ClickSafe Community(CSC)

1.7K posts

ClickSafe Community(CSC)

ClickSafe Community(CSC)

@ClickSafeCSC

Cybersecurity Community || Security Awareness || Mentoring || Consultancy || Security Audit

Accra, Ghana Beigetreten Ocak 2025
11 Folgt1.8K Follower
Angehefteter Tweet
ClickSafe Community(CSC)
ClickSafe Community(CSC)@ClickSafeCSC·
Amazing news here 🥳🥳 As the first half of the year is over, We begin a new Cluster of ClickSafe community. Do you want to transition or upskill in your Cybersecurity journey? This is for you. Join the 2nd Cluster of CSC community. lnkd.in/djrgKpDN
English
0
5
12
1.2K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Kali or Parrot? Which one are you going for?
Cyber_Racheal tweet media
English
38
27
173
5.4K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal tweet media
ZXX
5
5
49
2K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
The simulation you practice daily VRs Real event.
Cyber_Racheal tweet media
English
5
3
18
751
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Interviewer: How does an antivirus software detect viruses and doesn’t detect all viruses? Why does it detect some virus and not every virus?
English
10
4
29
3.4K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Yay or Nay?
Cyber_Racheal tweet media
English
11
6
25
1K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Linux Commands
Cyber_Racheal tweet media
English
3
59
331
5.6K
ClickSafe Community(CSC) retweetet
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
SMS was never designed for speed, as it relies on the 1975 SS7 protocol, which prioritizes basic delivery over modern performance and forces OTPs to navigate a multi-layered gauntlet of app servers, gateways, and carrier networks. Because each system maintains its own queue and best-effort delivery model, your authentication code is not guaranteed a fast lane, making it a silent passenger in a 50-year-old architecture that lacks the error-checking and reliability of the modern internet. When network congestion hits, this chain inevitably clogs, leaving messages waiting without status updates or progress bars. This explains why hitting "resend" often results in both codes arriving simultaneously, as they are stuck in the same pipe until a sudden flush releases the entire queue at once, proving that a 30-second security code trapped in a 45-second delay is simply an ancient protocol unable to meet modern demands.
RUNCORE@kenthylin

How can telecom network congestion affect OTP message delivery?

English
4
6
15
1.2K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Network Basics
Cyber_Racheal tweet media
English
1
18
94
1.6K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Companies primarily use Data Loss Prevention software to monitor and restrict how data is handled. These systems can identify sensitive information, like credit card numbers or proprietary code, and automatically block actions like uploading files to personal cloud storage, dragging documents to a USB drive, or attaching them to external emails. To prevent screenshots or copying, DLP tools can disable the "Print Screen" function, watermark the display to deter photos, and lock the clipboard so data cannot be pasted into unauthorized applications.  Beyond DLP, organizations often implement Digital Rights Management and Endpoint Management. DRM embeds security directly into the files, ensuring that even if a document is successfully transferred, it can only be opened by someone with company-verified credentials. Simultaneously, companies use "Walled Gardens" or Virtual Desktops, where the work happens on a remote server rather than the local device. This allows the IT department to create a hard digital boundary that prevents any data from leaving the corporate environment while allowing seamless collaboration within it.  IT departments use Endpoint Protection Platforms (EPP) to physically and digitally "lock" hardware. Advanced employee monitoring tools like Teramind or Controlio provide real-time visibility into employee actions. Beyond technical locks, formal Employee Handbooks and confidentiality clauses in employment contracts provide a legal framework for enforcement.
Cyber_Racheal@CyberRacheal

Interviewer: How do some companies prevent employees from taking screenshots, coping or transferring files to other people unless within the same company?

English
0
5
13
716
ClickSafe Community(CSC) retweetet
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
If you want to avoid systemd while keeping things user-friendly, MX Linux is the top choice. It is based on Debian, meaning it has a massive library of compatible software, but it uses sysVinit by default. It’s widely considered the easiest "systemd-free" option because of its "MX Tools," a collection of simple graphical apps that let you manage drivers, codecs, and system settings without ever touching a terminal. Other solid alternatives include Devuan, which is essentially Debian stripped of systemd, and antiX, a lightweight powerhouse perfect for older hardware. While most mainstream distributions have moved to systemd for its automated features, these distros stick to a more traditional "one tool for one job" philosophy. This results in a system that is often faster, more transparent, and gives you complete control over how your computer starts up and manages its background processes.
Skyler@skylermzx

