Tommy 👾

464 posts

Tommy 👾

Tommy 👾

@Tommy89434

computer engineering student || cybersecurity analyst

My space Katılım Ağustos 2022
91 Takip Edilen68 Takipçiler
Tommy 👾
Tommy 👾@Tommy89434·
I’ve been occupied with school activities recently, which has limited my time for cybersecurity practice. However, I plan to resume my learning soon. #CyberSecurity
English
0
0
0
21
Tommy 👾
Tommy 👾@Tommy89434·
🙂‍↔️ A good rapper, storyteller and preacher bruh is good 💟 #dave
Tommy 👾 tweet media
English
0
0
0
78
Tommy 👾 retweetledi
Skilled Coder
Skilled Coder@theskilledcoder·
DNS - All You Need to Know
Skilled Coder tweet media
English
0
53
485
35.6K
Tommy 👾 retweetledi
Elorm Daniel
Elorm Daniel@elormkdaniel·
😂
Elorm Daniel tweet media
QME
20
23
213
10.2K
Tommy 👾 retweetledi
Oseni Solomon
Oseni Solomon@ForenX_Intel·
In digital forensics investigations, USB devices often leave behind valuable footprints in the Windows Registry. Every time a flash drive is connected, Windows records details about it—including the device ID and usage history. @ireteeh @RedHatPentester
Oseni Solomon tweet media
English
1
6
14
942
Tommy 👾
Tommy 👾@Tommy89434·
Found where to continue splunk Let goo !!!!
English
2
0
5
46
Ezechi Jeremiah
Ezechi Jeremiah@cyberjeremiah·
On today's episode of learning Splunk @splunk .. I explored the Splunk indexes, settings of various indexes and I also created an index (I didn't ingest any logs yet tho) @TemitopeSobulo @AleroLacherie @segoslavia @ireteeh
Ezechi Jeremiah tweet mediaEzechi Jeremiah tweet mediaEzechi Jeremiah tweet mediaEzechi Jeremiah tweet media
Ezechi Jeremiah@cyberjeremiah

Today I was able to upload my first project on GitHub 😁.. I was feeling like an OP Cyber guy 😁🌚 Check it out and please leave a star here.. github.com/Jeremiah20/ssh… @TemitopeSobulo @segoslavia @ireteeh @nyerenwam

English
7
9
60
2.4K
Temitope Sobulo🛡️
Temitope Sobulo🛡️@TemitopeSobulo·
New video is up 💃💃💃💃💃 Splunk Components and Data Pipeline🔥🔥🔥🔥🔥🔥 by our one and only @cyber_rekk 🙌🏽🙌🏽🙌🏽🙌🏽 Link to video: youtu.be/iJzAVu4wtDY?si… Please share, retweet and subscribe to my channel
YouTube video
YouTube
Temitope Sobulo🛡️ tweet media
English
5
28
72
4.7K
Tommy 👾 retweetledi
The King 🐐👑
The King 🐐👑@Jeyso215·
How to Securely Wipe Your Mobile Phone Before Getting a New One When switching to a new phone, properly securing your old device's data is crucial to protect your privacy and prevent data recovery by unauthorized parties. Here are all the methods available for secure mobile data wiping: Understanding Factory Reset vs. Secure Wipe Standard Factory Reset - Modern encrypted phones: On most current smartphones, storage is encrypted by default and a factory reset effectively wipes encryption keys, making data recovery nearly impossible - Older devices: Simple factory resets may leave recoverable data remnants on unencrypted storage Secure Wipe Methods Cryptographic deletion (like factory reset) only removes encryption keys while encrypted data remnants may physically remain on storage. For maximum security, additional steps are recommended. Complete Secure Wiping Methods 1. Encryption + Factory Reset (Recommended for Most Users) - Step 1: Encrypt your device if not already encrypted - Android: Settings → Security → Encryption → "Encrypt Phone - iOS: Enabled by default on modern devices - Step 2: Perform factory reset through device settings - Effectiveness: Highly secure for modern devices with proper encryption 2. Professional Data Erasure Software - ProtectStar ASDA: Uses specialized erasure methods including "Selective Erase" of free space - iShredder iOS Enterprise: Professional-grade iOS data erasure solution - Third-party Android erasure tools: Various applications offer comprehensive data wiping 3. Multi-Pass Overwriting Methods - Concept: Overwrites data multiple times with random patterns - Implementation: Through specialized software that performs several data-writing passes - Effectiveness: More thorough than simple deletion but may take longer 4. Standards-Compliant Erasure Professional erasure following established standards: - NIST SP 800-88: Government standard for media sanitization with Clear, Purge, and Destroy categories - IEEE 2883-2022: Current standard for sanitizing storage technology - DoD 5220.22-M: Military-grade data wiping standard Pre-Wipe Security Checklist Essential Steps Before Wiping: 1. Backup important data to your new device or encrypted cloud storage 2. Sign out of all accounts (Apple ID, Google Account, social media) 3. Deauthorize the device from services like iTunes, Google Play 4. Remove or factory reset smartwatch pairings 5. Clear browser data and saved passwords 6. Remove SIM card and SD card (wipe separately if needed) 7. Disable Find My Device/Find My iPhone features Additional Security Measures: - Fill storage with dummy data then wipe again for extra security - Physically destroy storage for extremely sensitive data (rarely necessary) - Use professional ITAD services for enterprise-level security requirements Platform-Specific Considerations: Android Devices: - Modern Android devices with full-disk encryption make factory reset highly effective - Selective erasure tools can target specific data types or free space - Consider encryption verification before factory reset iOS Devices: - Hardware-level encryption makes factory reset very secure on modern iPhones - Specialized iOS erasure tools available for enterprise use - Built-in Secure Enclave provides additional security layers When to Use Each Method: - Encryption + Factory Reset: Sufficient for most personal use cases with modern devices - Professional Software: Recommended for business devices or highly sensitive data - Standards-Compliant Erasure: Required for regulated industries or enterprise environments - Physical Destruction: Only for extremely sensitive scenarios or compliance requirements For most users, encrypting your device and performing a factory reset provides excellent security for personal data protection. For business or highly sensitive applications, consider professional data erasure software that follows established security standards.
Nana Sei Anyemedu@RedHatPentester

