Dan Nanni (@xmodulo) 's Twitter Profile
Dan Nanni

@xmodulo

Daily education on Linux, networking and cybersecurity

ID: 565447304

linkhttps://study-notes.org calendar_today28-04-2012 13:37:51

2,2K Tweet

9,9K Takipçi

28 Takip Edilen

Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are popular file managers that are available on Linux 😎👇 #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here are popular file managers that are available on Linux 😎👇 #opensource 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

The Bash Bunny is a powerful USB attack platform for automating #pentesting tasks. Here is a quick breakdown of its main features and what you can do with them 😎👇 #cybersecurity Find pdf books with all my #infosec related infographics at study-notes.org

The Bash Bunny is a powerful USB attack platform for automating #pentesting tasks. Here is a quick breakdown of its main features and what you can do with them 😎👇 #cybersecurity 

Find pdf books with all my #infosec related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Just like anything else, even widely used Linux tools can become outdated as better and more efficient options emerge. Here are examples of deprecated Linux commands 😎👇 #opensource Find pdf books with all my #Linux related infographics at study-notes.org

Just like anything else, even widely used Linux tools can become outdated as better and more efficient options emerge. Here are examples of deprecated Linux commands 😎👇 #opensource 

Find pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Linux offers a rich set of command-line tools for network diagnostics, monitoring and configuration. Here are a categorized list of networking CLI tools available on Linux 😎👇 #sysadmin Find pdf books with all my #Linux related infographics at study-notes.org

Linux offers a rich set of command-line tools for network diagnostics, monitoring and configuration.

Here are a categorized list of networking CLI tools available on Linux 😎👇 #sysadmin 

Find pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

NTP keeps clocks in sync across computer systems while accounting for network delays and variability. Here is how NTP clock synchronization works 😎👇 #networking #sysadmin #devops Find pdf books with all my networking related infographics at study-notes.org

NTP keeps clocks in sync across computer systems while accounting for network delays and variability. Here is how NTP clock synchronization works 😎👇 #networking #sysadmin #devops 

Find pdf books with all my networking related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Android file system is based on #Linux and organized into distinct partitions: /system for core OS files, /data for apps & personal data, and /storage for internal & external storage 😎👇 Find pdf books with all my #technology related infographics at study-notes.org

Android file system is based on #Linux and organized into distinct partitions: /system for core OS files, /data for apps & personal data, and /storage for internal & external storage 😎👇

Find pdf books with all my #technology related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are popular Linux commands for log processing 😎👇 #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here are popular Linux commands for log processing 😎👇 #sysadmin #devops 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

DNS cache poisoning is a security attack that corrupts a DNS resolver’s cache by injecting false records 😎👇 #infosec #dns #pentesting Find pdf books with all my #cybersecurity related infographics at study-notes.org

DNS cache poisoning is a security attack that corrupts a DNS resolver’s cache by injecting false records 😎👇 #infosec #dns #pentesting 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

The init system is responsible for starting #Linux, launching services, and managing processes. Here is a summary of available init systems and which distros use them by default 😎👇 #sysadmin Find pdf books with all my Linux related infographics at study-notes.org

The init system is responsible for starting #Linux, launching services, and managing processes. Here is a summary of available init systems and which distros use them by default 😎👇 #sysadmin 

Find pdf books with all my Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Tor routes internet traffic through a series of volunteer-operated relays, wrapping it in multiple layers of encryption to protect users’ #privacy😎👇 #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

Tor routes internet traffic through a series of volunteer-operated relays, wrapping it in multiple layers of encryption to protect users’ #privacy😎👇 #infosec 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Python offers a rich set of libraries for #pentesting , enabling tasks like network scanning, exploit development, vulnerability analysis, and payload generation 😎👇 #infosec #python Find pdf books with all my #cybersecurity related infographics at study-notes.org

Python offers a rich set of libraries for #pentesting , enabling tasks like network scanning, exploit development, vulnerability analysis, and payload generation 😎👇 #infosec #python 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are a list of container security tools available for Linux 😎👇 #linux #docker #kubernetes #devops Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Here are a list of container security tools available for Linux 😎👇 #linux #docker #kubernetes #devops 

Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Top programming languages and their creators by age 😎👇 #coding #programming #SoftwareDevelopment #SoftwareEngineering Find high-res pdf books with all my #DevOps related infographics at study-notes.org

Top programming languages and their creators by age 😎👇

#coding #programming #SoftwareDevelopment #SoftwareEngineering 

Find high-res pdf books with all my #DevOps related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are useful curl command examples 😎👇 #devops #sysadmin #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here are useful curl command examples 😎👇 #devops #sysadmin #opensource 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

USB standards define data transfer speeds, while connector types, often reused across versions, support multiple rates depending on the implementation 😎👇 #usb #computer Find pdf books with all my #technology related infographics at study-notes.org

USB standards define data transfer speeds, while connector types, often reused across versions, support multiple rates depending on the implementation 😎👇 #usb #computer 

Find pdf books with all my #technology related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Linux filesystem tools are divided into two types: those that work universally across all filesystems, and those designed for specific filesystems 😎👇 #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

Linux filesystem tools are divided into two types: those that work universally across all filesystems, and those designed for specific filesystems 😎👇 #sysadmin #devops 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Sandboxing tools improve security by isolating apps in controlled environments. The kernel offers core samdboxing features while userland tools make it easier to confine apps 😎👇 #cybersecurity Find pdf books with all my #Linux related infographics at study-notes.org

Sandboxing tools improve security by isolating apps in controlled environments. The kernel offers core samdboxing features while userland tools make it easier to confine apps 😎👇 #cybersecurity 

Find pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Staying tuned to top cybersecurity podcasts is a great way to stay informed about emerging threats, evolving trends, and practical defense strategies 😎👇 #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

Staying tuned to top cybersecurity podcasts is a great way to stay informed about emerging threats, evolving trends, and practical defense strategies 😎👇 #infosec 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

TLS, IPsec, and SSH are widely used protocols for securing network communication, each with distinct roles and operating at different layers of the network stack 😎👇 #infoeec Find pdf books with all my #cybersecurity related infographics at study-notes.org

TLS, IPsec, and SSH are widely used protocols for securing network communication, each with distinct roles and operating at different layers of the network stack 😎👇 #infoeec 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

If I had to pick a personal favorite among lesser-known Linux commands, it would be lsof. It’s my go-to tool for discovering which files are open and which processes are using them 😎👇 #sysadmin Find pdf books with all my #Linux infographics at study-notes.org

If I had to pick a personal favorite among lesser-known Linux commands, it would be lsof. It’s my go-to tool for discovering which files are open and which processes are using them 😎👇 #sysadmin 

Find pdf books with all my #Linux infographics at study-notes.org