Profile avatar
dan-nanni.bsky.social
Daily education on Linux, networking, and cybersecurity Dan’s infographics: https://study-notes.org
323 posts 263 followers 1 following
Prolific Poster

Here are a list of useful Linux commands for looking up hardware related information πŸ˜ŽπŸ‘‡ #sysadmin #devops #hardware #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

The AI/ML software stack consists of layered tools that support the entire machine learning lifecycle πŸ˜ŽπŸ‘‡ #ai #machinelearning #devops #softwareengineer #softwaredeveloper Find high-res pdf books with all my #technology related infographics at study-notes.org

Linux offers a variety of compression tools, each with its own performance characteristics Below is a benchmark showcasing how some of these tools perform πŸ˜ŽπŸ‘‡ #sysadmin #opensource #foss #devops Find pdf books with all my #Linux related infographics at study-notes.org

Systemd tools are key utilities in Linux for controlling system servicesβ€”allowing you to start and stop services, as well as view system logs. Here are useful systemd commands πŸ˜ŽπŸ‘‡ #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

In Linux, file types define how the kernel recognizes and interacts with files, influencing actions such as reading, writing, and executing them within the filesystem πŸ˜ŽπŸ‘‡ #sysadmin #devops #opensource Find pdf books with all my #Linux related infographics at study-notes.org

Here is how SSL/TLS handshake works step by step πŸ˜ŽπŸ‘‡ #infosec #privacy #encryption #devops Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Here are popular Markdown editors that are available for different OS platforms πŸ˜ŽπŸ‘‡ #coding #programming #opensource #linux #macos Find high-res pdf books with all my #DevOps related infographics at study-notes.org

When you power on a Linux computer, a series of behind-the-scenes steps take place during the boot process before you reach the login screen Here is the step-by-step Linux boot sequence πŸ˜ŽπŸ‘‡ #sysadmin #devops Find pdf books with all my #Linux related infographics at study-notes.org

nmcli is a command-line utility that interacts with NetworkManager, enabling users to create, modify, and manage network connections from the terminal Here are useful nmcli command examples πŸ˜ŽπŸ‘‡ #sysadmin #devops Find pdf books with all my #Linux related infographics at study-notes.org

Different types of open-source licenses πŸ˜ŽπŸ‘‡ #opensource #foss #linux Find high-res pdf books with all my #DevOps related infographics at study-notes.org

How DNS amplification attack works πŸ˜ŽπŸ‘‡ #infosec #dns #technology Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Podman vs. Docker comparison πŸ˜ŽπŸ‘‡ #docker #container Find high-res pdf books with all my #DevOps related infographics at study-notes.org

Here are useful and popular third-party #python libraries πŸ˜ŽπŸ‘‡ #coding #programming #softwaredevelopment #softwareengineering Find high-res pdf books with all my #DevOps related infographics at study-notes.org

Messaging apps allow us to communicate instantly using text, voice, or video. Here are a list of #opensource messaging apps πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux related infographics at study-notes.org

If I had to pick a personal favorite among lesser-known Linux commands, it would be lsof. It’s my go-to tool for discovering which files are open and which processes are using them πŸ˜ŽπŸ‘‡ #sysadmin #opensource Find pdf books with all my #Linux related infographics at study-notes.org

TLS, IPsec, and SSH are widely used protocols for securing network communication, each with distinct roles and operating at different layers of the network stack πŸ˜ŽπŸ‘‡ #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

Staying tuned to top cybersecurity podcasts is a great way to stay informed about emerging threats, evolving trends, and practical defense strategies in the fast-changing world of digital security πŸ˜ŽπŸ‘‡ #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

Sandboxing tools improve security by isolating applications in controlled environments. Here are Linux sandboxing tools available across the kernel and user space πŸ˜ŽπŸ‘‡ #cybersecurity #sysadmin #infosec Find high-res pdf books with all my #Linux related infographics at study-notes.org

Linux filesystem tools are divided into two types: those that work universally across all filesystems, and those designed for specific filesystems πŸ˜ŽπŸ‘‡ #sysadmin #devops #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

USB standards define data transfer speeds, while connector types, often reused across versions, support multiple rates depending on the implementation πŸ˜ŽπŸ‘‡ #usb #computer Find high-res pdf books with all my #technology related infographics at study-notes.org

Here are useful curl command examples πŸ˜ŽπŸ‘‡ #sysadmin #devops #opensource Find high-res pdf books with all my #linux related infographics at study-notes.org

Here is a list of programming languages, their creators, the year they were created, and how old the creators were at that time πŸ˜ŽπŸ‘‡ #coding #programming #softwaredevelopment #softwareengineering Find high-res pdf books with all my #DevOps related infographics at study-notes.org

Here are a list of container security tools available for #Linux πŸ˜ŽπŸ‘‡ #devops #docker #kubernetes #infosec Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Python offers a rich set of libraries for penetration testing, enabling tasks like network scanning, exploit development, web vulnerability analysis, and payload generation πŸ˜ŽπŸ‘‡ #infosec #python #pentest Find pdf books with all my #cybersecurity related infographics at study-notes.org

Tor routes internet traffic through a series of volunteer-operated relays, wrapping it in multiple layers of encryption to protect user’s #privacy Here is what the Tor architecture looks like πŸ˜ŽπŸ‘‡ #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

