P.T.D

662 posts

P.T.D banner
P.T.D

P.T.D

@Scada_Hacker

Critical Infrastructure Security / Presumed Hacker https://t.co/B8EBfMrk95

Norfolk, UK Bergabung Ağustos 2020
168 Mengikuti66 Pengikut
P.T.D
P.T.D@Scada_Hacker·
@elormkdaniel Straight in the bin. I just want to know what's relevant
English
0
0
0
332
Elorm Daniel
Elorm Daniel@elormkdaniel·
Just came across this CV on LinkedIn 😭
Elorm Daniel tweet media
English
274
795
11.2K
1.1M
P.T.D
P.T.D@Scada_Hacker·
@UK_Daniel_Card I'm sick of people (often vulnerable ) getting ripped off by scam apps such as "paranormal" scanners. Vibe coded a fake android app which does the same thing. Debunk video coming soon !
English
0
0
0
69
mRr3b00t
mRr3b00t@UK_Daniel_Card·
some people are mad at me because I intentionally vibe coded something and said I vibe coded it and they are butt hurt because their world self image is being destroyed because of LLMs...... which is insane.... also LOL. vibe coding is so fun :D
English
33
2
112
3.8K
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal It's unlikely it's a network issue as you can ping This is a classic DNS issue - layer 7 / application
English
0
0
0
238
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
A user reports they can ping an IP address (8.8.8.8) but cannot access websites by name (like google.com).  Which layer of the OSI model is most likely where the problem exists?  A. Layer 1 (Physical)  B. Layer 3 (Network)  C. Layer 4 (Transport)  D. Layer 7 (Application)
English
68
20
226
42.5K
Piyush
Piyush@piyush784066·
Which device do you run Linux on? -Laptop -Desktop -Server -Virtual machine
Piyush tweet media
English
159
11
196
10K
Tokyo
Tokyo@otokyo__·
$10,000,000 to never listen to a Jay Z song again. Are you taking the offer?
Tokyo tweet media
English
772
15
367
26K
Scott Pert
Scott Pert@Scott_Pert·
I’m not a Chocolate fan, but every Easter I keep my tradition of eating a @CadburyUK Cream Egg…. Anyway to put it mildly I took a bite & it didn’t taste the same, then I read “Palm oil”…. Why would Cadbury ruin their brand? Not touching that shit again.
Scott Pert tweet mediaScott Pert tweet media
English
268
382
2.6K
116.5K
P.T.D
P.T.D@Scada_Hacker·
@hetmehtaa Hacked things , Learnt to turn almost anything into some sort of improvised tool or weapon, Learnt programming languages, So many things, and not much different to how it is now. I'm not glued or addicted to my mobile, it's just a communication device for me
English
0
0
0
27
Het Mehta
Het Mehta@hetmehtaa·
What did you do when you were bored?
Het Mehta tweet media
English
13
0
12
1.2K
P.T.D me-retweet
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
📌
Cyber_Racheal tweet media
QME
20
170
3.1K
40.3K
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal Why on earth would a developer want to use an OS specifically for pentesting / read teaming ? Fill the os up with tools you will never use as a dev makes absolutely no sense
English
3
1
12
944
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal A hammer For dealing with repeat offenders
English
1
0
0
143
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Fields in cybersecurity. What is missing?
Cyber_Racheal tweet media
English
28
49
394
10.3K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Claude is CRAZY here are all my hackerone payouts just from today
solst/ICE of Astarte tweet media
English
47
28
967
63.5K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
have they made cream eggs smaller????
English
29
0
26
3.4K
Ben Graham
Ben Graham@BenGrahamUK·
Britain has been a Christian nation for over 1,400 years. Through wars, plagues, and countless kings, Easter has always been celebrated. Yet now, Cadbury won’t even use the word ‘Easter’ on their eggs. When did celebrating British traditions become controversial?
Ben Graham tweet media
English
9.9K
8.5K
38.5K
4.2M
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal Needs re wording "What beginners call cyber security vs what real life experience calls cyber security"
English
1
0
1
42
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal Completly different architecture Windows is a complete operating system designed for all kinds of hardware Linux is a kernel Also windows doesn't eat memory like that. It caches what isn't in use, giving a false view it's using up memory
English
2
0
1
1.1K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Explain why?
Cyber_Racheal tweet media
English
59
97
3K
63.3K
Poag
Poag@PoagMahone·
@CyberRacheal Well. That's not gonna work the way you'd hope. Stuff after '&&' only executes if the first process exits cleanly. 'rm' will not exit cleanly as there's too much stuff that can't be deleted. Therefore, the fork bomb won't execute.
English
2
0
2
67
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
💀. Add yours if you get it.
Cyber_Racheal tweet media
English
15
22
331
7.9K
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal This is quite an old mug 1. You get a warning if you run the first command 2. The pipe bomb wont execute
English
1
0
0
27
P.T.D
P.T.D@Scada_Hacker·
@CyberRacheal Yes got one with various add on boards A large amount of videos made about it are completely rubbish It is incredibly useful but only if you know how to use it
P.T.D tweet media
English
2
0
3
60
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Heard of Flipper Zero ?
Cyber_Racheal tweet media
English
8
19
130
5.6K
P.T.D
P.T.D@Scada_Hacker·
@KnowBe4 Creeper. 1971 Author : Bob Thomas
English
0
0
1
23
KnowBe4
KnowBe4@KnowBe4·
Let’s put your cyber knowledge to the test. 🧠 Do you know when the first computer virus was created? We hit the halls at KnowBe4 to test the team’s knowledge in cybersecurity history, and let’s just say...the answers could suprise you. How did you do? Let us know in the comments!
English
1
2
1
233