Dan Nanni (@xmodulo) 's Twitter Profile
Dan Nanni

@xmodulo

Daily education on Linux, networking and cybersecurity

ID: 565447304

linkhttps://study-notes.org calendar_today28-04-2012 13:37:51

2,2K Tweet

9,9K Takipรงi

28 Takip Edilen

Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are popular file managers that are available on Linux ๐Ÿ˜Ž๐Ÿ‘‡ #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here are popular file managers that are available on Linux ๐Ÿ˜Ž๐Ÿ‘‡ #opensource 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

The Bash Bunny is a powerful USB attack platform for automating #pentesting tasks. Here is a quick breakdown of its main features and what you can do with them ๐Ÿ˜Ž๐Ÿ‘‡ #cybersecurity Find pdf books with all my #infosec related infographics at study-notes.org

The Bash Bunny is a powerful USB attack platform for automating #pentesting tasks. Here is a quick breakdown of its main features and what you can do with them ๐Ÿ˜Ž๐Ÿ‘‡ #cybersecurity 

Find pdf books with all my #infosec related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Just like anything else, even widely used Linux tools can become outdated as better and more efficient options emerge. Here are examples of deprecated Linux commands ๐Ÿ˜Ž๐Ÿ‘‡ #opensource Find pdf books with all my #Linux related infographics at study-notes.org

Just like anything else, even widely used Linux tools can become outdated as better and more efficient options emerge. Here are examples of deprecated Linux commands ๐Ÿ˜Ž๐Ÿ‘‡ #opensource 

Find pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Linux offers a rich set of command-line tools for network diagnostics, monitoring and configuration. Here are a categorized list of networking CLI tools available on Linux ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin Find pdf books with all my #Linux related infographics at study-notes.org

Linux offers a rich set of command-line tools for network diagnostics, monitoring and configuration.

Here are a categorized list of networking CLI tools available on Linux ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin 

Find pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

NTP keeps clocks in sync across computer systems while accounting for network delays and variability. Here is how NTP clock synchronization works ๐Ÿ˜Ž๐Ÿ‘‡ #networking #sysadmin #devops Find pdf books with all my networking related infographics at study-notes.org

NTP keeps clocks in sync across computer systems while accounting for network delays and variability. Here is how NTP clock synchronization works ๐Ÿ˜Ž๐Ÿ‘‡ #networking #sysadmin #devops 

Find pdf books with all my networking related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Android file system is based on #Linux and organized into distinct partitions: /system for core OS files, /data for apps & personal data, and /storage for internal & external storage ๐Ÿ˜Ž๐Ÿ‘‡ Find pdf books with all my #technology related infographics at study-notes.org

Android file system is based on #Linux and organized into distinct partitions: /system for core OS files, /data for apps & personal data, and /storage for internal & external storage ๐Ÿ˜Ž๐Ÿ‘‡

Find pdf books with all my #technology related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are popular Linux commands for log processing ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here are popular Linux commands for log processing ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin #devops 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

DNS cache poisoning is a security attack that corrupts a DNS resolverโ€™s cache by injecting false records ๐Ÿ˜Ž๐Ÿ‘‡ #infosec #dns #pentesting Find pdf books with all my #cybersecurity related infographics at study-notes.org

DNS cache poisoning is a security attack that corrupts a DNS resolverโ€™s cache by injecting false records ๐Ÿ˜Ž๐Ÿ‘‡ #infosec #dns #pentesting 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

The init system is responsible for starting #Linux, launching services, and managing processes. Here is a summary of available init systems and which distros use them by default ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin Find pdf books with all my Linux related infographics at study-notes.org

The init system is responsible for starting #Linux, launching services, and managing processes. Here is a summary of available init systems and which distros use them by default ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin 

Find pdf books with all my Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Tor routes internet traffic through a series of volunteer-operated relays, wrapping it in multiple layers of encryption to protect usersโ€™ #privacy๐Ÿ˜Ž๐Ÿ‘‡ #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

