Cyber_yodha_ Profile Banner
Zerobug_OS Profile
Zerobug_OS

@Cyber_yodha_

Followers
4
Following
7
Media
43
Statuses
76

Follow to be updated

Joined June 2022
Don't wanna be here? Send us removal request.
@Cyber_yodha_
Zerobug_OS
3 days
0
0
1
@Cyber_yodha_
Zerobug_OS
5 days
πŸ” How Does HTTPS Work? πŸ”. Ever wondered how HTTPS secures your communication online? Let’s break it down!. βœ… HTTPS (HyperText Transfer Protocol Secure) ensures encrypted, secure data transmission between a client (browser) and a server using TLS (Transport Layer Security)
0
0
0
@Cyber_yodha_
Zerobug_OS
5 days
🐳 DeepSeek 'Nothing to See Here'.Except for the Data Going to China! πŸ‡¨πŸ‡³ .David Bombal ran the tests. Wireshark doesn’t lie. DeepSeek is sending data to Beijing. even as it insists it isn’t. Meanwhile,China is up in arms about Australia banning the app from government devices.
0
0
0
@Cyber_yodha_
Zerobug_OS
6 days
0
0
0
@Cyber_yodha_
Zerobug_OS
7 days
But can you hack. πŸ˜‚πŸ€£.I just say Im in CyberSecurity and everything thinks that means Im a hacker. Its amazing
Tweet media one
0
0
0
@Cyber_yodha_
Zerobug_OS
9 days
Fixing Active Directory Trust Relationship Problems. Method 1: Disjoin & Rejoin Domain . Open as local admin. Disjoin:.Use this command:.disjoin /leave.Reboot computer.Rejoin domain.Use this command:.disjoin /domain Domain Name /user Domain Admin User /passwords *.Reboot computer
Tweet media one
0
0
0
@Cyber_yodha_
Zerobug_OS
9 days
πŸš€ Mastering Network Analysis with Wireshark πŸš€. Wireshark stands as the ultimate tool for network protocol analysis
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
1
@Cyber_yodha_
Zerobug_OS
9 days
πŸš€ Mastering Network Analysis with Wireshark πŸš€. #Wireshark #NetworkSecurity #CyberSecurity #PacketAnalysis #NetworkMonitoring #IT #ThreatDetection
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
0
@Cyber_yodha_
Zerobug_OS
9 days
πŸš€ Mastering Network Analysis with Wireshark πŸš€. #Wireshark #NetworkSecurity #CyberSecurity #PacketAnalysis #NetworkMonitoring #IT #ThreatDetection
Tweet media one
Tweet media two
0
0
0
@Cyber_yodha_
Zerobug_OS
11 days
Linux Boot Process Explained
0
0
0
@Cyber_yodha_
Zerobug_OS
12 days
πŸ“Œ Botnets are silent threats that turn infected devices into tools for malicious activities. They can spread malware, launch DDoS attacks, and steal sensitive data all without your knowledge. #BotnetThreats #CyberAwareness #StaySafeOnline #CyberDefense #Infosec
Tweet media one
0
0
0
@Cyber_yodha_
Zerobug_OS
14 days
This tool is a script designed to encourage learning how to perform DoS attacks using the Scapy, Requests, and Socket modules in Python. The author is not responsible for any illegal usage. πŸ“Œ Network Layer DoS Attacks (Layer 3/4).SYN FLOOD.ACK FLOOD.UDP FLOOD.ICMP FLOOD.SMURF
0
0
0
@Cyber_yodha_
Zerobug_OS
19 days
The grep command is a powerful Linux tool that searches for text in files or streams by matching patterns specified by the user.#linux #linuxfan #linuxuser #softwaredeveloper #linuxserver #kalilinux #archlinux #softwareengineer #sysadmin#devops#devopsengineer#systemadministrator
Tweet media one
0
0
1
@Cyber_yodha_
Zerobug_OS
20 days
As the dominant cloud OS, Linux powers a variety of server applications. Here are some of the most popular open-source Linux server software and management tools πŸ˜ŽπŸ‘†
Tweet media one
0
0
0
@Cyber_yodha_
Zerobug_OS
20 days
As the dominant cloud OS, Linux powers a variety of server applications. Here are some of the most popular open-source Linux server software and management tools πŸ˜ŽπŸ‘†.
0
0
0