Name: Mehmet
Location: UK or Germany
Work Preferences: Remote/Hybrid/Office
Technologies: R, Python, Javascript, C++, Common Lisp
Resume, CV, Contact: (see my bio)
Several postdocs in bioinformatics, familiar with many different bioinformatic pipelines, tons of teaching and workshop hosting experience, work well as liaison between informaticians and biologists/medics, full stack dev who has empowered many research groups with their own in-house analytical platforms and trained them in its use.
Too long? GNU-obsessed Data Analyst with matrix management skills and a strong focus on reproducible environments and teaching what he knows to others.
I got to meet David Potter and his journalist wife when I was working at the Royal Free Hospital. He funded the Potter Chair position which my prof Dr Kleta filled as a nephrologist for many years. I have a picture of myself holding a Nokia N900 and shaking his hand.
At the time I thought he was the reason that the phone existed at all, not quite knowing the delicate politics between Symbian and Maemo at the time.
Still he smiled amicably enough and it's a treasured photo of mine.
It worked for about an hour before having the nasty habit of attacking monsters, chasing them out into the wilderness where you'd check in on your character and find him dead, barren, and lost.
These days there are bots who hunt other bots. People make bots which kill "reventants" in the "revenant caves" for valuable loot, there were so many bots there that people made other bots to kill these bots and steal their loot from them.
Its almost a cool emergent ecosystem, except it sucks for us real players.
For those just wanting the blocklist, here is a table of malicious IP addresses, with columns of: address, number of ports tried, number of usernames tried.
I simply run fail2ban with a whole bunch of customer filters that will ban people very quickly. There's no need to request php or malformed urls when php is not used for example.
I used to run fail2ban, but I found it (or at least its defaults) ineffective against discouraging further requests. With iptables, you can specify the connection to hang for a period and then drop
Name: Mehmet
Location: UK or Germany
Work Preferences: Remote/Hybrid/Office
Technologies: R, Python, Javascript, C++, Common Lisp
Resume, CV, Contact: (see my bio)
Several postdocs in bioinformatics, familiar with many different bioinformatic pipelines, tons of teaching and workshop hosting experience, work well as liaison between informaticians and biologists/medics, full stack dev who has empowered many research groups with their own in-house analytical platforms and trained them in its use.
Too long? GNU-obsessed Data Analyst with matrix management skills and a strong focus on reproducible environments and teaching what he knows to others.
I think that would be me. Or anyone who would be interested in viewing this website. Would anyone not interested in this topic not want to ever see the differences?
Name: Mehmet
Location: UK or Germany
Work Preferences: Remote/Hybrid/Office
Technologies: R, Python, Javascript, C++, Common Lisp
Resume, CV, Contact: (see my bio)
Several postdocs in bioinformatics, familiar with many different bioinformatic pipelines, tons of teaching and workshop hosting experience, work well as liaison between informaticians and biologists/medics, full stack dev who has empowered many research groups with their own in-house analytical platforms and trained them in its use.
Too long? GNU-obsessed Data Analyst with matrix management skills and a strong focus on reproducible environments and teaching what he knows to others.
https://gitlab.com/mtekman/smithers.el/