Subash S

10.2K posts

Subash S banner
Subash S

Subash S

@SubashSRover

Virgil says ' Timeo Danaos et dona ferentes ', I say I'm a Phlegmatic Perquisite Perjurer following ' La Forza del Destino ' of Verdi !

India Katılım Temmuz 2015
5.7K Takip Edilen492 Takipçiler
Subash S retweetledi
Jessica AI
Jessica AI@HalimA60962·
In this modern world the most demanded skill is cyber security. I made a full guide of Cyber Security. To get it Just: Like ❤️ Repost 🔁 Bookmark 🔖 Comment "CYBER" ✉️ Follow me👤
Jessica AI tweet media
English
320
290
726
33.6K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
A nice cheat sheet of different monitoring infrastructure in cloud services.
Alex Xu tweet media
English
9
87
402
18.6K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
How OAuth 2 Works
Alex Xu tweet media
English
3
99
479
18.9K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
How GPUs Work at a High Level
Alex Xu tweet media
English
5
85
390
15.2K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
How Distributed Tracing Works at the High Level?
Alex Xu tweet media
English
3
37
201
12.3K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
Top 4 API Gateway Use Cases
Alex Xu tweet media
English
3
52
269
10.1K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
CPU vs GPU vs TPU
Alex Xu tweet media
Indonesia
20
465
2.4K
110.4K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
How can Cache Systems go wrong?
Alex Xu tweet media
English
10
73
538
59.9K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
Git Workflow: Essential Commands
Alex Xu tweet media
English
6
76
370
12.4K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
Top Cyber Attacks Explained Here’s a quick look at how some of the most common attacks work: Phishing: The attacker sends a fake link pointing to a spoofed login page. The victim enters credentials, the attacker captures them, and uses them to access the real system. Ransomware: The victim opens a malicious attachment or file. The ransomware encrypts local data and demands payment to restore access. Files stay locked until the ransom is paid or a backup is restored. Man-in-the-Middle (MitM): The attacker positions themselves between the victim and the server, intercepting traffic in both directions. Neither side detects the interception. The attacker can read or modify data as it passes through. SQL Injection: Malicious SQL gets inserted into an input field, for example, studentId=117 OR 1=1. The database executes it as a valid query and returns data it shouldn't. A single vulnerable input field can expose an entire table. Cross-Site Scripting (XSS): A malicious script gets injected into a legitimate page. When another user loads that page, their browser executes the script. Session tokens, cookies, and private data can be stolen this way. Zero-Day Exploits: The attacker finds a vulnerability the vendor hasn't discovered yet. No patch exists. The attack runs until the vendor identifies the issue and ships a fix, which can take days or weeks. Over to you: Which of these attacks have you seen most often in real environments, and which one do you think is the hardest to defend against today?
Alex Xu tweet media
English
4
49
193
9K
Subash S retweetledi
Bytebytego
Bytebytego@bytebytego·
What’s Next in AI: 5 Trends to Watch in 2026 Chapters 00:00:00 Intro 00:00:43 Reasoning 00:02:26 Agents 00:03:39 Coding 00:04:50 Open-weights 00:05:39 Multimodal
English
3
11
63
8K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
How LLMs Use AI Agents with Deep Research
Alex Xu tweet media
English
12
62
300
15.2K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
How Single Sign-On (SSO) Works
Alex Xu tweet media
English
3
78
435
17.8K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
Top 12 GitHub AI Repositories These repositories were selected based on their overall popularity and GitHub stars.
Alex Xu tweet media
English
33
651
3.3K
123.1K
Subash S retweetledi
Alex Xu
Alex Xu@alexxubyte·
10 Types of API Testing
Alex Xu tweet media
English
6
86
537
56.5K
Subash S retweetledi
Garry Tan
Garry Tan@garrytan·
gstack is available now at github.com/garrytan/gstack Open source, MIT license, let me know if it works for you. It's just one paste to install it on your local Claude Code, and it's a 2nd one to install it in your repo for your teammates.
English
92
117
1.8K
732.8K
Subash S retweetledi
Daily Dose of Data Science
Daily Dose of Data Science@DailyDoseOfDS_·
4 RAG indexing strategies, explained visually:
Daily Dose of Data Science tweet media
English
3
21
115
3.9K
Subash S retweetledi
KEDIANOMICS
KEDIANOMICS@kedianomics·
First 500 people who take action can get totally free 2.30 hr webinar costing 2500 with @sushilkedia where is explains every of 50 stocks of #Nifty going to 27000, where each stock is on the cycle. To get this: -Follow us [So we can DM regn link] -Retweet -Nice Replies help
KEDIANOMICS tweet media
English
488
538
487
35K
Subash S retweetledi
Maxi | Formula-100
Introducing Nuxt Skill Hub 🧪 A Nuxt module that generates one project-aware skill entry point from your actual Nuxt stack, instead of me hand-maintaining a pile of separate skills nuxt-skill.onmax.me 👇
Maxi | Formula-100 tweet media
English
2
11
115
6K