โค

iEmoji Feeds @๐‘บ๐’†๐’„๐’–๐’“๐’Š๐’•๐’š๐‘ฎ๐’–๐’Š๐’๐’ [Shield]๏ธ[Globe with Meridians] (SecurityGuill)

1.

SecurityGuill
You have already heard about the Cross-Site Scripting (XSS) attack but you don't know what it is?

I made anโ€ฆ twitter.com/i/web/status/1โ€ฆ
14 Dec 22 copy & paste +upvote -downvote You have already heard about the Cross-Site Scripting (XSS) attack but you don't know what it is? ๐Ÿ”“ I made anโ€ฆ https://t.co/RDlBfU80U1

2.

SecurityGuill
"Kerberos", is one of the most used network authentication protocols, which is based on a ticket mechanism

I madโ€ฆ twitter.com/i/web/status/1โ€ฆ
15 Jun 22 copy & paste +upvote -downvote "Kerberos", is one of the most used network authentication protocols, which is based on a ticket mechanism๐ŸŽซ๐Ÿ” I madโ€ฆ https://t.co/QWinhWgt1O
3.
SecurityGuill
The MITRE ATT&CK framework is a knowledge base on the different tactics (reconnaissance, exploitation, defense evโ€ฆ twitter.com/i/web/status/1โ€ฆ
08 Jun 22 copy & paste +upvote -downvote The MITRE ATT&CK framework is a knowledge base ๐Ÿ“š on the different tactics (reconnaissance, exploitation, defense evโ€ฆ https://t.co/7SKHV7W9cG
4.
SecurityGuill
Many applications use End-to-End encryption
It is an effective way to provide a layer of security between exchanโ€ฆ twitter.com/i/web/status/1โ€ฆ
30 May 22 copy & paste +upvote -downvote Many applications use End-to-End encryption ๐Ÿ”‘ It is an effective way to provide a layer of security between exchanโ€ฆ https://t.co/krCrUA3CcP
5.
SecurityGuill
The OWASP Top 10 is a powerful awareness document for web application #security.
It represents a broad consensusโ€ฆ twitter.com/i/web/status/1โ€ฆ
11 May 22 copy & paste +upvote -downvote The OWASP Top 10 is a powerful awareness document for web application #security. ๐Ÿ’ก It represents a broad consensusโ€ฆ https://t.co/2n3x0ipj9R
6.
SecurityGuill
You might be wondering why your personal data is a target for attackers?

For the most part, they are sold on thโ€ฆ twitter.com/i/web/status/1โ€ฆ
09 May 22 copy & paste +upvote -downvote You might be wondering why your personal data is a target ๐ŸŽฏfor attackers? ๐Ÿ’ณ For the most part, they are sold on thโ€ฆ https://t.co/0BOsZeQUco
7.
SecurityGuill
There are several ways to protect data that travels over a network

I made an #infographic that presents two waysโ€ฆ twitter.com/i/web/status/1โ€ฆ
08 Apr 21 copy & paste +upvote -downvote There are several ways to protect data that travels over a network ๐Ÿ” I made an #infographic that presents two waysโ€ฆ https://t.co/ClKkilUF3t
8.
SecurityGuill
Do you know what is a Honeypot ?

I made an #infographic that quickly presents this #technology

Follow me โ€ฆ twitter.com/i/web/status/1โ€ฆ
31 Mar 21 copy & paste +upvote -downvote Do you know what is a Honeypot ๐Ÿฏ ? I made an #infographic that quickly presents this #technology ๐Ÿ“– Follow me โžก๏ธโ€ฆ https://t.co/EM2cZW0XrF
9.
SecurityGuill
You have already heard that you should not connect to free or unknown Wireless point but you don't know why?

I mโ€ฆ twitter.com/i/web/status/1โ€ฆ
23 Dec 20 copy & paste +upvote -downvote You have already heard that you should not connect to free or unknown Wireless point ๐Ÿ“ถ but you don't know why? I mโ€ฆ https://t.co/hozigZCtSr

...but wait! There's more!

1.

fakhright
fakhright @fakhright
astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat*
14 Jan 13 copy & paste +upvote -downvote astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat* ๐Ÿ™ˆ๐Ÿ™ˆ๐Ÿ™Š
https://www.iemoji.com/feed/SecurityGuill
Back to top