SecurityGuill  

@SecurityGuill

Ethical Hacker 💻 | Infosec passionate 📚 | Learn new things easily with my infographics 📖 | Welcome to my new followers 🌐 |

Inside your device  
Vrijeme pridruživanja: studeni 2018.

Tweetovi

Blokirali ste korisnika/cu @SecurityGuill

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SecurityGuill

  1. Prikvačeni tweet

    This thread updated includes all my so far, they present different terms related to Information Security 🔐 It's an easy way to learn new things 📖 I hope it will be useful to the community 🌐 RT appreciated 🔁 Follow me ➡️ for more about

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    My dear community 🌐 I would like to know a little more about you. Where do you come from? 🗺️ Comment if you come from somewhere else. Feel free to share for reach 🔃

    Poništi
  3. My dear community 🌐 I would like to know a little more about you. Where do you come from? 🗺️ Comment if you come from somewhere else. Feel free to share for reach 🔃

    Poništi
  4. 3. velj

    The DNS service is essential for browsing the 🌐 What about the vulnerabilities of this service? 🎯 I made an that presents an attack called DNS Poisoning. Follow for more about

    Poništi
  5. 1. velj

    Ransomware has cost businesses more than $ 8 billion in the last years. 💰 This is one of the most active threats nowadays. I realized an that quickly presents what a Ransomware is. 📖 Follow me 🌐 for more about

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Who uses the '' ls '' command just after using the '' cd '' command?

    Prikaži ovu nit
    Poništi
  7. 30. sij

    Zed Attack Proxy is an open-source web application security scanner used by both those new to application security as well as professional penetration testers.🌐 Follow me ➡️ for more about 📖 ( )

    Poništi
  8. 29. sij

    If I was a malicious person, my phishing attack could work, I'm sure. So please lower your brightness on public transport, and reduce your online activities, especially when you are in full view of everyone. ☀️🤳 (3/3)

    Prikaži ovu nit
    Poništi
  9. 29. sij

    - His bank account number. 💳 - The balance of his bank account. 💵 - The name of his insurer. - The date, time and place of the meeting with his car sales representative. 🚗 - The telephone number and first name of his wife and daughter. (2/3)

    Prikaži ovu nit
    Poništi
  10. 29. sij

    ⚠️ Little story of awareness ⚠️ I was on the train, with no battery on my phone. So I decided to observe what was going on around me. I discreetly looked at a person who was on cell phone. In 10 minutes I got: (1/3)

    Prikaži ovu nit
    Poništi
  11. 29. sij

    The Active Directory, the cornerstone of . "The complexity of AD technology and daily administration actions very often lead to the appearance of attack paths which are exploited by attackers." Talk by

    Poništi
  12. 29. sij

    Live bugbounty by at . We can see in action 😎

    Poništi
  13. 29. sij
    Poništi
  14. 29. sij

    On the way to the International Cybersecurity Forum 🔐🌐 ( ) at Lille 🚅 It will be a good day.

    Poništi
  15. 28. sij

    I always do that 😎

    Prikaži ovu nit
    Poništi
  16. 28. sij

    Who uses the '' ls '' command just after using the '' cd '' command?

    Prikaži ovu nit
    Poništi
  17. 27. sij

    There are different technologies that can analyze incoming on your network, and prevent intrusions 🛡️ Today I did an that presents what an IDS and an IPS are 🔐 Follow for more about

    Poništi
  18. 25. sij

    Metasploit is a tool widely used in the field of information security. 🔐 I realized an that quickly presents what Metasploit is. 📖 Follow me 🌐 for more about

    Poništi
  19. 23. sij

    Wireshark is the world's leading network traffic analyzer, and an essential tool for any security professional or systems administrator. 🔐 I realized an that quickly presents what is Wireshark. 📖 Follow me 🌐 for more about

    Poništi
  20. 22. sij

    Network Mapper is one of the most used tools in Information Security 🔐 I made an that quickly presents Nmap & some options 📖 Follow me for more about

    Poništi
  21. 21. sij

    You have already heard that you should not connect to free or unknown Wi-Fi 📶 but you don't know why? I made an that presents an attack called "Man-In-The-Middle" 🕵️‍♂️ Follow me 🔐 for more about

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·