[Tool] AI tools that can be installed and used on personal computers: Chat With RTX
However, when using this tool, I found that although it learned a lot of information, it could only reference information from one piece of material each time it answered questions, and could not generate answers based on all the materials it had learned. Moreover, all files must be placed in one folder for machine learning use, making it inconvenient to manage various different knowledge.
Today, I will introduce a method that allows AI to generate answers by referencing multiple pieces of material: building a personal knowledge base using ollama, docker, and Anything LLM.
Ollama supports starting and running Llama 2, Mistral, Gemma, and other large language models on local computers. It supports macOS, Windows, and Linux operating systems. Currently, there are 70 various large models available on the official website. However, ollama needs to be run in the command line interface, which is not very convenient.Therefore, it is necessary to use docker to provide a running container for ollama.
2.docker
Official Website: https://hub.docker.com/
Docker Desktop is a ready-to-use containerization software that provides a powerful hybrid toolkit for building, sharing, and running applications anywhere. Docker also supports macOS, Windows, and Linux operating systems.
Official Website: https://useanything.com/
A multi-user ChatGPT suitable for any large model and vector database. You can establish multiple workspaces, making it easy for users to categorize and manage different knowledge.
4.Running Examples:
1. Ask in English: What is OSINT?
Answer:OSINT stands for Open Source Intelligence, which refers to the collection and analysis of information from public resources such as the internet, newspapers, books, and other open sources. The goal of OSINT is to collect and analyze information to produce useful intelligence for security experts, national intelligence agencies, or cybercriminals.
OSINT involves using various search engines, tools, and frameworks to navigate the vast landscape of open resources and extract relevant information. The process typically includes identifying and analyzing patterns, trends, and anomalies in the data to draw meaningful conclusions.
-
Social Media Intelligence: Analyzing social media platforms like Twitter, Facebook, and Instagram to gather information that can support specific needs or operations.
-
Email Intelligence: Extracting information from email addresses, subject lines, and content to identify patterns and trends.
-
Phone Number Intelligence: Tracking phone numbers to determine ownership, location, and usage.
-
VoIP Number Tracking: Identifying the owners and locations of VoIP (Voice over Internet Protocol) numbers.
-
Digital Investigation: Conducting in-depth analysis of digital evidence to support criminal or security investigations.
It is worth noting that OSINT is different from closed-source intelligence, which refers to information that is not publicly available and requires authorization or permission to access.
References from four documents: osint-2afa70e.pdf, Open Source Intelligence (OSINT).pdf, Current Status and Security Trends of Open Source Intelligence.pdf, Current Status and Security Trends of OSINT.pdf
2. Ask in Chinese: 什么是OSINT?
OSINT involves using various search engines, tools, and frameworks to navigate the vast landscape of open resources and extract relevant information. The process typically includes identifying and analyzing patterns, trends, and anomalies in the data to draw meaningful conclusions.
-
Social Media Intelligence: Analyzing social media platforms like Twitter, Facebook, and Instagram to gather information that can support specific needs or operations.
-
Email Intelligence: Extracting information from email addresses, subject lines, and content to identify patterns and trends.
-
Phone Number Intelligence: Tracking phone numbers to determine ownership, location, and usage.
-
VoIP Number Tracking: Identifying the owners and locations of VoIP (Voice over Internet Protocol) numbers.
-
Digital Investigation: Conducting in-depth analysis of digital evidence to support criminal or security investigations.
It is worth noting that OSINT is different from closed-source intelligence, which refers to information that is not publicly available and requires authorization or permission to access.
References from four documents: Analysis of Advantageous Technological Fields Based on Multi-dimensional Patent Indicators…Research-.pdf, OpenSource Intelligence and Its Applications.pdf, OpenSource Intelligence and OSINT Applications.pdf, Development and Implications of EU Counter-terrorism Policy in the Context of Globalization-.pdf
3. Ask in English: How is Open Source Intelligence Applied to Counter-terrorism?
Answer:OSINT (Open Source Intelligence) can be used against everyone.
In the context of counter-terrorism, OSINT can play a key role in identifying and disrupting terrorist activities. Here are some ways OSINT can be applied to counter-terrorism:
1. Social Media Monitoring: Terrorist organizations often use social media platforms to spread propaganda, recruit new members, and coordinate attacks. OSINT can be used to monitor social media accounts, identify key influencers, and track the dissemination of terrorist ideologies.
2. News Article Analysis: News articles can provide valuable insights into the activities of terrorist organizations. By analyzing news articles from different sources, OSINT can help identify trends, patterns, and potential threats.
3. Publicly Available Datasets: There are various publicly available datasets that can be used for OSINT analysis in a counter-terrorism context. Examples include databases of terrorist incidents, crime statistics, and demographic data.
4. Open Source Intelligence Platforms: Several open source intelligence platforms are available for analyzing OSINT data. These platforms often provide tools for data collection, storage, and analysis.
5. Threat Identification: By analyzing OSINT data, potential threats and trends related to terrorism can be identified. This can help counter-terrorism agencies prioritize their efforts and resources more effectively.
6. Counter-narratives: Terrorist organizations often use social media to spread propaganda and recruit new members. OSINT can be used to develop counter-narratives that challenge the ideologies of terrorist organizations and diminish their appeal.
7. Network Analysis: By analyzing the relationships between individuals and groups, OSINT can help identify key figures in terrorist networks and disrupt their operations.
8. Location-based Intelligence: By analyzing location-based data, such as phone records or social media check-ins, OSINT can help identify potential terrorist targets and monitor their security.
9. Incident Response: During a terrorist event, OSINT can be used to quickly gather information and provide situational awareness for first responders and decision-makers.
10. Community Engagement: OSINT can be used to engage with local communities and gather intelligence on potential terrorist threats. This helps build trust and cooperation between law enforcement and the public.
In summary, OSINT can play a key role in counter-terrorism efforts, providing valuable insights into terrorist activities, identifying potential threats, and helping to disrupt terrorist networks.
References from four documents: Threat Analysis Techniques and Tools Based on OSINT.pdf, Current Status and Security Trends of OSINT.pdf, Current Status and Security Trends of Open Source Intelligence.pdf, 2014-OSINT-2ool-Ki…aft.pdf