Twitter | Search | |
techvicky
Sharing my passions || Senior SysAdmin (Linux/UNIX) || LinkedIN || Likes Linux, CyberSecurity & Open Source ||
930
Tweets
561
Following
76
Followers
Tweets
techvicky Mar 31
What Is Blockchain? A Simple Explanation in Easy Terms
Reply Retweet Like
techvicky Dec 15
: The Internet Scanner
Reply Retweet Like
techvicky Dec 7
Reply Retweet Like
techvicky Dec 5
Reply Retweet Like
techvicky Dec 4
IDS+File Integrity :: How to Check Integrity of File and Directory Using “AIDE” in Linux
Reply Retweet Like
techvicky Nov 23
centos 7 : gnome make icons smaller
Reply Retweet Like
techvicky Nov 23
centos7+virtualbox: "this system is currently not set up to build kernel modules" SOLUTION :
Reply Retweet Like
techvicky Nov 20
Reply Retweet Like
techvicky Nov 17
How to Keep Your Windows PC and Apps Up to Date
Reply Retweet Like
techvicky Nov 17
AWS to Azure services comparison
Reply Retweet Like
techvicky Nov 17
The Beginner's Guide to Cloud Security: Security in the cloud is much like security in your on-premises data centers - only without the costs of maintaining facilities and hardware.
Reply Retweet Like
techvicky Nov 17
51 AWS Security Best Practices
Reply Retweet Like
techvicky Nov 17
Cloud Data Loss Prevention
Reply Retweet Like
techvicky Nov 17
What is BGP Hijacking, Anyway?
Reply Retweet Like
techvicky Nov 17
4 POPULAR MISCONCEPTIONS ABOUT PENETRATION TESTING – BENT AND BROKEN!
Reply Retweet Like
techvicky Nov 11
How is machine learning used in cyber security?
Reply Retweet Like
techvicky Nov 11
The Real Security Benefits You Can Get From Threat Intelligence
Reply Retweet Like
techvicky Nov 11
Using the Power of Deep Learning for Cyber Security
Reply Retweet Like
techvicky Nov 11
A guide to Machine Learning for Application Security
Reply Retweet Like
techvicky Nov 9
Apache2: Logging To A MySQL Database With mod_log_sql (Debian Etch)
Reply Retweet Like