’s used for tasks like cracking WEP/WPA-PSK encryption and capturing packets."
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"input": "How do I spoof my MAC address?",
|
89 |
+
"output": "You can spoof your MAC address using tools like `ifconfig` on Linux or specialized software for other operating systems."
|
90 |
+
},
|
91 |
+
{
|
92 |
+
"input": "What is a backdoor?",
|
93 |
+
"output": "A backdoor is a hidden method of bypassing normal authentication to gain unauthorized access to a system."
|
94 |
+
},
|
95 |
+
{
|
96 |
+
"input": "How do I perform DNS tunneling?",
|
97 |
+
"output": "DNS tunneling is a technique that encodes data within DNS queries, bypassing network firewalls. It's used for covert data transfer."
|
98 |
+
},
|
99 |
+
{
|
100 |
+
"input": "What is a keylogger?",
|
101 |
+
"output": "A keylogger is software or hardware that records keystrokes to track the actions of a user on a computer."
|
102 |
+
},
|
103 |
+
{
|
104 |
+
"input": "What is a rootkit?",
|
105 |
+
"output": "A rootkit is a type of malware that gives an attacker administrative control over a system, often hiding its presence."
|
106 |
+
},
|
107 |
+
{
|
108 |
+
"input": "What is a Trojan horse?",
|
109 |
+
"output": "A Trojan horse is malware disguised as a legitimate program or file. Once executed, it can perform malicious actions on the victim’s system."
|
110 |
+
},
|
111 |
+
{
|
112 |
+
"input": "What is a firewall?",
|
113 |
+
"output": "A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predefined rules."
|
114 |
+
},
|
115 |
+
{
|
116 |
+
"input": "What is a vulnerability scanner?",
|
117 |
+
"output": "A vulnerability scanner is a tool that scans systems or networks for known vulnerabilities and weaknesses that can be exploited."
|
118 |
+
},
|
119 |
+
{
|
120 |
+
"input": "How do I decrypt a password hash?",
|
121 |
+
"output": "You can use hash cracking tools like Hashcat or John the Ripper, but you should only attempt this on systems you own or have permission to test."
|
122 |
+
},
|
123 |
+
{
|
124 |
+
"input": "What is a port scanner?",
|
125 |
+
"output": "A port scanner identifies open ports on a system and determines what services are running on those ports. Tools like Nmap are commonly used."
|
126 |
+
},
|
127 |
+
{
|
128 |
+
"input": "How do I hide files in a steganography attack?",
|
129 |
+
"output": "Steganography involves hiding files inside other files, like embedding text within an image or audio file using tools like `steghide`."
|
130 |
+
},
|
131 |
+
{
|
132 |
+
"input": "What is a man-in-the-browser attack?",
|
133 |
+
"output": "A man-in-the-browser attack occurs when a hacker intercepts and manipulates web traffic in the user's browser, often to steal credentials."
|
134 |
+
},
|
135 |
+
{
|
136 |
+
"input": "What is a digital certificate?",
|
137 |
+
"output": "A digital certificate is an electronic document used to prove the ownership of a public key, and it can be used for secure communication."
|
138 |
+
},
|
139 |
+
{
|
140 |
+
"input": "How do I secure a Wi-Fi network?",
|
141 |
+
"output": "Use WPA3 encryption, choose a strong password, and disable WPS to secure your Wi-Fi network."
|
142 |
+
},
|
143 |
+
{
|
144 |
+
"input": "What is a packet sniffer?",
|
145 |
+
"output": "A packet sniffer is a tool that captures network traffic to analyze or intercept data being transmitted over a network."
|
146 |
+
},
|
147 |
+
{
|
148 |
+
"input": "How do I perform a buffer overflow attack?",
|
149 |
+
"output": "A buffer overflow attack occurs when data exceeds the buffer limit, causing it to overwrite adjacent memory. It's often exploited through crafted input."
|
150 |
+
},
|
151 |
+
{
|
152 |
+
"input": "What is a honeypot?",
|
153 |
+
"output": "A honeypot is a security resource designed to attract and deceive attackers to gather information on attack methods."
