iEmoji Feeds @๐บ๐๐๐๐๐๐๐๐ฎ๐๐๐๐ [Shield]๏ธ[Globe with Meridians] (SecurityGuill)
1.
You have already heard about the Cross-Site Scripting (XSS) attack but you don't know what it is?
I made anโฆ twitter.com/i/web/status/1โฆ
I made anโฆ twitter.com/i/web/status/1โฆ
14 Dec 22
copy & paste +upvote -downvote You have already heard about the Cross-Site Scripting (XSS) attack but you don't know what it is? ๐
I made anโฆ https://t.co/RDlBfU80U1
2.
"Kerberos", is one of the most used network authentication protocols, which is based on a ticket mechanism
I madโฆ twitter.com/i/web/status/1โฆ
I madโฆ twitter.com/i/web/status/1โฆ
15 Jun 22
copy & paste +upvote -downvote "Kerberos", is one of the most used network authentication protocols, which is based on a ticket mechanism๐ซ๐
I madโฆ https://t.co/QWinhWgt1O
3.
4.
5.
6.
7.
The MITRE ATT&CK framework is a knowledge base on the different tactics (reconnaissance, exploitation, defense evโฆ twitter.com/i/web/status/1โฆ
08 Jun 22
copy & paste +upvote -downvote The MITRE ATT&CK framework is a knowledge base ๐ on the different tactics (reconnaissance, exploitation, defense evโฆ https://t.co/7SKHV7W9cG
Many applications use End-to-End encryption
It is an effective way to provide a layer of security between exchanโฆ twitter.com/i/web/status/1โฆ
It is an effective way to provide a layer of security between exchanโฆ twitter.com/i/web/status/1โฆ
30 May 22
copy & paste +upvote -downvote Many applications use End-to-End encryption ๐
It is an effective way to provide a layer of security between exchanโฆ https://t.co/krCrUA3CcP
The OWASP Top 10 is a powerful awareness document for web application #security.
It represents a broad consensusโฆ twitter.com/i/web/status/1โฆ
It represents a broad consensusโฆ twitter.com/i/web/status/1โฆ
11 May 22
copy & paste +upvote -downvote The OWASP Top 10 is a powerful awareness document for web application #security. ๐ก
It represents a broad consensusโฆ https://t.co/2n3x0ipj9R
You might be wondering why your personal data is a target for attackers?
For the most part, they are sold on thโฆ twitter.com/i/web/status/1โฆ
For the most part, they are sold on thโฆ twitter.com/i/web/status/1โฆ
09 May 22
copy & paste +upvote -downvote You might be wondering why your personal data is a target ๐ฏfor attackers? ๐ณ
For the most part, they are sold on thโฆ https://t.co/0BOsZeQUco
SecurityGuill ๐ก๏ธ๐
@SecurityGuill
There are several ways to protect data that travels over a network
I made an #infographic that presents two waysโฆ twitter.com/i/web/status/1โฆ
I made an #infographic that presents two waysโฆ twitter.com/i/web/status/1โฆ
08 Apr 21
copy & paste +upvote -downvote There are several ways to protect data that travels over a network ๐
I made an #infographic that presents two waysโฆ https://t.co/ClKkilUF3t
8.
9.
SecurityGuill ๐ก๏ธ๐
@SecurityGuill
Do you know what is a Honeypot ?
I made an #infographic that quickly presents this #technology
Follow me โฆ twitter.com/i/web/status/1โฆ
I made an #infographic that quickly presents this #technology
Follow me โฆ twitter.com/i/web/status/1โฆ
31 Mar 21
copy & paste +upvote -downvote Do you know what is a Honeypot ๐ฏ ?
I made an #infographic that quickly presents this #technology ๐
Follow me โก๏ธโฆ https://t.co/EM2cZW0XrF
SecurityGuill ๐ก๏ธ๐
@SecurityGuill
You have already heard that you should not connect to free or unknown Wireless point but you don't know why?
I mโฆ twitter.com/i/web/status/1โฆ
I mโฆ twitter.com/i/web/status/1โฆ
23 Dec 20
copy & paste +upvote -downvote You have already heard that you should not connect to free or unknown Wireless point ๐ถ but you don't know why?
I mโฆ https://t.co/hozigZCtSr
...but wait! There's more!
1.
fakhright
@fakhright
astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat*
14 Jan 13
copy & paste +upvote -downvote astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat* ๐๐๐