Tweetovi

Blokirali ste korisnika/cu @AgniPradhan

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AgniPradhan

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet

    New bug in China. To be honest, not a massive fan of this new decade. ‘Highly pathogenic’ H5N1 bug that can spread to humans kills 4,500 chickens in China

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Finally got around to deleting my Facebook account. I don't trust FB, and I don't want to tacitly encourage other people to trust it. Anyone who wishes to reach out, please either or twitter (DMs open) or Wickr: krebswickr. Thanks.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    9. stu 2019.

    Nailed it. The Tacoma News Tribute, April 11, 1953.

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    ssh root@192.168.0.1 tcpdump -n -i any -w- 'not \( port 22 and host 192.168.0.1 \)' |etherape -r- # Instant visualization of linux router traffic. Yes, root on the router, you can help make this more secure by forcing key auth only and setting PermitRootLogin forced-commands-only

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    Note to self: phones must be ground into a very fine powder if you don't want the shit to be recovered by someone like this who literally does magic

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    A map of Citrix devices that are vulnerable to CVE-2019-19781

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    Ubuntu Security Notice USN-4255-1

    Poništi
  11. proslijedio/la je Tweet
    29. sij

    Why Companies Should Care about Data Privacy Day by brad_shimmin

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    "Those hours of practice, and failure, are a necessary part of the learning process."- Gina Sipley

    Poništi
  13. proslijedio/la je Tweet
    22. sij

    The Attack Range solves two main challenges in development of detections: - quickly build a small pre configured lab infrastructure as close as possible to your production environment - perform attack simulation using Atomic Red Team

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection The post Microsoft exposed 250 million customer support records appeared first on WeLiveSecurity via

    Poništi
  15. proslijedio/la je Tweet
    19. sij

    Existen más dimensiones de las que ves.

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    4 layouts for the price of 1, thanks flex 👍 css` form { display: flex; flex-wrap: wrap; & > input { flex: 1 1 10ch; margin: .5rem; &[type="email"] { flex: 3 1 30ch; } } } ` view source on Codepen 👇

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    In case you missed it, wrote a great introductory article about using GSAP to animate the Web, published yesterday: Thanks Sarah!

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    Is about organizing chaos? Controlling process? To , it is really about creating the context that allows the best answers to emerge for the organization.

    Poništi
  20. proslijedio/la je Tweet
    14. sij

    Confirmed that is reading encrypted messages after they're decrypted since Android 10 upgrade. I can't uninstall GBoard. I'm gonna try Flexsy keyboard and see if that stops the suggestions or if this runs deeper in the Android stack.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·