what linux distro doesnt use systemmd and is relatively simple to use

English
9
6
23
2.6K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Each icon in the image represents a major global player in the world of intelligence. We have Mossad: Officially the Institute for Intelligence and Special Operations. It is Israel's national intelligence agency, primarily focused on foreign intelligence gathering, counter-terrorism, and covert operations outside its borders. RAW: The Research and Analysis Wing. This is India's primary foreign intelligence agency. Its main role is monitoring the political and military developments in neighboring countries to ensure India's national security. The Central Intelligence Agency. As the premier foreign intelligence service of the United States, it is responsible for collecting, processing, and analyzing national security information from around the world. Inter-Services Intelligence. This is the premier intelligence agency of Pakistan, responsible for gathering and analyzing information relevant to national security and performing both internal and external intelligence functions. The Federal Security Service(FSB). Based in Russia, it is the principal successor to the Soviet-era KGB and focuses on domestic security, counter-intelligence, and counter-terrorism within the Russian Federation. MI6: Formally known as the Secret Intelligence Service (SIS). It is the United Kingdom's foreign intelligence agency, tasked with the covert collection and analysis of human intelligence from across the globe
Nana Sei Anyemedu@RedHatPentester

Who do you think is more powerful?

English
0
4
10
2.3K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal@CyberRacheal

Each icon in the image represents a major global player in the world of intelligence. We have Mossad: Officially the Institute for Intelligence and Special Operations. It is Israel's national intelligence agency, primarily focused on foreign intelligence gathering, counter-terrorism, and covert operations outside its borders. RAW: The Research and Analysis Wing. This is India's primary foreign intelligence agency. Its main role is monitoring the political and military developments in neighboring countries to ensure India's national security. The Central Intelligence Agency. As the premier foreign intelligence service of the United States, it is responsible for collecting, processing, and analyzing national security information from around the world. Inter-Services Intelligence. This is the premier intelligence agency of Pakistan, responsible for gathering and analyzing information relevant to national security and performing both internal and external intelligence functions. The Federal Security Service(FSB). Based in Russia, it is the principal successor to the Soviet-era KGB and focuses on domestic security, counter-intelligence, and counter-terrorism within the Russian Federation. MI6: Formally known as the Secret Intelligence Service (SIS). It is the United Kingdom's foreign intelligence agency, tasked with the covert collection and analysis of human intelligence from across the globe

QME
0
4
7
1.3K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Which protocol operates between the Data Link and Network layers (Layers 2 and 3) to map a constantly changing IP address to a fixed physical MAC address? A. DNS B. DHCP C. ARP D. ICMP
English
38
15
108
9.5K
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
An IP address starting with 169.254.x.x indicates that the computer has assigned itself an Automatic Private IP Address (APIPA). This happens when a client is configured to obtain an address automatically but cannot reach a DHCP server to receive one.  C. DHCP✅
Cyber_Racheal@CyberRacheal

A technician is troubleshooting a "Limited Connectivity" error. The computer has an IP address of 169.254.10.55. Which service is likely unavailable? A) DNS B) NAT C) DHCP D) ARP

English
0
4
13
973
ClickSafe Community(CSC) retweetet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal@CyberRacheal

It’s wild how some of the biggest apps we use every day started as something completely different. It’s like they had a mid-life crisis before they even launched! Take YouTube, for example. Back in 2005, the founders didn't set out to build a global library; they wanted a video dating site. The idea was to upload a clip introducing yourself to find a match. It totally flopped. Nobody wanted to post dating videos, but they did want to post random clips of their cats or trips to the zoo. The founders pivoted, leaned into the "sharing" part, and the rest is history. Snapchat has an equally "wait, what?" origin story. In 2011, it started as an app called "Picaboo." The original pitch wasn't about "streaks" or cool filters, it was strictly for sending photos that disappeared so you wouldn't get caught sending, well, "risky" pictures. When they pitched it at Stanford, people actually laughed. They thought a photo app that deleted your photos was the dumbest idea ever because, back then, the whole point of the internet was to save everything forever. But just like YouTube, the founders realized they stumbled onto something bigger: the "temporary" part made people feel free to be messy, goofy, and authentic without it living on their "permanent record." They rebranded to Snapchat, added the ghost logo, and tapped into how we actually talk in real life, where conversations disappear the moment they're over. Both platforms prove that sometimes your "failed" first idea is just the front door to a billion-dollar pivot.

QME
0
5
10
5.6K