Twitter | Search | |
techvicky
Sharing my passions || Senior SysAdmin (Linux) || LinkedIN || Likes Linux, CyberSecurity & Open Source ||
942
Tweets
559
Following
75
Followers
Tweets
techvicky Aug 17
IPS or WAF Dilemma => The best security implementation will likely involve both an IPS and a WAF
Reply Retweet Like
techvicky Aug 15
stealth - Stealthy File Integrity Scanner
Reply Retweet Like
techvicky Aug 15
Hiding Linux processes for fun + profit
Reply Retweet Like
techvicky Aug 15
6 Best Host-based Intrusion Detection Systems (HIDS) in 2019
Reply Retweet Like
techvicky Aug 13
Scan your network’s internet traffic with Squid and ClamAV on PfSense 2.4
Reply Retweet Like
techvicky Aug 6
All Data Breaches in 2019 – An Alarming Timeline
Reply Retweet Like
techvicky Aug 6
Data Loss Prevention (DLP)
Reply Retweet Like
techvicky Aug 6
6 Threats to Web Application Security & How to Avoid It
Reply Retweet Like
techvicky Aug 6
Remote File Inclusion (RFI) Vulnerability
Reply Retweet Like
techvicky Aug 3
Blockchain Security Interesting video on blockchain
Reply Retweet Like
techvicky Jul 29
6 TIPS FOR BETTER DATA BACKUP AND FASTER RECOVERY
Reply Retweet Like
techvicky Jul 17
Preparation Guide for Microsoft AZ-500 Microsoft Technologies Certification
Reply Retweet Like
techvicky Mar 31
What Is Blockchain? A Simple Explanation in Easy Terms
Reply Retweet Like
techvicky Dec 15
: The Internet Scanner
Reply Retweet Like
techvicky Dec 7
Reply Retweet Like
techvicky Dec 5
Reply Retweet Like
techvicky Dec 4
IDS+File Integrity :: How to Check Integrity of File and Directory Using “AIDE” in Linux
Reply Retweet Like
techvicky Nov 23
centos 7 : gnome make icons smaller
Reply Retweet Like
techvicky Nov 23
centos7+virtualbox: "this system is currently not set up to build kernel modules" SOLUTION :
Reply Retweet Like
techvicky Nov 20
Reply Retweet Like