The init system is responsible for starting Linux, launching services, and managing processes. Here is a summary of available init systems and which distros are using them by default πŸ˜ŽπŸ‘‡ #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

DNS cache poisoning is a security attack that corrupts a DNS resolver’s cache by injecting false records. Here is how the attack works and how to protect from it πŸ˜ŽπŸ‘‡ #infosec #dns #pentesting Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Here are popular Linux commands for log processing πŸ˜ŽπŸ‘‡ #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

#Android file system is based on #Linux and organized into distinct partitions: /system for core OS files, /data for apps and personal data, and /storage to internal and external storage πŸ˜ŽπŸ‘‡ Find pdf books with all my #technology related infographics at study-notes.org

NTP (Network Time Protocol) keeps clocks in sync across computer systems while considering network delays and variability. Here is how NTP clock synchronization works πŸ˜ŽπŸ‘‡ #sysadmin #devops Find pdf books with all my #networking related infographics at study-notes.org

Linux offers a rich set of command-line tools for network diagnostics, monitoring and configuration. Here are a categorized list of networking CLI tools available on Linux πŸ˜ŽπŸ‘‡ #sysadmin #opensource Find high-res pdf books with all my #Linux related infographics at study-notes.org

Just like anything else, even widely used Linux tools can become outdated as better and more efficient options emerge. Here are examples of deprecated Linux commands πŸ˜ŽπŸ‘‡ #opensource #sysadmin Find high-res pdf books with all my #Linux related infographics at study-notes.org

The Bash Bunny is a powerful USB attack platform designed to automate penetration testing tasks. Here is a quick breakdown of its main features and what you can do with them πŸ˜ŽπŸ‘‡ #cybersecurity Find pdf books with all my #infosec related infographics at study-notes.org

Here are popular file managers that are available on Linux πŸ˜ŽπŸ‘‡ #opensource #sysadmin Find pdf books with all my #Linux related infographics at study-notes.org

UEFI vs. Legacy BIOS comparison πŸ˜ŽπŸ‘‡ #computer #hardware Find high-res pdf books with all my #technology related infographics at study-notes.org

β€œDefense in depth” is a security approach that uses multiple layers of protection throughout an organization’s IT environment πŸ˜ŽπŸ‘‡ #infosec Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Here is a quick comparison between forward and reverse proxies πŸ˜ŽπŸ‘‡ #linux #opensource Find high-res pdf books with all my #DevOps related infographics at study-notes.org

A remote desktop protocol is a network-level standard that defines how data is transmitted to let users control a remote computer Here is a quick comparison of widely used remote desktop protocols πŸ˜ŽπŸ‘‡ #opensource #technology Find pdf books with all my #Linux infographics at study-notes.org

Power over Ethernet (PoE) is a technology that allows both electrical power and data to be transmitted through a single #Ethernet cable. Here is a breakdown of various PoE configurations πŸ˜ŽπŸ‘‡ #iot #sysadmin Find pdf books with all my #networking related infographics at study-notes.org

Kali is a purpose-built Linux distro tailored for cybersecurity experts and ethical hackers. Here is a categorized breakdown of key security tools included in Kali #Linux πŸ˜ŽπŸ‘‡ #infosec #pentesting Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Here are popular IT infrastructure monitoring systems, featuring both open-source and commercial options πŸ˜ŽπŸ‘‡ #linux #sysadmin Find high-res pdf books with all my #DevOps related infographics at study-notes.org

The ip command in Linux is a powerful tool used to configure and manage network interfaces, routing tables, and network policies. Here are useful ip command examples πŸ˜ŽπŸ‘‡ #sysadmin #networking Find high-res pdf books with all my #Linux related infographics at study-notes.org

When you enter a command in a Linux shell, the shell parses it, locates the executable, creates a child process, and runs the command. Once done, it captures and returns the exit status πŸ˜ŽπŸ‘‡ #sysadmin #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org

Flipper Zero is a compact, all-in-one gadget built for hardware hacking, signal exploration, and penetration testing. Here is a quick breakdown of its main features and what you can do with them πŸ˜ŽπŸ‘‡ #infosec Find pdf books with all my #cybersecurity related infographics at study-notes.org

The journalctl command lets you view and manage logs collected by systemd’s centralized logging system across the whole machine Here are useful journalctl command examples πŸ˜ŽπŸ‘‡ #sysadmin Find high-res pdf books with all my #Linux related infographics at study-notes.org

Here is a step by step procedure for the SSH protocol to establish a secure channel πŸ˜ŽπŸ‘‡ #infosec #ssh Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

ARM and x86 are two dominant CPU architectures, each with distinct instruction sets and design approaches. Here is a quick comparison of these two CPU architectures πŸ˜ŽπŸ‘‡ #arm #intel #amd Find pdf books with all my #technology related infographics at study-notes.org

Here is a quick comparison of hub, switch and router devices in terms of their operating mode and features πŸ˜ŽπŸ‘‡ #networking #datacenter #ccna Find high-res pdf books with all my networking related infographics at study-notes.org

Cybersecurity relies on a range of color-coded teamsβ€”blue, red, purple, yellow, green, and whiteβ€”each focused on different roles πŸ˜ŽπŸ‘‡ #infosec Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

The awk command is a versatile tool for processing text, enabling users to scan files or streams, match patterns, and perform custom actions on the matched data πŸ˜ŽπŸ‘‡ #sysadmin #opensource #devops Find high-res pdf books with all my #Linux related infographics at study-notes.org