DON STEVE

1.8K posts

DON STEVE banner
DON STEVE

DON STEVE

@donsteve__

Documenting my journey into Cybersecurity & Ethical Hacking Sharing lessons, tools & beginner insights Follow along as I grow

Abuja, Nigeria Katılım Mayıs 2017
583 Takip Edilen418 Takipçiler
Sabitlenmiş Tweet
DON STEVE
DON STEVE@donsteve__·
I started my cybersecurity journey in December. I’m learning ethical hacking, labs, and how systems get secured. I’ll be sharing everything I learn—from beginner mistakes to real progress. If you’re also starting, follow along. Let’s grow together.
English
1
1
19
677
DON STEVE
DON STEVE@donsteve__·
@ireteeh Exactly. Now is the time and the time is now. Very inspiring writing ma. I am motivated.
English
0
1
2
141
Dr Iretioluwa Akerele
Cybersecurity skills will always be in demand. It’s not just about reacting to attacks, but staying ahead of them. If you are in this field, keep learning. If you are looking to break in, now is still the right time. The threats are evolving.
English
6
21
98
1.5K
DON STEVE
DON STEVE@donsteve__·
@ireteeh Honestly speaking Doc. The one trending on Facebook since last week concerning a young man who was kidnapped on his way to and fro a journey within the North Central part of Nigeria and is still held captive still makes me so sad and weep for Nigeria. 😭 😭
English
0
0
1
19
Dr Iretioluwa Akerele
Recently, it’s been depressing coming online. It’s one kidnapping news or the other. A lot of people are helpless and there is no hope in sight. What’s the way forward? 😭😭
English
8
14
68
1.2K
Jemimah
Jemimah@dav63434·
I am Officially monetised 🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉 I have worked so hard for this, it wasn't easy. It is finally time to get paid. It took me 10days. W's in the chats 🍾🍾 Congratulations to me😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭😭
Jemimah tweet media
English
671
115
1.1K
17.5K
DON STEVE
DON STEVE@donsteve__·
@Ahmed___khaan Perhaps an unknown threat is more dangerous cuz first of all you have to know you're fighting something, then you know what you're fighting before you know how to fight it.
English
0
0
0
178
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
In cybersecurity, what’s more dangerous? A. Known threats Or B. Unknown threats
English
23
1
31
3.5K
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
What’s the HARDEST part of a Cybersecurity job?
English
11
2
28
2.4K
Gabriel Odusanya • WoTxOSec
Happy Birthday 🥳 to me !!! +1 in God's presence. My new age is filled with Joy, blessings, Mercy and abundant grace of the lord. GM x fam
Gabriel Odusanya • WoTxOSec tweet media
English
81
9
174
2.6K
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
What's the best OS For Hacking?
Ahmedkhan tweet media
English
20
6
31
2K
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
When it comes to ethical hacking which is more reasonable to learn A. PYTHON or B. JAVASCRIPT
English
25
8
42
6.6K
TheCryptoBolt
TheCryptoBolt@TheCryptoBolt·
Day 20 of Python for Cybersecurity. Today everything started to connect. I built a simple login_function(username, password) and added logging to track what actually happens—who gets in, and who doesn’t. Then I went a step further and wrote a script to read those logs. That’s when it changed. What looked like random failed logins suddenly formed a pattern—same usernames showing up again and again, attempts stacking over time. It didn’t feel like data anymore. It felt like someone trying… repeatedly. That’s when it clicked: this is how brute-force attempts reveal themselves. Tomorrow, I’ll try to catch it as it happens.
TheCryptoBolt tweet mediaTheCryptoBolt tweet mediaTheCryptoBolt tweet mediaTheCryptoBolt tweet media
TheCryptoBolt@TheCryptoBolt

Day 19 of Python for Cybersecurity Today I took something I had already built, a simple login script and started shaping how it behaves under pressure. At first, every failed login looked the same. Just a wrong password message. But then I added structure with Python’s logging module, and things started to feel different. A single failed attempt became a warning… and repeated failures slowly escalated into a critical alert. Same input, same function but now the system starts to react based on patterns, not just events. I also wired it to files using file handlers, so everything gets recorded quietly in the background. One file tracks normal activity, another keeps the serious stuff. From a cybersecurity perspective, this is where things start to matter: — You begin to see how systems detect suspicious behavior — You understand how small actions can escalate into alerts — And you start thinking like the system, not just the user Still early in the journey, but this felt like one of those moments where code stops being just code… and starts acting like a real security system ⚡

English
3
0
16
139
Maryam Shuaibu Aliyu
Maryam Shuaibu Aliyu@Cyberhijabitech·
To every African founder building quietly, Your environment is harder. Your resources are fewer. Your impact is bigger. Keep building.
English
4
17
71
790
Dr. Omolola Anthonia Eddo
Dr. Omolola Anthonia Eddo@dranthoniaeddo·
Which part of Twitter do you belong to? 🤔 Tech Twitter 💻 Employment Twitter 💼 HR Twitter 📊 Politics Twitter 🗳️ Love Twitter ❤️ Christian Twitter ✝️ Muslim Twitter ☪️ Entertainment Twitter 🎬 Music & Entertainment Twitter 🎶 Pick one ☝️ If yours isn’t here, add it to the list
English
28
10
34
2K
Dr Iretioluwa Akerele
Elon Musk is in my DM. I have made it in life 🤣🤣🤣🤣🤣
Dr Iretioluwa Akerele tweet media
English
61
6
110
14.9K
DON STEVE
DON STEVE@donsteve__·
I joined a space today on personal branding and I learned a lot. Two things that stood out for me: 1. Don’t be afraid to put yourself out there 2. Speak to yourself with confidence. YOUR PERSONAL BRAND IS YOUR RESUME. Thanks to the host @cyberjeremiah and all the speakers.
DON STEVE tweet media
English
0
1
7
95
CyberSHIELD | CybersecurityOS🛡️
Cybersecurity is better with community. If you work in cybersecurity (or are learning), drop a “Hi” & let’s connect. Follow others in the replies too!
English
103
5
152
8.9K
Hunt 🧢
Hunt 🧢@Internethunts·
almost one month journey so far :)
Hunt 🧢 tweet mediaHunt 🧢 tweet media
English
29
3
56
1.6K