Tor routes internet traffic through a series of volunteer-operated relays, wrapping it in multiple layers of encryption to protect usersโ€™ #privacy๐Ÿ˜Ž๐Ÿ‘‡ #infosec 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Python offers a rich set of libraries for #pentesting , enabling tasks like network scanning, exploit development, vulnerability analysis, and payload generation ๐Ÿ˜Ž๐Ÿ‘‡ #infosec #python Find pdf books with all my #cybersecurity related infographics at study-notes.org

Python offers a rich set of libraries for #pentesting , enabling tasks like network scanning, exploit development, vulnerability analysis, and payload generation ๐Ÿ˜Ž๐Ÿ‘‡ #infosec #python 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are a list of container security tools available for Linux ๐Ÿ˜Ž๐Ÿ‘‡ #linux #docker #kubernetes #devops Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Here are a list of container security tools available for Linux ๐Ÿ˜Ž๐Ÿ‘‡ #linux #docker #kubernetes #devops 

Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Top programming languages and their creators by age ๐Ÿ˜Ž๐Ÿ‘‡ #coding #programming #SoftwareDevelopment #SoftwareEngineering Find high-res pdf books with all my #DevOps related infographics at study-notes.org

Top programming languages and their creators by age ๐Ÿ˜Ž๐Ÿ‘‡

#coding #programming #SoftwareDevelopment #SoftwareEngineering 

Find high-res pdf books with all my #DevOps related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Here are useful curl command examples ๐Ÿ˜Ž๐Ÿ‘‡ #devops #sysadmin #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here are useful curl command examples ๐Ÿ˜Ž๐Ÿ‘‡ #devops #sysadmin #opensource 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

USB standards define data transfer speeds, while connector types, often reused across versions, support multiple rates depending on the implementation ๐Ÿ˜Ž๐Ÿ‘‡ #usb #computer Find pdf books with all my #technology related infographics at study-notes.org

USB standards define data transfer speeds, while connector types, often reused across versions, support multiple rates depending on the implementation ๐Ÿ˜Ž๐Ÿ‘‡ #usb #computer 

Find pdf books with all my #technology related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Linux filesystem tools are divided into two types: those that work universally across all filesystems, and those designed for specific filesystems ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

Linux filesystem tools are divided into two types: those that work universally across all filesystems, and those designed for specific filesystems ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin #devops 

Find high-res pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Sandboxing tools improve security by isolating apps in controlled environments. The kernel offers core samdboxing features while userland tools make it easier to confine apps ๐Ÿ˜Ž๐Ÿ‘‡ #cybersecurity Find pdf books with all my #Linux related infographics at study-notes.org

Sandboxing tools improve security by isolating apps in controlled environments. The kernel offers core samdboxing features while userland tools make it easier to confine apps ๐Ÿ˜Ž๐Ÿ‘‡ #cybersecurity 

Find pdf books with all my #Linux related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Staying tuned to top cybersecurity podcasts is a great way to stay informed about emerging threats, evolving trends, and practical defense strategies ๐Ÿ˜Ž๐Ÿ‘‡ #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

Staying tuned to top cybersecurity podcasts is a great way to stay informed about emerging threats, evolving trends, and practical defense strategies ๐Ÿ˜Ž๐Ÿ‘‡ #infosec 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

TLS, IPsec, and SSH are widely used protocols for securing network communication, each with distinct roles and operating at different layers of the network stack ๐Ÿ˜Ž๐Ÿ‘‡ #infoeec Find pdf books with all my #cybersecurity related infographics at study-notes.org

TLS, IPsec, and SSH are widely used protocols for securing network communication, each with distinct roles and operating at different layers of the network stack ๐Ÿ˜Ž๐Ÿ‘‡ #infoeec 

Find pdf books with all my #cybersecurity related infographics at study-notes.org
Dan Nanni (@xmodulo) 's Twitter Profile Photo

If I had to pick a personal favorite among lesser-known Linux commands, it would be lsof. Itโ€™s my go-to tool for discovering which files are open and which processes are using them ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin Find pdf books with all my #Linux infographics at study-notes.org

If I had to pick a personal favorite among lesser-known Linux commands, it would be lsof. Itโ€™s my go-to tool for discovering which files are open and which processes are using them ๐Ÿ˜Ž๐Ÿ‘‡ #sysadmin 

Find pdf books with all my #Linux infographics at study-notes.org