Twitter | Search | |
techvicky
Sharing my passions || Senior SysAdmin (Linux/UNIX) || LinkedIN || Likes Linux, CyberSecurity & Open Source ||
915
Tweets
551
Following
74
Followers
Tweets
techvicky Nov 11
How is machine learning used in cyber security?
Reply Retweet Like
techvicky Nov 11
The Real Security Benefits You Can Get From Threat Intelligence
Reply Retweet Like
techvicky Nov 11
Using the Power of Deep Learning for Cyber Security
Reply Retweet Like
techvicky Nov 11
A guide to Machine Learning for Application Security
Reply Retweet Like
techvicky Nov 9
Apache2: Logging To A MySQL Database With mod_log_sql (Debian Etch)
Reply Retweet Like
techvicky Nov 9
Importing Apache (httpd) logs into MySQL
Reply Retweet Like
techvicky Nov 2
50 Logo Fonts Every Designer Should Know About
Reply Retweet Like
techvicky Oct 26
Hardware security module
Reply Retweet Like
techvicky Oct 26
Understanding Hardware Security Modules (HSMs)
Reply Retweet Like
techvicky Oct 26
MySQL Enterprise Transparent Data Encryption (TDE)
Reply Retweet Like
techvicky Oct 26
Linux server performance: Is disk I/O slowing your application?
Reply Retweet Like
techvicky Oct 26
***Nine traits of the veteran Unix admin*** Follow this field guide if you want to understand the rare and elusive hard-core Unix geek
Reply Retweet Like
techvicky Oct 26
Linux Standards and Best Practices
Reply Retweet Like
techvicky Oct 19
w3af is a Web Application Attack and Audit Framework.
Reply Retweet Like
techvicky Oct 19
Reply Retweet Like
techvicky Oct 19
WHAT IS A WEBSITE AUDIT
Reply Retweet Like
techvicky Oct 19
Dr. Memory - system call tracing tool for Windows, or " for Windows", called drstrace. It uses the Dr. Memory Framework to monitor all system calls executed by a target application and record a trace of those calls along with their arguments.
Reply Retweet Like
techvicky Oct 19
Setup GitLab on Debian 7 with existing Apache WebServer
Reply Retweet Like
techvicky Oct 13
Web Application Firewall () Evasion Techniques
Reply Retweet Like
techvicky Oct 9
“Is there a difference between cybersecurity and information security?”
Reply Retweet Like