@SJohnSnow Profile picture

Jon Snow ๐ŸŒ

@SJohnSnow

info Sec officer #blueTeam | @MiddleEast |

Similar User
Rawraw photo

@Rawanmo60

ฺคูŠฺคูˆ ุฑุฌุนุช ู…ุจุถูˆู†ู‡ photo

@kellobamya

ุณุชูƒู… ุงู„ู…ู„ูƒู‡ ุณู…ุงุญ photo

@Nhal26923921

๐Ÿ‡ฎ๐Ÿ‡น แฑฌaryam แฑฌ๐Ÿ‡ต๐Ÿ‡ธ๐“‚† ๎จ€ photo

@Maryam_les_

๐Ÿฆ…AHMED photo

@1234567ttww

๐˜‹๐˜ฐ๐˜ฏ'๐˜ต ๐˜›๐˜ฐ๐˜ถ๐˜ค๐˜ฉ, ๐˜ช๐˜ต'๐˜ด ๐˜ˆ๐˜ณ๐˜ต photo

@Art_DontTouch

๐Ÿ’ž๐Ÿ‘‘Sara๐Ÿ‘‘๐Ÿ’ž photo

@sara59950

๐Ÿ‘ฟ photo

@Bx6Fd

โค๏ธ ุงู„ุฎุทุงุจุฉ ุขู… ู…ุดุนู„๐Ÿ‡ธ๐Ÿ‡ฆ photo

@ummshal200

ุฑู†ุฉ photo

@tanawrana51

ุดู€ุฑุทุฉ ุงู„ุฃุฎู„ุงู‚๐Ÿ‘ฎโ€โ™€๏ธ๐Ÿฆ… photo

@Nur_ziDanee

ู†ูˆูˆู๐Ÿ™„๐Ÿ‘‘ photo

@noodf32

ุฃู…ูŠุฑุฉ ุฃุจูˆู‡ุง ุฒูˆุฒูˆ photo

@ZAMN78

Jon Snow ๐ŸŒ Reposted

Cybersecurity Tools By Category Information Gathering: >Nmap >Shodan >Maltego >TheHavester >Recon-NG >Amass >Censys >OSINT Framework >Gobuster Exploitation: >Burp Suite >Metasploit Framework >SQL Map >ZAP >ExploitDB >Core Impact >Cobalt Strike Password Cracking: >John Theโ€ฆ


Jon Snow ๐ŸŒ Reposted

10 System design topics you must prepare for interviews 1. Caching 2. Sharding 3. load-balancing 4. replication 5. fault-tolerance 6. high-availability 7. Performance 8. Scalability 9. replication 10. indexing Learn more on Design Guru - bit.ly/3pMiO8g

Tweet Image 1

Jon Snow ๐ŸŒ Reposted
Tweet Image 1

Jon Snow ๐ŸŒ Reposted

A professional photo is essential on LinkedIn. But a photographer will cost you $200. Here's how to create a FREE professional profile photo with AI:

Tweet Image 1
Tweet Image 2

Jon Snow ๐ŸŒ Reposted

(1/7) When it comes to selecting cyber threat intelligence feeds, what criteria are you looking for? Check out the following #CTI tools we recommend! ๐Ÿ‘‡ Learn more about each tool's strengths and benefits, evaluated by our experts: maltego.com/blog/threat-inโ€ฆ

Tweet Image 1

Jon Snow ๐ŸŒ Reposted

Linux file permissions cheat sheet (SUID, SGID, and Stick Bit permissions):

Tweet Image 1

Jon Snow ๐ŸŒ Reposted

Type confusion, Windows kernel exploitation, ROP chains, KASLR bypass Great blog post by Alexa Souza (@w4fz5uck5) wafzsucks.medium.com/how-a-simple-kโ€ฆ #windows #kernel #exploit #infosec

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Jon Snow ๐ŸŒ Reposted

This is a new "art" exhibition in New York by Anna Uddenberg titled "Continental Breakfast". How does it make you feel?


Jon Snow ๐ŸŒ Reposted

Data Warehouse vs. Data Lake / Lakehouse vs. Data Mesh Source for #infographic: linkedin.com/feed/update/urโ€ฆ


Jon Snow ๐ŸŒ Reposted

Linux permissions

Tweet Image 1

Jon Snow ๐ŸŒ Reposted

"grep" command in #Linux ๐Ÿงโค To learn more about the "grep" command, read our Article: buff.ly/46y1NSI

Tweet Image 1

Jon Snow ๐ŸŒ Reposted

Explaining 8 Popular Network Protocols in 1 Diagram. The method to download the high-resolution PDF is available at the end. Network protocols are standard methods of transferring data between two computers in a network. 1. HTTP (HyperText Transfer Protocol) HTTP is a protocolโ€ฆ


Jon Snow ๐ŸŒ Reposted

0-60mph < 4sec ๐Ÿค๐Ÿผ braless outfits #juicyjade9 #onlyfans #juicyjade

Tweet Image 1

Jon Snow ๐ŸŒ Reposted

๐—ช๐—ต๐—ฎ๐˜ ๐—˜๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ๐—บ๐—ฒ๐—ฟ ๐—ฆ๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐—ž๐—ป๐—ผ๐˜„ ๐—”๐—ฏ๐—ผ๐˜‚๐˜ ๐— ๐—ฒ๐—บ๐—ผ๐—ฟ๐˜† Check out this great manuscript by Ulrich Drepper, which delves deep into computer memory systems and their implications for software developers. It talks about: ๐Ÿ”น ๐—–๐—ฃ๐—จ ๐—–๐—ฎ๐—ฐ๐—ต๐—ฒ๐˜€ ๐Ÿ”นโ€ฆ

Tweet Image 1

Jon Snow ๐ŸŒ Reposted

OSI vs TCP/IP

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.