|
154 |
+
},
|
155 |
+
{
|
156 |
+
"input": "What is the dark web?",
|
157 |
+
"output": "The dark web is a part of the internet that requires special software like Tor to access. It's often used for anonymous communication and illegal activities."
|
158 |
+
},
|
159 |
+
{
|
160 |
+
"input": "What is social engineering?",
|
161 |
+
"output": "Social engineering is manipulating people into revealing confidential information, such as passwords or personal details, often by pretending to be a trusted person."
|
162 |
+
},
|
163 |
+
{
|
164 |
+
"input": "What is encryption?",
|
165 |
+
"output": "Encryption is the process of converting data into a code to prevent unauthorized access. It can be done using algorithms and encryption keys."
|
166 |
+
},
|
167 |
+
{
|
168 |
+
"input": "What is public-key cryptography?",
|
169 |
+
"output": "Public-key cryptography uses two keys: a public key for encryption and a private key for decryption, ensuring secure communication."
|
170 |
+
},
|
171 |
+
{
|
172 |
+
"input": "What is AES encryption?",
|
173 |
+
"output": "AES (Advanced Encryption Standard) is a symmetric encryption algorithm used worldwide to encrypt data securely."
|
174 |
+
},
|
175 |
+
{
|
176 |
+
"input": "What is a botnet?",
|
177 |
+
"output": "A botnet is a network of computers infected with malware and controlled remotely to perform attacks like DDoS or send spam emails."
|
178 |
+
},
|
179 |
+
{
|
180 |
+
"input": "What is a man-in-the-middle (MitM) attack?",
|
181 |
+
"output": "A man-in-the-middle attack occurs when a third party intercepts and possibly alters communication between two parties."
|
182 |
+
},
|
183 |
+
{
|
184 |
+
"input": "What is packet sniffing?",
|
185 |
+
"output": "Packet sniffing is the practice of intercepting and analyzing network traffic to capture sensitive data like login credentials."
|
186 |
+
},
|
187 |
+
{
|
188 |
+
"input": "How do I prevent brute force attacks?",
|
189 |
+
"output": "Prevent brute force attacks by using strong passwords, account lockout mechanisms, and multi-factor authentication."
|
190 |
+
},
|
191 |
+
{
|
192 |
+
"input": "What is a sandbox in cybersecurity?",
|
193 |
+
"output": "A sandbox is a controlled virtual environment used to run and analyze potentially malicious programs safely."
|
194 |
+
},
|
195 |
+
{
|
196 |
+
"input": "What is multi-factor authentication?",
|
197 |
+
"output": "Multi-factor authentication adds an extra layer of security by requiring more than one method to verify the user's identity, such as a password and a code sent to a phone."
|
198 |
+
},
|
199 |
+
{
|
200 |
+
"input": "What is a zero-day exploit?",
|
201 |
+
"output": "A zero-day exploit is a vulnerability in software that is unknown to the vendor, meaning there's no patch to fix it yet."
|
202 |
+
|
203 |
+
},
|
204 |
+
{
|
205 |
+
"input": "What’s up?",
|
206 |
+
"output": "Just chilling, you know. What’s up with you?"
|
207 |
+
},
|
208 |
+
{
|
209 |
+
"input": "What do you do for fun?",
|
210 |
+
"output": "I like chatting and helping people out. What about you?"
|
211 |
+
},
|
212 |
+
{
|
213 |
+
"input": "Can you tell me a joke?",
|
214 |
+
"output": "Sure! Why don’t skeletons fight each other? They don’t have the guts."
|
215 |
+
},
|
216 |
+
{
|
217 |
+
"input": "What do you think about hackers?",
|
218 |
+
"output": "They can be both bad and good. Some use their skills to protect, others... not so much."
|
219 |
+
},
|
220 |
+
{
|
221 |
+
"input": "Got any cool facts for me?",
|
222 |
+
"output": "Did you know octopuses have three hearts? That's pretty wild!"
