Redbeard · @redbeardsec
17 followers · 80 posts · Server infosec.exchange

What is a ? It's an executable file that can be used to bypass security restrictions and gain unauthorized access to a system. Read more here

redbeardsec.com/exploring-what

#securityawareness #lolbin #cybersecurity #systemsecurity #cyberawareness

Last updated 3 years ago

Taffy · @Taffy
3 followers · 6 posts · Server cyberplace.social

Linux kernel hardening is a crucial aspect of securing your system. By implementing techniques such as kernel-level access controls and removing unnecessary kernel modules, you can greatly reduce the attack surface of your system and increase its resistance to malicious actors. Don't neglect this crucial step in your overall security strategy.

#linuxsecurity #kernelhardening #cernalhardening #linuxcernal #linuxkernel #systemsecurity #cybersecurity #linuxadmin #linuxtips #linuxtricks

Last updated 3 years ago

Sten Eikrem · @Storesteinen
52 followers · 103 posts · Server infosec.exchange

@thejuan @wall_e @SheHacksPurple I would suggest the bridge is called ; Application/Product/Service secure implementation, network, users, controls, connectivity etc. Combine enough system security concepts and voila; you have covered a whole company :)

#systemsecurity

Last updated 3 years ago

AiRolG · @airolgloria
15 followers · 406 posts · Server mastodon.online

Come on! 🤣


credit: I am a Programmer, I have no life

#tooMuch #transparent #systemsecurity #systemdesign #security

Last updated 4 years ago

Karl Voit :emacs: :orgmode: · @publicvoit
1267 followers · 11459 posts · Server graz.social

RT @Amprion@twitter.com

Europe experienced a system separation between 4:36 and 5:10 p.m. Amprion was able to co-ordinate the resynchronisation of the Iberian peninsula. The cause for this incident is now under investigation.

🐦🔗: twitter.com/Amprion/status/141

#systemsecurity

Last updated 4 years ago