Andrew E (@driftzzilla) 's Twitter Profile
Andrew E

@driftzzilla

Husband, Father, Network Engineer | Voice Platform Specialist | 🇺🇸 | Pro Free Speech. Tweets are my own.

ID: 26116433

calendar_today23-03-2009 23:11:08

1,1K Tweet

100 Followers

392 Following

Ihtesham Ali (@ihtesham2005) 's Twitter Profile Photo

This feels like cheating. People pay $30-$50 for custom city map posters on Etsy. Someone just open-sourced the exact same thing for free. It's called TerraInk. Its a cartographic poster engine built on OpenStreetMap data. Type a city. Customize everything. Download and

This feels like cheating.

People pay $30-$50 for custom city map posters on Etsy.

Someone just open-sourced the exact same thing for free.

It's called TerraInk.

Its a cartographic poster engine built on OpenStreetMap data.

Type a city. Customize everything. Download and
Jaynit (@jaynitx) 's Twitter Profile Photo

Conor Neill on the 3 best ways to start a speech (most people get this wrong): "I guarantee if you go to conferences, 19 out of 20 speakers will start in one of these ways: 'My name is Conor Neill. I'm from Tango, and this talk is about the latest trend in monitoring

Dr. Rodney McKay, Phd (@realrodneymckay) 's Twitter Profile Photo

🚨We just shipped something BIG: 🚨 Imagine having the CIA wall screen you've seen in movies: Introducing: CINEMA mode. A live spinning globe. Global events streaming to it. Pinned to exact coordinates. In real-time. Yes, you can have it....for FREE! Details in the🧵

Senhor Linguica Pro (@srlinguicavive) 's Twitter Profile Photo

Conseguiram rodar DOOM usando DNS kkkkkkkkkkkkkkkkkkkkkkk O game é comprimido em aproximadamente 1.964 registros DNS TXT em uma única zona do Cloudflare e o reproduz em tempo de execução usando apenas um script PowerShell e consultas DNS públicas.

Jaynit (@jaynitx) 's Twitter Profile Photo

In 2019, MIT professor Patrick Winston gave a legendary 1-hour lecture called “How to Speak.” It has 18M+ views for a reason. His frameworks: • Your ideas are like your children • The 5-minute rule for job talks • Why jokes fail at the start 15 lessons on communication:

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Google Threat Intelligence Group is tracking an active supply chain attack 🔎 North Korea-nexus actor UNC1069 compromised the "axios" NPM package (v1.14.1 & 0.30.4), deploying the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux. Learn more: bit.ly/3NZR3Zv

Google Threat Intelligence Group is tracking an active supply chain attack 🔎

North Korea-nexus actor UNC1069 compromised the "axios" NPM package (v1.14.1 & 0.30.4), deploying the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux.

Learn more: bit.ly/3NZR3Zv
Hedgie (@hedgiemarkets) 's Twitter Profile Photo

🦔The FBI issued a FLASH notice identifying 18 popular router models targeted in a large malware operation. Affected models include routers from D-Link, Netgear, TP-Link, and Zyxel. Attackers exploited known vulnerabilities to install malware called AVrecon, turning compromised

🦔The FBI issued a FLASH notice identifying 18 popular router models targeted in a large malware operation. Affected models include routers from D-Link, Netgear, TP-Link, and Zyxel. Attackers exploited known vulnerabilities to install malware called AVrecon, turning compromised
Latest in space (@latestinspace) 's Twitter Profile Photo

#NEWS 🚨: Artemis II crew experienced issues with Outlook this morning and had to ask ground crew for assistance "We have two Microsoft Outlooks and neither one is working"

#NEWS 🚨: Artemis II crew experienced issues with Outlook this morning and had to ask ground crew for assistance

"We have two Microsoft Outlooks and neither one is working"
Aakash Gupta (@aakashg0) 's Twitter Profile Photo

NASA pays $100M for Microsoft 365 licensing across the agency. They standardized every system on Microsoft. They put Microsoft Surfaces on the Orion spacecraft as the crew's personal computing devices. And the first technical crisis of humanity's return to the Moon was Reid

Bearly AI (@bearlyai) 's Twitter Profile Photo

Tey Bannerman counted up all the products and tools that Microsoft has named “Copilot”. Found 78 of them: “there are now Copilots inside Copilots, Copilots for other Copilots, and a physical Copilot key on your keyboard for summoning them.”

Tey Bannerman counted up all the products and tools that Microsoft has named “Copilot”. 

Found 78 of them: “there are now Copilots inside Copilots, Copilots for other Copilots, and a physical Copilot key on your keyboard for summoning them.”
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

🖥️🔥 Two inmates at an Ohio prison built a secret hacking operation from behind bars, using computers they were supposed to be recycling, they downloaded and sold porn in return for snacks, built a hacker toolkit with Kali Linux and password crackers, and created fake passes to

🖥️🔥 Two inmates at an Ohio prison built a secret hacking operation from behind bars, using computers they were supposed to be recycling, they downloaded and sold porn in return for snacks, built a hacker toolkit with Kali Linux and password crackers, and created fake passes to