Jonathan Creasy 🧢 (@johann8384) 's Twitter Profile
Jonathan Creasy 🧢

@johann8384

Loves technology and data, volunteer firefighter. Machine Learning at Cisco, Disaster Relief with ITDRC, KC9FQT, Oldham County KY ARES EC

ID: 118937716

linkhttp://www.ghostlab.net calendar_today02-03-2010 04:44:52

5,5K Tweet

336 Takipçi

1,1K Takip Edilen

Christopher Hebert (@chebert13) 's Twitter Profile Photo

Merry Christmas peeps! Driving this sleigh for the next 24 hours... if shit goes down, feel free to call for me. #MakingBubbles #DCFD #Foam2 😂😂

Merry Christmas peeps! Driving this sleigh for the next 24 hours... if shit goes down, feel free to call for me. #MakingBubbles #DCFD #Foam2 😂😂
ITDRC (@itdrc) 's Twitter Profile Photo

Caring for injured and recovered animals after the Kentucky tornado falls to the Mayfield-Graves County Animal Shelter where ITDRC and T-Mobile are providing temporary connectivity and phone service to enable staff and volunteers to search for pet owners. #CommIsAid

Caring for injured and recovered animals after the Kentucky tornado falls to the Mayfield-Graves County Animal Shelter where ITDRC and <a href="/TMobile/">T-Mobile</a> are providing temporary connectivity and phone service to enable staff and volunteers to search for pet owners. #CommIsAid
ITDRC (@itdrc) 's Twitter Profile Photo

In Kentucky, our teams responded to a request from KY State Police to provide connectivity to local gas stations who were unable to process credit card transactions after the #MayfieldTornado #CommIsAid

In Kentucky, our teams responded to a request from <a href="/kystatepolice/">KY State Police</a> to provide connectivity to local gas stations who were unable to process credit card transactions after the #MayfieldTornado #CommIsAid
ITDRC (@itdrc) 's Twitter Profile Photo

We are constantly evaluating new options to keep pace with service expectations. CBRS, also known as “private LTE”, utilizes newly available spectrum to distribute connectivity in the same way cell phone carriers operate. Increasing our coverage area with less equipment.

We are constantly evaluating new options to keep pace with service expectations. CBRS, also known as “private LTE”, utilizes newly available spectrum to distribute connectivity in the same way cell phone carriers operate. Increasing our coverage area with less equipment.
Marti Calhoun (@morticity) 's Twitter Profile Photo

The painting urge has been fierce lately and tonight I gave in. Hurricane Laura as seen from the LCH radar at 5:33Z on 8/27/20. One of the final scans made before the radar failed.

The painting urge has been fierce lately and tonight I gave in. Hurricane Laura as seen from the LCH radar at 5:33Z on 8/27/20. One of the final scans made before the radar failed.
Tanya Janca | Shehackspurple (@shehackspurple) 's Twitter Profile Photo

A thread 🧵 on why we use source control. Years ago I went to fix a bug on someone else's classic ASP app (he was away). When I ran the app locally it looked completely different than what I saw in prod. I quickly realized the copy in source control was 3 years out of date

Annalee (@leeflower) 's Twitter Profile Photo

I had a conversation the other day with someone who thought "soap is mechanical" meant it doesn't actually kill germs and just wipes them away. Soap kills germs. It just does so mechanically, with crowbar-shaped molecules that pry open germs and spill their viscera.

Dray Agha (@purp1ew0lf) 's Twitter Profile Photo

Let's quickly look at how Defenders can benefit from tools like Chainsaw, Sigma, docs from KAPE & Velociraptor, and Security Onion 🕵️‍♂️ We'll use real, shady data - fresh out the kitchen 🧑‍🍳 Along the way, I'll share some tips and shortcuts to cut faster through data and logs 🧵

Mick Douglas 🇺🇦🌻 (@bettersafetynet) 's Twitter Profile Photo

I've had 3 calls so far today (it's not even 10) about defending against Russian cyber ops I'm tired of having the same call... so... here's what I've told everyone. This is the playbook you need... but it's not going to be what you think it will be. Ready? Lets go! 1

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I really wonder why everyone focuses on the wiper - the component that appears on a system in the final step of the attack Where's that web shell? What about the numerous other detection opportunities?

I really wonder why everyone focuses on the wiper - the component that appears on a system in the final step of the attack

Where's that web shell? 
What about the numerous other detection opportunities?
ippsec (@ippsec) 's Twitter Profile Photo

Ever come across a file running on a Linux box that was deleted from the disk? Did you know you can likely use DD to recover the file without any non-standard tools?

Ever come across a file running on a Linux box that was deleted from the disk? Did you know you can likely use DD to recover the file without any non-standard tools?
Louisville Ledgehogs (@ledgehogs) 's Twitter Profile Photo

Retweet to help this sweet girl find her camera from last night's match. Link to her Mom's post: m.facebook.com/groups/6169176…

Retweet to help this sweet girl find her camera from last night's match. 

Link to her Mom's post: m.facebook.com/groups/6169176…