Srinivasan

19 posts

Srinivasan banner
Srinivasan

Srinivasan

@its_vasan

127.0.0.1 Katılım Kasım 2024
1.1K Takip Edilen13 Takipçiler
Srinivasan retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
💻 France to Replace Windows with Linux on Government Desktops Source: cybersecuritynews.com/france-replace… France has taken a decisive step toward digital sovereignty, announcing plans to migrate government workstations from Microsoft Windows to Linux. The move was formally declared during an interministerial seminar held on April 8, 2026, organized by the Interministerial Directorate for Digital Affairs (DINUM), the National Cybersecurity Agency of France (ANSSI), the Directorate General for Enterprises (DGE), and the State Procurement Directorate (DAE). DINUM officially announced its exit from Windows, signaling a full migration to Linux-based workstations across state infrastructure. #cybersecuritynews
Cyber Security News tweet media
English
29
111
412
14.9K
Srinivasan retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Russian Hackers Exploiting Home Routers in Massive DNS Hijacking Attack Source: cybersecuritynews.com/russian-hacker… A large-scale campaign by Forest Blizzard, a Russian military-linked threat actor, targeting home and small-office routers to hijack DNS traffic and intercept encrypted communications with over 200 organizations and 5,000 consumer devices already compromised. The attack chain begins with Forest Blizzard gaining unauthorized access to poorly secured SOHO routers and silently modifying their default network settings. Specifically, the actor replaces the router's legitimate DNS resolver configuration with actor-controlled DNS servers. Since endpoint devices, such as laptops, phones, and workstations, automatically inherit network configuration from routers via the Dynamic Host Configuration Protocol (DHCP), every device connecting through a compromised router unknowingly begins forwarding its DNS requests to Russian intelligence-controlled infrastructure. #cybersecuritynews
Cyber Security News tweet media
English
11
116
291
14.6K
Srinivasan retweetledi
Om
Om@Om_Codes_·
- Meet Anders Hejlsberg - Creator of C# and TypeScript - A self-taught programmer - Joined Microsoft - Saw that Java dominated everything - Microsoft needed a modern language for its new platform .NET - But there were legal conflicts around Java - He said: “Fine… I’ll build something better.” - Wanted a language that is: > Easy like Java > Powerful like C++ - Launched C# in 2000 - it became one of the most widely used languages for: > Enterprise applications > Game development (Unity) > Windows software But He Wasn’t Done… - Later noticed problems with JavaScript: > Hard to scale for large applications > Bugs and maintainability issues - Created TypeScript - Designed it to: > Work with existing JavaScript (no breaking changes) > Compile into plain JavaScript Today, TypeScript is widely used in Angular, React, Node.js and more Adopted by major companies like Google, Microsoft, Airbnb didn’t code it alone but without him, it wouldn’t exist. absolute legend 🔥
Om tweet mediaOm tweet media
English
54
130
1.5K
87.6K
Srinivasan retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Windows Defender 0-Day Exploit Code, Allowing Attackers to Gain Full Access Source: cybersecuritynews.com/windows-defend… A security researcher operating under the alias Chaotic Eclipse has publicly dropped a working zero-day local privilege escalation (LPE) exploit for Windows, dubbed BlueHammer, along with full proof-of-concept (PoC) source code on GitHub. BlueHammer is a Windows zero-day LPE exploit that allows a low-privileged local user to escalate their access to NT AUTHORITY\SYSTEM the highest privilege level on a Windows machine. A screenshot shared alongside the disclosure dramatically demonstrates the impact: a command prompt launched from C:\Users\limited\Downloads> — clearly a restricted user account — achieves a full SYSTEM shell within seconds, with whoami confirming nt authority\system. #cybersecuritynews #windows #vulnerability
Cyber Security News tweet media
English
8
105
381
26K
Srinivasan retweetledi
kritika
kritika@vibeonX69·
Linus Torvalds built Linux at 21 -no AI -no funding -no team -Just a side project. -Today it runs most of the internet. That’s what legends build. 🐧
kritika tweet media
English
16
33
327
15.2K
Srinivasan retweetledi
Techjunkie Aman
Techjunkie Aman@Techjunkie_Aman·
Most Linux distros give you a system. Gentoo gives you control. • Everything built from source (no prebuilt binaries) • Optimized for YOUR CPU (compile-time tuning) • USE flags control features + dependencies • No bloat (install only what you need) • Rolling release (no versions, just updates) Powered by Portage: • 19k+ packages • Fine-grained install control • System-wide or per-package customization What makes it different: • No fixed editions (you define everything) • No forced defaults or preconfigured stacks • Choice of init system (OpenRC default, systemd optional) • Other distros ship binaries — Gentoo builds them It’s called a meta-distribution. Because you don’t install Gentoo. You build exactly the system you want.
Techjunkie Aman tweet mediaTechjunkie Aman tweet mediaTechjunkie Aman tweet mediaTechjunkie Aman tweet media
English
31
26
272
21.1K
Srinivasan retweetledi
Dave W Plummer
Dave W Plummer@davepl1968·
Before DNS, the Internet ran on a single text file. You wanted a hostname? You emailed Elizabeth Feinler’s team at SRI. They edited their local HOSTS.TXT and then everyone downloaded the new copy! That worked… until it didn’t. By 1983, it was obvious this wouldn’t scale, so Paul Mockapetris created DNS: distributed, hierarchical, no single point of failure. The modern Internet exists because we stopped relying on one file to keep it all straight!
Dave W Plummer tweet media
English
85
311
3.4K
151.6K
Srinivasan retweetledi