How often do you properly wipe your data before selling or giving away an electronic device? I recently visited Accra Circle to purchase a second-hand phone for teaching advanced mobile forensics to my students. The device looked brand new. However, once I got home, I had a hunch to dig a little deeper and to my surprise, I uncovered a trove of personal data. The phone had previously belonged to a German national; I noticed during analysis. I was able to recover data going as far back as 2016, including call logs, WhatsApp messages, pictures, audio files, videos, SMS, and even full access to the file system. Clearly, the previous owner had not properly wiped the device before parting with it. There are more powerful things I was able to see. Surprisingly I was able to dial some numbers and they’re active on WhatsApp now😂. This is a critical reminder of the importance of secure data erasure. Simply resetting or deleting contents from a phone is not enough. In the field of digital forensics, our work goes beyond just preserving and analyzing evidence. There are situations where we are required by court order, judicial ruling, or client instruction to perform a complete forensic wipe of a device. Proper data destruction is just as important as data recovery, especially when privacy, confidentiality, and compliance are on the line. This applies to everyone🤍 Factory Reset or deleting ≠ Secure Wipe

English
2
23
59
4.1K
Austine
Austine@AustineCyberS·
@Tommy89434 Continue with the Cisco course that I sent…very interesting You have limited time on it
English
1
0
1
13
Tommy 👾
Tommy 👾@Tommy89434·
Today’s episode of me learning cybersecurity 🎙️ TCM SOC 101 : after spending four days looking for another 🥲 way to learn more on splunk and didn’t get it , I started the next course Threat intelligence and will appreciate if anyone can help with where to learn more about splunk
Tommy 👾 tweet media
English
2
0
3
49
Tommy 👾 retweetledi
Elorm Daniel
Elorm Daniel@elormkdaniel·
70+ Vital Windows Commands Cheatsheet for Cybersecurity
Elorm Daniel tweet mediaElorm Daniel tweet mediaElorm Daniel tweet mediaElorm Daniel tweet media
English
5
80
445
23.5K
Tommy 👾
Tommy 👾@Tommy89434·
Cybersecurity is not for the weak Cybersecurity is not for the weak Cybersecurity is not for the weak Cybersecurity is not for the weak
English
0
1
4
46
Tommy 👾 retweetledi
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
How often do you properly wipe your data before selling or giving away an electronic device? I recently visited Accra Circle to purchase a second-hand phone for teaching advanced mobile forensics to my students. The device looked brand new. However, once I got home, I had a hunch to dig a little deeper and to my surprise, I uncovered a trove of personal data. The phone had previously belonged to a German national; I noticed during analysis. I was able to recover data going as far back as 2016, including call logs, WhatsApp messages, pictures, audio files, videos, SMS, and even full access to the file system. Clearly, the previous owner had not properly wiped the device before parting with it. There are more powerful things I was able to see. Surprisingly I was able to dial some numbers and they’re active on WhatsApp now😂. This is a critical reminder of the importance of secure data erasure. Simply resetting or deleting contents from a phone is not enough. In the field of digital forensics, our work goes beyond just preserving and analyzing evidence. There are situations where we are required by court order, judicial ruling, or client instruction to perform a complete forensic wipe of a device. Proper data destruction is just as important as data recovery, especially when privacy, confidentiality, and compliance are on the line. This applies to everyone🤍 Factory Reset or deleting ≠ Secure Wipe
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
35
132
596
62.8K
Tommy 👾
Tommy 👾@Tommy89434·
Today’s episode of me learning cybersecurity 🎙️ TCM SOC 101 : Today, installed splunk universal forwarder on my windows 10 and use my Ubuntu machine as the receiver and created an alert 🚨 to show when security events are cleared on the windows machine #100DaysOfCyberSecurity
Tommy 👾 tweet mediaTommy 👾 tweet mediaTommy 👾 tweet mediaTommy 👾 tweet media
English
0
0
2
74
willivm
willivm@u6achukwu·
Without saying “yes, Yh, yup, yeah, yep” answer in one word. Do you need money?
willivm tweet media
English
8.4K
663
12.1K
1.1M