Zak Emerick (@zemerick) 's Twitter Profile
Zak Emerick

@zemerick

Network Engineer || Sys Admin ---------------------------------
ACSP || ACEX #137 || ACDX #1481 || ACMX #1384 || ACCX #1239 || CWNA || CWSP

ID: 35363016

linkhttps://www.emerickcc.com calendar_today26-04-2009 01:17:48

5,5K Tweet

84 Followers

142 Following

Owen Williams ⚡ (@ow) 's Twitter Profile Photo

Microsoft: our AI can summarize meetings, write code for you and organize your calendar Apple: this year Siri can set TWO timers AT THE SAME TIME!

Sundar Pichai (@sundarpichai) 's Twitter Profile Photo

We've started rolling out support for passkeys that let users sign in to our products with a fingerprint, a face scan or a screen lock PIN. Starting today, this will be available as an option for Google Account users. blog.google/technology/saf…

Ariel Helwani (@arielhelwani) 's Twitter Profile Photo

Flying back home after a whirlwind 24 hours (we got a show to do tomorrow, damnit), and I just wanna express this: I first became aware of Nathan Diaz in 2006. “Nick’s brother is a fighter too?!,” I recall thinking. “That’s pretty damn cool.” To see how far he’s come, how he’s

Have I Been Pwned (@haveibeenpwned) 's Twitter Profile Photo

New breach: Horse Isle had 28k unique email addresses breached in 2020 - twice. Data included IP address, name, gender, purchases and plain text password, including failed password attempts, also in plain text. 77% were already in Have I Been Pwned. More: hi1.horseisle.com/web/news.php

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has uncovered a vulnerability in ESXi hypervisors, identified as CVE-2024-37085, being exploited by threat actors to obtain full administrative permissions on domain-joined ESXi hypervisors and encrypt critical servers in ransomware attacks. msft.it/6012lbTai

SpaceX (@spacex) 's Twitter Profile Photo

For nearly two years, SpaceX has voiced its concerns with the FAA’s inability to keep pace with the commercial spaceflight industry. It is clear that the Agency lacks the resources to timely review licensing materials, but also focuses its limited resources on areas unrelated to

For nearly two years, SpaceX has voiced its concerns with the FAA’s inability to keep pace with the commercial spaceflight industry. It is clear that the Agency lacks the resources to timely review licensing materials, but also focuses its limited resources on areas unrelated to
Sawyer Merritt (@sawyermerritt) 's Twitter Profile Photo

Tesla's Cybertruck is the only profitable EV pickup truck being made today, despite production starting less than a year ago. • Hummer EV: In production for 3 years, still not profitable. • Rivian R1T: In production for 3 years, still not profitable. • Ford F-150 Lightning:

Tesla's Cybertruck is the only profitable EV pickup truck being made today, despite production starting less than a year ago.

• Hummer EV: In production for 3 years, still not profitable.
• Rivian R1T: In production for 3 years, still not profitable.
• Ford F-150 Lightning:
Zak Emerick (@zemerick) 's Twitter Profile Photo

I'm confused on why I'm seeing all of the positive reviews on FSD 13.2.1. It still cuts left hand turns trying to crash into cars sitting there. I'm currently parked at 45 degrees in a parking lot in pulled me into. Being able to adjust cruise max speed is nice, though. AI4 CT

Elon Musk (@elonmusk) 's Twitter Profile Photo

Yes. Please be careful in some areas, as there is non-zero risk of armed looters. Cybertruck side panels are bulletproof to subsonic projectiles (handguns, shotgun & Tommy gun), but the glass is not, so make sure to duck if you see anyone wielding a gun. This is not fiction.

Meccanica (@dictionaryhill) 's Twitter Profile Photo

Holy shit, when the Tesla Cybertruck enters the chat 🤣🤣🤣 Ford vs. Chevy Vs. Ram Vs Toyota Vs Honda ———- Link to video on the other platform please give them credit or tag them if they exist on 𝕏 ⤵️ facebook.com/reel/770332428…

John Hammond (@_johnhammond) 's Twitter Profile Photo

A threat actor installed Huntress. ... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... Hilarious goldmine of cybercrime deets with a front row seat:

A threat actor installed Huntress.

... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... 

Hilarious goldmine of cybercrime deets with a front row seat: