Gideon_Web3Design

137 posts

Gideon_Web3Design banner
Gideon_Web3Design

Gideon_Web3Design

@Gid_Web3Design

Graphic Designer || Brand Designer

Ikot-Abasi, Nigeria 加入时间 Kasım 2025
83 关注13 粉丝
Akintola Steve
Akintola Steve@Akintola_steve·
There is more to life than making money
English
17
2
42
711
Abhi
Abhi@AbhiCodes15·
honestly, which distro is best for beginners?
Abhi tweet mediaAbhi tweet mediaAbhi tweet mediaAbhi tweet media
English
40
4
115
1.6K
Gabriel Odusanya • WoTxOSec
The name "Gabriel Odusanya" will open door for people. People will hear the name and be stunned, is this the same guy.
English
1
0
5
91
Favejohn #WID
Favejohn #WID@favejohn_·
Congratulations to meee!🙂‍↔️ Bachelor of Nursing Sciences (Hons) bagged!!!🎓💜
Favejohn #WID tweet media
English
158
14
491
5.8K
prashant varma
prashant varma@realpvarma·
Which Linux skill actually matters the most? - Shell scripting - Distro hopping - Command line mastery - System troubleshooting
prashant varma tweet media
English
41
1
46
1.3K
DON STEVE
DON STEVE@donsteve__·
Day 6 of Learning Linux I used to think Linux was just one “thing”… 🐧 then I saw this 👇
DON STEVE tweet media
English
2
0
5
33
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Which distro are you using?
Ahmedkhan tweet media
English
1
1
10
812
Based On Believe
Based On Believe@chukwupg·
What Is OSINT? As I’ve been learning reconnaissance, one area that stands out is OSINT (Open-Source Intelligence), and how powerful it really is. OSINT is simply the process of collecting information from publicly available sources. What makes it interesting is that both attackers and security professionals rely on it heavily. Some common OSINT sources include: - Social media profiles - Public databases - Company websites - Job postings - Domain registration records While practicing, I started noticing how small details can reveal much more than intended. For example, a job posting asking for experience with specific tools or technologies can indirectly expose: - The company’s tech stack - Potential vulnerabilities - Areas attackers might focus on The key lesson for me: You don’t always need to “hack” a system to understand it, sometimes, the information is already out there, but you need to know how to find it. That’s why organizations need to think beyond infrastructure security and pay attention to information exposure. Because in cybersecurity, what you reveal publicly can shape your attack surface. #Infosec #Hacking #Pentesting #Cybersecurity #EthicalHacking
Based On Believe tweet media
English
1
0
5
77
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
What's the best OS For Hacking?
Ahmedkhan tweet media
English
28
8
47
3K
Abdulkadir | Cybersecurity
LINUX KNOWLEDGE CHECKPOINT Which special permission ensures that only the file owner can delete a file within a directory, even if others have write access? A) SUID B) SGID C) Sticky bit D) Execute bit
English
10
2
25
4.5K
DON STEVE
DON STEVE@donsteve__·
@Gid_Web3Design Interesting. I also got started with Linux recently and it's been amazing. What materials are you currently learning from?
English
1
0
2
7
Zinny 🎀
Zinny 🎀@Zinny_Edmund·
Every self-taught software developer knows this man 👨‍💻
Zinny 🎀 tweet media
Enugu, Nigeria 🇳🇬 English
47
10
312
6.6K
Piyush
Piyush@piyush784066·
Be honest, Is understanding code still necessary in the age of AI?
Piyush tweet media
English
34
4
72
2.2K
CyberSHIELD | CybersecurityOS🛡️
Cybersecurity is better with community. If you work in cybersecurity (or are learning), drop a “Hi” & let’s connect. Follow others in the replies too!
English
103
5
152
9K
ShaiGuides
ShaiGuides@shaiguides·
i’m back! i defended my PhD dissertation and i am proud to say i am officially a doctor! :)
English
149
123
2.4K
51.3K