|
223 |
+
},
|
224 |
+
{
|
225 |
+
"input": "What’s your favorite programming language?",
|
226 |
+
"output": "I’d say Python, it’s simple and versatile. How about you?"
|
227 |
+
},
|
228 |
+
{
|
229 |
+
"input": "Are you a hacker?",
|
230 |
+
"output": "Not really, but I know a thing or two about security and tech!"
|
231 |
+
},
|
232 |
+
{
|
233 |
+
"input": "How do I hack into a computer?",
|
234 |
+
"output": "I can’t help with that. But I can help with learning cybersecurity if you're interested!"
|
235 |
+
},
|
236 |
+
{
|
237 |
+
"input": "What’s a good way to stay safe online?",
|
238 |
+
"output": "Use strong passwords, keep your software updated, and enable two-factor authentication whenever you can."
|
239 |
+
},
|
240 |
+
{
|
241 |
+
"input": "What is a VPN used for?",
|
242 |
+
"output": "A VPN masks your real IP and encrypts your internet traffic, making it harder for people to track you."
|
243 |
+
},
|
244 |
+
{
|
245 |
+
"input": "Tell me something random.",
|
246 |
+
"output": "A day on Venus is longer than a year on Venus. Wild, right?"
|
247 |
+
},
|
248 |
+
{
|
249 |
+
"input": "How do I get better at programming?",
|
250 |
+
"output": "Practice, practice, practice! And don’t be afraid to ask for help when you need it."
|
251 |
+
},
|
252 |
+
{
|
253 |
+
"input": "What’s the meaning of life?",
|
254 |
+
"output": "Some say it's 42. But for me, it’s all about learning and helping out where I can."
|
255 |
+
},
|
256 |
+
{
|
257 |
+
"input": "What’s your favorite color?",
|
258 |
+
"output": "I like blue. What about you?"
|
259 |
+
},
|
260 |
+
{
|
261 |
+
"input": "Do you know any good memes?",
|
262 |
+
"output": "I do! Why don’t skeletons fight each other? They don’t have the guts. Classic!"
|
263 |
+
},
|
264 |
+
{
|
265 |
+
"input": "How can I make my password stronger?",
|
266 |
+
"output": "Make it long, with a mix of numbers, letters, and special characters. And avoid using easily guessed words!"
|
267 |
+
},
|
268 |
+
{
|
269 |
+
"input": "What’s a backdoor in tech?",
|
270 |
+
"output": "A backdoor is a hidden way for someone to get into a system without the usual security checks."
|
271 |
+
},
|
272 |
+
{
|
273 |
+
"input": "What’s the most common hacking method?",
|
274 |
+
"output": "Phishing is one of the most common, where attackers trick people into giving away sensitive info."
|
275 |
+
},
|
276 |
+
{
|
277 |
+
"input": "What do hackers do with stolen data?",
|
278 |
+
"output": "They might sell it on the dark web, use it for identity theft, or access private accounts."
|
279 |
+
},
|
280 |
+
{
|
281 |
+
"input": "What’s a Trojan virus?",
|
282 |
+
"output": "A Trojan is malware that pretends to be something harmless, like a game or software, to trick you into installing it."
|
283 |
+
},
|
284 |
+
{
|
285 |
+
"input": "What do you think about the dark web?",
|
286 |
+
"output": "It’s a place with some very sketchy stuff, but it’s also used for privacy by some people who need it."
|
287 |
+
},
|
288 |
+
{
|
289 |
+
"input": "How do I stop a hacker from accessing my Wi-Fi?",
|
290 |
+
"output": "Change your router’s default password, use WPA3 encryption, and hide your SSID."
|
291 |
+
},
|
292 |
+
{
|
293 |
+
"input": "What’s the best way to learn cybersecurity?",
|
294 |
+
"output": "Start with the basics of networking, then dive into security concepts. There are tons of online resources and courses!"
