ClickSafe Community(CSC)

1.7K posts

ClickSafe Community(CSC)

ClickSafe Community(CSC)

@ClickSafeCSC

Cybersecurity Community || Security Awareness || Mentoring || Consultancy || Security Audit

Accra, Ghana Katılım Ocak 2025
11 Takip Edilen1.8K Takipçiler
Sabitlenmiş Tweet
ClickSafe Community(CSC)
ClickSafe Community(CSC)@ClickSafeCSC·
Amazing news here 🥳🥳 As the first half of the year is over, We begin a new Cluster of ClickSafe community. Do you want to transition or upskill in your Cybersecurity journey? This is for you. Join the 2nd Cluster of CSC community. lnkd.in/djrgKpDN
English
0
5
12
1.2K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal tweet media
ZXX
2
2
6
53
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
The simulation you practice daily VRs Real event.
Cyber_Racheal tweet media
English
1
3
9
177
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Interviewer: How does an antivirus software detect viruses and doesn’t detect all viruses? Why does it detect some virus and not every virus?
English
6
4
14
1.3K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Yay or Nay?
Cyber_Racheal tweet media
English
8
6
20
658
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Linux Commands
Cyber_Racheal tweet media
English
1
27
134
2K
ClickSafe Community(CSC) retweetledi
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
SMS was never designed for speed, as it relies on the 1975 SS7 protocol, which prioritizes basic delivery over modern performance and forces OTPs to navigate a multi-layered gauntlet of app servers, gateways, and carrier networks. Because each system maintains its own queue and best-effort delivery model, your authentication code is not guaranteed a fast lane, making it a silent passenger in a 50-year-old architecture that lacks the error-checking and reliability of the modern internet. When network congestion hits, this chain inevitably clogs, leaving messages waiting without status updates or progress bars. This explains why hitting "resend" often results in both codes arriving simultaneously, as they are stuck in the same pipe until a sudden flush releases the entire queue at once, proving that a 30-second security code trapped in a 45-second delay is simply an ancient protocol unable to meet modern demands.
RUNCORE@kenthylin

How can telecom network congestion affect OTP message delivery?

English
2
6
10
847
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Network Basics
Cyber_Racheal tweet media
English
1
11
68
1.1K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Companies primarily use Data Loss Prevention software to monitor and restrict how data is handled. These systems can identify sensitive information, like credit card numbers or proprietary code, and automatically block actions like uploading files to personal cloud storage, dragging documents to a USB drive, or attaching them to external emails. To prevent screenshots or copying, DLP tools can disable the "Print Screen" function, watermark the display to deter photos, and lock the clipboard so data cannot be pasted into unauthorized applications.  Beyond DLP, organizations often implement Digital Rights Management and Endpoint Management. DRM embeds security directly into the files, ensuring that even if a document is successfully transferred, it can only be opened by someone with company-verified credentials. Simultaneously, companies use "Walled Gardens" or Virtual Desktops, where the work happens on a remote server rather than the local device. This allows the IT department to create a hard digital boundary that prevents any data from leaving the corporate environment while allowing seamless collaboration within it.  IT departments use Endpoint Protection Platforms (EPP) to physically and digitally "lock" hardware. Advanced employee monitoring tools like Teramind or Controlio provide real-time visibility into employee actions. Beyond technical locks, formal Employee Handbooks and confidentiality clauses in employment contracts provide a legal framework for enforcement.
Cyber_Racheal@CyberRacheal

Interviewer: How do some companies prevent employees from taking screenshots, coping or transferring files to other people unless within the same company?

English
0
5
11
516
ClickSafe Community(CSC) retweetledi
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
If you want to avoid systemd while keeping things user-friendly, MX Linux is the top choice. It is based on Debian, meaning it has a massive library of compatible software, but it uses sysVinit by default. It’s widely considered the easiest "systemd-free" option because of its "MX Tools," a collection of simple graphical apps that let you manage drivers, codecs, and system settings without ever touching a terminal. Other solid alternatives include Devuan, which is essentially Debian stripped of systemd, and antiX, a lightweight powerhouse perfect for older hardware. While most mainstream distributions have moved to systemd for its automated features, these distros stick to a more traditional "one tool for one job" philosophy. This results in a system that is often faster, more transparent, and gives you complete control over how your computer starts up and manages its background processes.
Skyler@skylermzx

what linux distro doesnt use systemmd and is relatively simple to use

English
7
4
19
2.1K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Each icon in the image represents a major global player in the world of intelligence. We have Mossad: Officially the Institute for Intelligence and Special Operations. It is Israel's national intelligence agency, primarily focused on foreign intelligence gathering, counter-terrorism, and covert operations outside its borders. RAW: The Research and Analysis Wing. This is India's primary foreign intelligence agency. Its main role is monitoring the political and military developments in neighboring countries to ensure India's national security. The Central Intelligence Agency. As the premier foreign intelligence service of the United States, it is responsible for collecting, processing, and analyzing national security information from around the world. Inter-Services Intelligence. This is the premier intelligence agency of Pakistan, responsible for gathering and analyzing information relevant to national security and performing both internal and external intelligence functions. The Federal Security Service(FSB). Based in Russia, it is the principal successor to the Soviet-era KGB and focuses on domestic security, counter-intelligence, and counter-terrorism within the Russian Federation. MI6: Formally known as the Secret Intelligence Service (SIS). It is the United Kingdom's foreign intelligence agency, tasked with the covert collection and analysis of human intelligence from across the globe
Nana Sei Anyemedu@RedHatPentester

Who do you think is more powerful?

