Jim Nitterauer

@JNitterauer

Husband, Dad, Senior Security Engineer . InfoSec enthusiast. CISSP, CISM, Speaker. Ethical Hacker. Staff Guitarist

Gulf Breeze, FL
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @JNitterauer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JNitterauer

  1. proslijedio/la je Tweet
    prije 22 sata

    Graylog 3.2 is here!!! Views, dashboards & search are unified for a more flexible & comprehensive approach to threat hunting! You can reuse searches & combine them into a workflow. Alerts now utilize dynamic lists & can alert against multiple conditions.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    For those who use the awesome Alfa AWUS036ACH 5G-capable adapter for WiFi hacking, this is the best (and only) tutorial that I've see that actually gets it working correctly in Kali Linux:

    Poništi
  3. proslijedio/la je Tweet
    prije 21 sat

    A great platform and the greatest trainer. This combination is magical and I strongly suggest anyone interested in attend if you are able.

    Poništi
  4. proslijedio/la je Tweet
    6. velj

    With the delay of the Iowa caucus results appearing to have been caused by a reporting app, our director, , was asked by to discuss best practices when implementing new technology.

    Poništi
  5. 6. velj
    Poništi
  6. 6. velj
    Poništi
  7. 6. velj

    Terrifying bug in WhatsApp allows hackers to steal files. So get patching all nine of you using it on the desktop • The Register

    Poništi
  8. 6. velj
    Poništi
  9. 6. velj

    Secure Code Warrior and Manicode Security to lead Learning Lab at RSA Conference 2020 - Help Net Security ⁦

    Poništi
  10. proslijedio/la je Tweet
    6. velj

    We had such a great time at the VIP Alumni event last night. Many thanks to for giving us the opportunity to host this event and to the alumni who attended. We loved being able to share our story with you!

    Poništi
  11. proslijedio/la je Tweet
    4. velj
    Poništi
  12. proslijedio/la je Tweet
    5. velj
    Poništi
  13. proslijedio/la je Tweet
    5. velj

    What were the largest breaches in 2019? We’ve listed them out in the Zix| 2019 Global Security Report.

    Poništi
  14. proslijedio/la je Tweet
    5. velj

    "This is what I'm passionate about, and this is what I love, so this is what I do." 👏

    Poništi
  15. 5. velj

    Quote of the day from "I know that the Unicorn Project must be fiction because when has security every stopped anything from being deployed in the real world?" at 1:02

    Poništi
  16. proslijedio/la je Tweet

    Want a good gift? I think our training would be a (crit)hit Because who can say no to roleplaying tabletop and interactive learning!? cc

    Poništi
  17. proslijedio/la je Tweet
    5. velj

    Want to setup Geolocation for IP address to help in your investigations and to understand your traffic patterns? Here's a quick how-to guide

    Poništi
  18. 5. velj
    Poništi
  19. proslijedio/la je Tweet
    4. velj

    Did you already see one of the best features in release 3.2? This enables you to know what message is sending your processing into the endless loop you could not debug in versions before. <3 for

    Poništi
  20. proslijedio/la je Tweet
    4. velj

    season for hackers is like rabbit season for Elmer Fudd. recently uncovered this ADP scam, dangling forms as bait.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·