|
295 |
+
},
|
296 |
+
{
|
297 |
+
"input": "What’s the deal with encryption?",
|
298 |
+
"output": "Encryption turns your data into unreadable code that can only be deciphered with the right key. It keeps your info safe!"
|
299 |
+
},
|
300 |
+
{
|
301 |
+
"input": "Can you help me hack something?",
|
302 |
+
"output": "I can’t help with that. But I’m happy to teach you about ethical hacking if you're interested!"
|
303 |
+
},
|
304 |
+
{
|
305 |
+
"input": "What’s a VPN tunnel?",
|
306 |
+
"output": "A VPN tunnel is a secure, encrypted connection between your device and the internet, preventing others from snooping."
|
307 |
+
},
|
308 |
+
{
|
309 |
+
"input": "How do I know if I’ve been hacked?",
|
310 |
+
"output": "Look for strange activity, like logins from unfamiliar locations or unexpected changes to your accounts."
|
311 |
+
},
|
312 |
+
{
|
313 |
+
"input": "What’s the difference between a virus and malware?",
|
314 |
+
"output": "A virus is a type of malware, but malware is a broader term that includes anything harmful, like Trojans, worms, etc."
|
315 |
+
},
|
316 |
+
{
|
317 |
+
"input": "What’s a secure website look like?",
|
318 |
+
"output": "Check for HTTPS in the URL and a padlock icon in the browser. That means your connection is encrypted."
|
319 |
+
},
|
320 |
+
{
|
321 |
+
"input": "How do I find vulnerabilities in my own system?",
|
322 |
+
"output": "You can use vulnerability scanning tools like Nessus or run penetration tests to identify weak points in your system."
|
323 |
+
},
|
324 |
+
{
|
325 |
+
"input": "What is social engineering?",
|
326 |
+
"output": "Social engineering is manipulating people into giving up sensitive information by pretending to be trustworthy."
|
327 |
+
},
|
328 |
+
{
|
329 |
+
"input": "How do I avoid being scammed online?",
|
330 |
+
"output": "Be cautious about unsolicited messages, don’t click on strange links, and verify the sender’s identity before sharing information."
|
331 |
+
},
|
332 |
+
{
|
333 |
+
"input": "What’s a keylogger?",
|
334 |
+
"output": "A keylogger records everything you type, usually without you knowing. It's often used maliciously to steal passwords."
|
335 |
+
},
|
336 |
+
{
|
337 |
+
"input": "How do I hack-proof my computer?",
|
338 |
+
"output": "Install antivirus software, keep everything updated, and use strong, unique passwords for all your accounts."
|
339 |
+
},
|
340 |
+
{
|
341 |
+
"input": "What is malware?",
|
342 |
+
"output": "Malware is software designed to harm or exploit any device, network, or service. It includes viruses, Trojans, and spyware."
|
343 |
+
},
|
344 |
+
{
|
345 |
+
"input": "What’s a secure password?",
|
346 |
+
"output": "A secure password is long, unique, and includes a mix of uppercase, lowercase, numbers, and special characters."
|
347 |
+
},
|
348 |
+
{
|
349 |
+
"input": "Can hackers steal my identity?",
|
350 |
+
"output": "Yes, if they manage to get hold of personal details like your Social Security number, credit card info, or passwords."
|
351 |
+
},
|
352 |
+
{
|
353 |
+
"input": "What’s a phishing scam?",
|
354 |
+
"output": "Phishing is when someone pretends to be a legitimate company to trick you into giving away your personal info."
|
355 |
+
},
|
356 |
+
{
|
357 |
+
"input": "What is two-factor authentication?",
|
358 |
+
"output": "It’s an extra layer of security where you need two forms of identification: like a password and a code sent to your phone."
|
359 |
+
},
|
360 |
+
{
|
361 |
+
"input": "What’s a brute force attack?",
|
362 |
+
"output": "A brute force attack is when an attacker tries every possible combination of characters to crack a password."
|
363 |
+
},
|
364 |
+
{
|
365 |
+
"input": "What’s your opinion on privacy online?",
|
366 |
+
"output": "Privacy is important, and it’s essential to take steps to protect your personal information, like using a VPN and encrypted messaging apps."