English
0
4
6
1.6K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal@CyberRacheal

Each icon in the image represents a major global player in the world of intelligence. We have Mossad: Officially the Institute for Intelligence and Special Operations. It is Israel's national intelligence agency, primarily focused on foreign intelligence gathering, counter-terrorism, and covert operations outside its borders. RAW: The Research and Analysis Wing. This is India's primary foreign intelligence agency. Its main role is monitoring the political and military developments in neighboring countries to ensure India's national security. The Central Intelligence Agency. As the premier foreign intelligence service of the United States, it is responsible for collecting, processing, and analyzing national security information from around the world. Inter-Services Intelligence. This is the premier intelligence agency of Pakistan, responsible for gathering and analyzing information relevant to national security and performing both internal and external intelligence functions. The Federal Security Service(FSB). Based in Russia, it is the principal successor to the Soviet-era KGB and focuses on domestic security, counter-intelligence, and counter-terrorism within the Russian Federation. MI6: Formally known as the Secret Intelligence Service (SIS). It is the United Kingdom's foreign intelligence agency, tasked with the covert collection and analysis of human intelligence from across the globe

QME
0
4
6
769
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Which protocol operates between the Data Link and Network layers (Layers 2 and 3) to map a constantly changing IP address to a fixed physical MAC address? A. DNS B. DHCP C. ARP D. ICMP
English
31
13
75
7.1K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
An IP address starting with 169.254.x.x indicates that the computer has assigned itself an Automatic Private IP Address (APIPA). This happens when a client is configured to obtain an address automatically but cannot reach a DHCP server to receive one.  C. DHCP✅
Cyber_Racheal@CyberRacheal

A technician is troubleshooting a "Limited Connectivity" error. The computer has an IP address of 169.254.10.55. Which service is likely unavailable? A) DNS B) NAT C) DHCP D) ARP

English
0
4
11
837
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal@CyberRacheal

It’s wild how some of the biggest apps we use every day started as something completely different. It’s like they had a mid-life crisis before they even launched! Take YouTube, for example. Back in 2005, the founders didn't set out to build a global library; they wanted a video dating site. The idea was to upload a clip introducing yourself to find a match. It totally flopped. Nobody wanted to post dating videos, but they did want to post random clips of their cats or trips to the zoo. The founders pivoted, leaned into the "sharing" part, and the rest is history. Snapchat has an equally "wait, what?" origin story. In 2011, it started as an app called "Picaboo." The original pitch wasn't about "streaks" or cool filters, it was strictly for sending photos that disappeared so you wouldn't get caught sending, well, "risky" pictures. When they pitched it at Stanford, people actually laughed. They thought a photo app that deleted your photos was the dumbest idea ever because, back then, the whole point of the internet was to save everything forever. But just like YouTube, the founders realized they stumbled onto something bigger: the "temporary" part made people feel free to be messy, goofy, and authentic without it living on their "permanent record." They rebranded to Snapchat, added the ghost logo, and tapped into how we actually talk in real life, where conversations disappear the moment they're over. Both platforms prove that sometimes your "failed" first idea is just the front door to a billion-dollar pivot.

QME
0
5
10
5.5K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
It’s wild how some of the biggest apps we use every day started as something completely different. It’s like they had a mid-life crisis before they even launched! Take YouTube, for example. Back in 2005, the founders didn't set out to build a global library; they wanted a video dating site. The idea was to upload a clip introducing yourself to find a match. It totally flopped. Nobody wanted to post dating videos, but they did want to post random clips of their cats or trips to the zoo. The founders pivoted, leaned into the "sharing" part, and the rest is history. Snapchat has an equally "wait, what?" origin story. In 2011, it started as an app called "Picaboo." The original pitch wasn't about "streaks" or cool filters, it was strictly for sending photos that disappeared so you wouldn't get caught sending, well, "risky" pictures. When they pitched it at Stanford, people actually laughed. They thought a photo app that deleted your photos was the dumbest idea ever because, back then, the whole point of the internet was to save everything forever. But just like YouTube, the founders realized they stumbled onto something bigger: the "temporary" part made people feel free to be messy, goofy, and authentic without it living on their "permanent record." They rebranded to Snapchat, added the ghost logo, and tapped into how we actually talk in real life, where conversations disappear the moment they're over. Both platforms prove that sometimes your "failed" first idea is just the front door to a billion-dollar pivot.
Big Chops@iamBigChops

Bro I just discovered YouTube wasn’t meant for videos… it started as a dating site 💔

English
0
9
18
13.4K
ClickSafe Community(CSC) retweetledi
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Cyber_Racheal@CyberRacheal

When a person passes away without sharing their passcode, modern smartphones are designed to stay locked to protect privacy, and manufacturers generally cannot bypass the device's encryption. The most effective route is often gaining access to the cloud accounts rather than the physical device itself. Both Apple and Google have formal procedures where family members or executors can provide legal documentation, such as a death certificate or court order, to request access to photos and other synced data. The process is much simpler if the owner proactively set up "Legacy Contact" features before their death. Apple's Digital Legacy program allows a designated person to access account data with a specific access key and a death certificate. Similarly, Google's Inactive Account Manager can be configured to automatically notify trusted contacts and share data after a set period of inactivity If no legacy features were enabled and legal routes aren't viable, technical workarounds are very limited. Families often look for physical notes of passwords in the person's belongings or try common PINs like birthdays. Biometrics like fingerprints or facial recognition typically fail after death because sensors often require "liveness" indicators like electrical charges or micro-movements. While the phone can often be factory reset to make the hardware usable again, this action permanently erases all data stored on the device

QME
0
4
6
2.7K