ComProfessor (@itscomprofessor) 's Twitter Profile
ComProfessor

@itscomprofessor

JavaScript, React, Python

ID: 1417344923666370567

calendar_today20-07-2021 04:45:49

14,14K Tweet

189 Followers

144 Following

mwamuziscode (@mwamuziscode) 's Twitter Profile Photo

This Cisco Packet Tracer networking simulation tool is an invaluable resource for understanding complex network protocols. If you're interested in networking, I highly recommend giving it a try. Feel free to connect if you'd like to share experiences or tips! #CiscoPacketTracer

This Cisco Packet Tracer networking simulation tool is an invaluable resource for understanding complex network protocols. If you're interested in networking, I highly recommend giving it a try. Feel free to connect if you'd like to share experiences or tips! #CiscoPacketTracer
Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

EXPLOITING PRINTERS. A new printer security testing tool called PRET uses a network or USB connection to connect to a device and makes use of a specific printer language's features. The majority of laser printers speak PostScript, PJL, and PCL, which are now supported. This

EXPLOITING PRINTERS. 

  A new printer security testing tool called PRET uses a network or USB connection to connect to a device and makes use of a specific printer language's features. The majority of laser printers speak PostScript, PJL, and PCL, which are now supported. 
This
Pratham (@prathkum) 's Twitter Profile Photo

Today I Learned! useOptimistic React Hook lets you show a different UI before a background operation, like a network request, completes. Don't use it in production as it's still in the experimental phase. But a great React feature is incoming. react.dev/reference/reac…

Today I Learned! 

useOptimistic React Hook lets you show a different UI before a background operation, like a network request, completes.

Don't use it in production as it's still in the experimental phase. But a great React feature is incoming. 

react.dev/reference/reac…
Communications Authority of Kenya (CA) (@ca_kenya) 's Twitter Profile Photo

One key feature of the 'masts' deployed to provide mobile network services through the Universal Service Fund is the provision of charging ports for residents of beneficiary areas, which are disadvantaged from lack of connectivity to the national grid. #LeavingNoOneBehind

Kevin | Network Engineer (@adjacentnode) 's Twitter Profile Photo

This is one of my favorite Cisco commands that has saved me so much time. You can remotely test an ethernet cable to see if there is a physical issue with it or not. Saving myself having to go on-site and check the cable manually.

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

Hardwares used in offensive security: A thread 1. Flipper Zero: The Flipper Zero is a portable multi-tool device designed for pentesters and hardware enthusiasts. It can interact with various types of systems, such as RFID, infrared devices, and GPIO pins. With its customizable

Hardwares used in offensive security:
A thread 

1. Flipper Zero: The Flipper Zero is a portable multi-tool device designed for pentesters and hardware enthusiasts. It can interact with various types of systems, such as RFID, infrared devices, and GPIO pins. With its customizable
Agina Sualeze (@agina_devnet) 's Twitter Profile Photo

I was given this babies to handle with care. This would give me the opportunity to learn for the period of time its with me n would be giving updates on my learning. Who said little steps don't count? I'm definitely getting there. Network and automation is my story.

I was given this babies to handle with care.  This would give me the opportunity to learn for the period of time its with me n would be giving updates on my learning. 

Who said little steps don't count? 
I'm definitely getting there.  Network and automation is my story.
Agina Sualeze (@agina_devnet) 's Twitter Profile Photo

As a network engineer, I'm always eager to tackle complex challenges. Due to my previous post on how I factory reset a 2911 router, Recently, I was tasked with fixing a set of routers that were causing network disruptions. This Cisco vpn router is different from 2911 that got

As a network engineer, I'm always eager to tackle complex challenges. Due to my previous post on how I factory reset a 2911 router, Recently, I was tasked with fixing a set of routers that were causing network disruptions.

This Cisco vpn router is different from 2911 that got
Kenya CyberSecurity & Forensics Association: KCSFA (@kcsfa) 's Twitter Profile Photo

Open source security for SME: Snort 🐷 Intrusion Detection System (IDS) Why its very effective: 1. Highly configurable 2. Rich resources for learning 3. No vendor lock in 4. Easily integrate with other tools 5. Dependable to pick threats on a network 6. Customizable reports

Open source security for SME:

<a href="/snort/">Snort 🐷</a> Intrusion Detection System (IDS)

Why its very effective:
1. Highly configurable
2. Rich resources for learning
3. No vendor lock in
4. Easily integrate with other tools 
5. Dependable to pick threats on a network
6. Customizable reports
Construction Today Kenya🇰🇪 (@constafrica) 's Twitter Profile Photo

🇰🇪 Innovative Bundled Fibre Trunks Make Debut Siemon, a prominent company in network infrastructure solutions, is proud to announce the launch of its new bundled fibre trunks. Designed to streamline fibre optic network installations and reduce deployment time, these fibre

🇰🇪 Innovative Bundled Fibre Trunks Make Debut

Siemon, a prominent company in network infrastructure solutions, is proud to announce the launch of its new bundled fibre trunks.

Designed to streamline fibre optic network installations and reduce deployment time, these fibre
iColo: A Digital Realty Company (@icoloio) 's Twitter Profile Photo

A Content Delivery Network (CDN) is a global network of servers that improves the speed, reliability, and security of delivering web content to users.

A Content Delivery Network (CDN) is a global network of servers that improves the speed, reliability, and security of delivering web content to users.
Communications Authority of Kenya (CA) (@ca_kenya) 's Twitter Profile Photo

The CA Board of Directors and Management has today visited the Rukanga sub-location of Taita Taveta County which has been connected to mobile network services through the Universal Service Fund (USF), a Fund managed by the Authority to avail communications services...1/2

The CA Board of Directors and Management has today visited the Rukanga sub-location of <a href="/taitatavetagovt/">Taita Taveta County</a> which has been connected to mobile network services through the Universal Service Fund (USF), a Fund managed by the Authority to avail communications services...1/2
Mohit Mishra (@chessman786) 's Twitter Profile Photo

9 different C Projects 2025 You will learn to master the art of pointers, function pointers, advanced function-based macros, network protocols, linked lists and how to write your own libraries without dependencies. This collection is a must for both (almost) beginners and

9 different C Projects 2025
You will learn to master the art of pointers, function pointers, advanced function-based macros, network protocols, linked lists and how to write your own libraries without dependencies. This collection is a must for both (almost) beginners and
iColo: A Digital Realty Company (@icoloio) 's Twitter Profile Photo

We are delighted to welcome Rain Communications Limited to iColo MBA1. ▫️IP Transit ▫️Wholesale Network Services ▫️Data Transport

We are delighted to welcome Rain Communications Limited to iColo MBA1.
▫️IP Transit
▫️Wholesale Network Services
▫️Data Transport
Security Trybe (@securitytrybe) 's Twitter Profile Photo

6. LAN Turtle: The LAN Turtle by Hak5 is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.

6.  LAN Turtle:

The LAN Turtle by Hak5 is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.
iColo: A Digital Realty Company (@icoloio) 's Twitter Profile Photo

A load balancer is like traffic control for your applications. It distributes incoming network or application traffic across multiple servers to ensure no single server gets overwhelmed — keeping systems fast, reliable, and always available.

A load balancer is like traffic control for your applications. It distributes incoming network or application traffic across multiple servers to ensure no single server gets overwhelmed — keeping systems fast, reliable, and always available.