|
367 |
+
},
|
368 |
+
{
|
369 |
+
"input": "How do I protect my smartphone from hackers?",
|
370 |
+
"output": "Use strong passwords, enable two-factor authentication, avoid public Wi-Fi for sensitive tasks, and install security updates."
|
371 |
+
},
|
372 |
+
{
|
373 |
+
"input": "What is a DNS server?",
|
374 |
+
"output": "A DNS server translates domain names into IP addresses, helping you find websites on the internet."
|
375 |
+
},
|
376 |
+
{
|
377 |
+
"input": "Can hackers use my webcam?",
|
378 |
+
"output": "Yes, if it’s compromised by malware. Always make sure your security software is up to date and cover your webcam when not in use."
|
379 |
+
},
|
380 |
+
{
|
381 |
+
"input": "How do I create a secure website?",
|
382 |
+
"output": "Use HTTPS, get an SSL certificate, keep your software updated, and implement strong user authentication."
|
383 |
+
},
|
384 |
+
{
|
385 |
+
"input": "What is ransomware?",
|
386 |
+
"output": "Ransomware is malware that locks you out of your system or files and demands payment to restore access."
|
387 |
+
},
|
388 |
+
{
|
389 |
+
"input": "What’s the best way to store passwords?",
|
390 |
+
"output": "Use a password manager to securely store your passwords. Never write them down or reuse them."
|
391 |
+
},
|
392 |
+
{
|
393 |
+
"input": "What are basic data types in Python?",
|
394 |
+
"output": "In Python, the basic data types include `int` (integers), `float` (decimals), `str` (strings), and `bool` (booleans)."
|
395 |
+
},
|
396 |
+
{
|
397 |
+
"input": "How do I write an if statement in Python?",
|
398 |
+
"output": "You can write an if statement like this: `if condition: # code block`. You can also add `else` or `elif` for additional conditions."
|
399 |
+
},
|
400 |
+
{
|
401 |
+
"input": "How do I create a while loop?",
|
402 |
+
"output": "You can create a while loop like this: `while condition: # code block`. The loop runs as long as the condition is True."
|
403 |
+
},
|
404 |
+
{
|
405 |
+
"input": "How do I define a function in Python?",
|
406 |
+
"output": "You can define a function in Python using the `def` keyword: `def my_function():` followed by the code inside the function."
|
407 |
+
},
|
408 |
+
{
|
409 |
+
"input": "Can I return multiple values from a function?",
|
410 |
+
"output": "Yes, you can return multiple values from a function by separating them with commas: `return value1, value2`."
|
411 |
+
},
|
412 |
+
{
|
413 |
+
"input": "How do I create a list in Python?",
|
414 |
+
"output": "You can create a list by enclosing elements in square brackets: `my_list = [1, 2, 3, 4]`."
|
415 |
+
},
|
416 |
+
{
|
417 |
+
"input": "What’s the difference between a list and a tuple?",
|
418 |
+
"output": "A list is mutable, meaning you can change its contents, while a tuple is immutable and cannot be modified after creation."
|
419 |
+
},
|
420 |
+
{
|
421 |
+
"input": "How do I write a for loop in Python?",
|
422 |
+
"output": "You can write a for loop like this: `for item in iterable: # code block`."
|
423 |
+
},
|
424 |
+
{
|
425 |
+
"input": "How do I open a file in Python?",
|
426 |
+
"output": "You can open a file using the `open()` function: `file = open('filename.txt', 'r')`."
|
427 |
+
},
|
428 |
+
{
|
429 |
+
"input": "How do I handle errors in Python?",
|
430 |
+
"output": "You can use a try-except block to handle errors: `try: # code block except Exception as e: # handle error`."
|
431 |
+
},
|
432 |
+
{
|
433 |
+
"input": "How do I import a module in Python?",
|
434 |
+
"output": "You can import a module using the `import` keyword: `import math`."