Hacking Articles
Hacking Articles@hackinarticles·
SSH Penetration Testing (Port 22) 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles SSH (Secure Shell) is a cryptographic protocol used for secure remote login and command execution over unsecured networks. During penetration testing, misconfigurations or weak credentials in SSH services can allow attackers to gain unauthorized access. () 📚 Techniques Covered in This Guide 🔎 Enumeration with Nmap 🔐 Password Cracking using Hydra ⚡ Authentication using Metasploit 💻 Running Commands on Remote Machine 🔁 SSH Port Redirection 🧪 Nmap SSH Brute Force Script 🔍 Enumerating SSH Authentication Methods 🔑 Key-Based Authentication 🛠 Key-Based Authentication using Metasploit 📦 Post Exploitation using Metasploit 🌐 Local Port Forwarding (Password Based) 🔐 Local Port Forwarding (Key Based) 📖 Article: hackingarticles.in/ssh-penetratio… #CyberSecurity #EthicalHacking #Pentesting #SSH #RedTeam #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
6
165
1.1K
47.2K
Srinivasan retweetledi
Om
Om@Om_Codes_·
- Meet James Gosling - Creator of Java - Built his first computer from scratch as a teenager - Loved math, science, and tinkering with electronics - Preferred experimenting on his own rather than traditional classroom learning - joined Sun Microsystems and noticed a major problem - Programming languages were complex, unsafe, and hardware-dependent - Code couldn’t run easily across different machines - Many projects failed due to system incompatibility - got Frustrated with these limitations - Created a new language called “Oak” - They wanted simple, catchy, and energetic name - The team was drinking coffee during brainstorming ☕ - so Later they renamed it to Java - he wrote the original Java compiler and virtual machine himself - designed it to be Simple, Secure, Platform-independent - it became one of the most influential programming languages in history - Widely used in: Web applications, Android apps, Enterprise systems, Banking software - Adopted by millions of developers worldwide - earned the nickname as “Father of Java” - literally changed how software is built across the world. Absolute legend.
Om tweet mediaOm tweet media
English
71
344
2.5K
167.5K
Srinivasan retweetledi
diyu
diyu@haha_girrrl·
Set-up for building set-up for copying linux. Code from claude
diyu tweet mediadiyu tweet media
English
30
20
437
16.3K
Srinivasan retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
💻 Microsoft is forcing upgrades to Unmanaged Windows 11, Version 24H2 Source: cybersecuritynews.com/microsoft-wind… Microsoft has officially begun force-upgrading unmanaged Windows 11 version 24H2 devices to version 25H2, marking the final phase of a staged rollout that relies on machine learning to determine device readiness. The move, confirmed in an updated Windows Release Health Dashboard entry, affects all Home and Pro edition devices not managed by IT departments. Starting this week, Microsoft expanded its machine learning-based intelligent rollout to all eligible unmanaged devices running Windows 11, version 24H2 Home and Pro editions. #cybersecuritynews #windows11
Cyber Security News tweet media
English
2
31
90
5.5K
Srinivasan retweetledi
Nostalgia Galaxy
Nostalgia Galaxy@NostalgiaYZ·
A normal Saturday morning in the early 2000s.
English
44
595
3.9K
102.7K
Srinivasan retweetledi
Gammitin (Ben) 💾
Gammitin (Ben) 💾@Gammitin·
Settled in for an evening of browsing the internet like it's the 90's on NexSTEP OS machine. Searching around to find old http sites still running. I thought this was quite apt: Tim Berners-Lee's first World Wide Web page, that was hosted on a NeXT Computer. I'm Geeking Out 🤓
Gammitin (Ben) 💾 tweet media
English
12
55
485
13.6K
Srinivasan retweetledi
0xC0DE
0xC0DE@0xC0DE6502·
Scaled up everything by a factor of 2. The on-the-fly double size sprite plotting routines are a pig to write 🥵 (I don't want to store huge pre-scaled sprites (and masks!) in RAM)
English
5
8
93
5.8K
Srinivasan retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🛡️ Microsoft to Remove EXIF Data for Images Shared on Teams Source: cybersecuritynews.com/microsoft-remo… Microsoft has announced an important update for its Teams platform. As part of the March 2026 feature rollout, Microsoft Teams will now automatically remove EXIF metadata from all images shared across chats and channels. This privacy-by-default measure aims to protect users from unintentionally leaking sensitive location and device information to internal colleagues, external guest partners, or potential threat actors. EXIF data is hidden text embedded inside digital photos. When capturing a picture, the file quietly records highly specific details. #cybersecuritynews #microsoftteams
Cyber Security News tweet media
English
5
29
88
6.5K
Srinivasan retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🛡️ OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues Source: cybersecuritynews.com/openssh-10-3-r… The OpenSSH project released version 10.3 and 10.3p1 on April 2, 2026, addressing a shell injection vulnerability and introducing several security-hardening changes that administrators should review before upgrading. The most notable security fix targets a shell injection vulnerability in the -J (ProxyJump) command-line option. Prior to this release, user and host names passed via -J or -oProxyJump="..." on the command line were not validated, creating an opportunity for shell injection if those values were directly sourced from adversarial input. #cybersecuritynews
Cyber Security News tweet media
English
0
23
75
2.7K
Srinivasan retweetledi
Claude
Claude@claudeai·
Microsoft 365 connectors are now available on every Claude plan. Connect Outlook, OneDrive, and SharePoint to bring your email, docs, and files into the conversation. Get started here: claude.ai/customize/conn…
Claude tweet media
English
835
1.4K
16.6K
4.1M