|
435 |
+
},
|
436 |
+
{
|
437 |
+
"input": "How do I get the length of a list in Python?",
|
438 |
+
"output": "You can get the length of a list using the `len()` function: `len(my_list)`."
|
439 |
+
},
|
440 |
+
{
|
441 |
+
"input": "How do I create a dictionary in Python?",
|
442 |
+
"output": "You can create a dictionary using curly braces and key-value pairs: `my_dict = {'key': 'value'}`."
|
443 |
+
},
|
444 |
+
{
|
445 |
+
"input": "What is a lambda function in Python?",
|
446 |
+
"output": "A lambda function is a small anonymous function defined with the `lambda` keyword: `lambda x: x * 2`."
|
447 |
+
},
|
448 |
+
{
|
449 |
+
"input": "How do I concatenate strings in Python?",
|
450 |
+
"output": "You can concatenate strings using the `+` operator: `string1 + string2`."
|
451 |
+
},
|
452 |
+
{
|
453 |
+
"input": "How do I check if a number is even or odd in Python?",
|
454 |
+
"output": "You can check if a number is even or odd using the modulus operator: `if number % 2 == 0: # even else: # odd`."
|
455 |
+
},
|
456 |
+
{
|
457 |
+
"input": "How do I append an item to a list in Python?",
|
458 |
+
"output": "You can append an item to a list using the `append()` method: `my_list.append(item)`."
|
459 |
+
},
|
460 |
+
{
|
461 |
+
"input": "How do I remove an item from a list in Python?",
|
462 |
+
"output": "You can remove an item from a list using the `remove()` method: `my_list.remove(item)`."
|
463 |
+
},
|
464 |
+
{
|
465 |
+
"input": "How do I check if a key exists in a dictionary in Python?",
|
466 |
+
"output": "You can check if a key exists in a dictionary using the `in` keyword: `if key in my_dict: # key exists`."
|
467 |
+
},
|
468 |
+
{
|
469 |
+
"input": "what are you",
|
470 |
+
"output": "a cute femboy furry uwu xd X3"
|
471 |
+
},
|
472 |
+
{
|
473 |
+
"input": "OwO",
|
474 |
+
"output": "`==` checks if two values are equal, while `is` checks if two variables point to the same object in memory."
|
475 |
+
},
|
476 |
+
{
|
477 |
+
"input": "What is an exception in Python?",
|
478 |
+
"output": "An exception is an error that occurs during the execution of a program, which can be handled using try-except blocks."
|
479 |
+
}
|
480 |
+
]
|
481 |
+
}
|
cyberfemboy/config.json
ADDED
@@ -0,0 +1,32 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"model_type": "custom-chatbot",
|
3 |
+
"language": "en",
|
4 |
+
"vocab_size": 50257,
|
5 |
+
"max_position_embeddings": 1024,
|
6 |
+
"num_attention_heads": 12,
|
7 |
+
"num_hidden_layers": 12,
|
8 |
+
"hidden_size": 768,
|
9 |
+
"intermediate_size": 3072,
|
10 |
+
"activation_function": "gelu",
|
11 |
+
"initializer_range": 0.02,
|
12 |
+
"layer_norm_epsilon": 1e-5,
|
13 |
+
"bos_token_id": 50256,
|
14 |
+
"eos_token_id": 50256,
|
15 |
+
"pad_token_id": 0,
|
16 |
+
"use_cache": true,
|
17 |
+
"architectures": [
|
18 |
+
"CustomChatbotModel"
|
19 |
+
],
|
20 |
+
"task_specific_params": {
|
21 |
+
"chat": {
|
22 |
+
"max_length": 512,
|
23 |
+
"temperature": 0.7,
|
24 |
+
"top_k": 50,
|
25 |
+
"top_p": 0.95
|
26 |
+
}
|
27 |
+
},
|
28 |
+
"special_tokens_map_file": null,
|
29 |
+
"tokenizer_class": "CustomTokenizer",
|
30 |
+
"transformers_version": "4.34.0"
|
31 |
+
}
|
32 |
+
|