Profile avatar
dan-nanni.bsky.social
Daily education on Linux, networking, and cybersecurity Dan’s infographics: https://study-notes.org
220 posts 233 followers 1 following
Prolific Poster

A virtual block device is a software-defined abstraction that emulates block storage on Linux, allowing flexible management and integration with various storage systems πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux related infographics at study-notes.org

UEFI (Unified Extensible Firmware Interface) and legacy BIOS are two different types of firmware used to initialize and boot a computer. UEFI is the modern successor to the older legacy BIOS πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #technology infographics at study-notes.org

Nsjail is a cli-based security sandboxing tool developed by Google. It utilizes #Linux namespaces, capabilities, cgroups, resource limits, and seccomp to achieve process-level isolation. It allows you to run untrusted applications in a controlled environment πŸ˜ŽπŸ‘‡ #cybersecurity #infosec nsjail.dev

Scp is a command-line utility provided by OpenSSH suite, which securely transfers files between a local host and a remote host by using the SSH protocol Here are a list of useful scp command examples πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux related infographics at study-notes.org

VisiData is a handy terminal tool for exploring, analyzing and wrangling tabular data. It lets you load and manipulate datasets, CVS, JSON, Excel, you name it, right from the command line. VisiData is written in Python, so you can easily install it on #Linux, #macOS, #Windows πŸ˜ŽπŸ‘‡ www.visidata.org

If you are interested in cybersecurity, these must-watch TV series dive into hacking, cyber threats, and digital espionage with thrilling narratives πŸ˜ŽπŸ‘‡ #infosec #tvshows Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Mastering Linux gives you the tools and flexibility to tackle real-world tech challenges and opens doors to careers in #sysadmin, #cybersecurity, and #DevOps Here is a roadmap to learning Linux πŸ˜ŽπŸ‘‡ Find pdf books with all my Linux related infographics at study-notes.org

Data centers offer the computing power and storage needed for cloud services and enterprise apps Here are the top 10 data center providers based on the number of locations they operate worldwide πŸ˜ŽπŸ‘‡ Find pdf books with all my #technology infographics at study-notes.org #datacenter

Linux distros focused on cybersecurity and privacy provide hardened security, anonymity tools, and forensic capabilities to protect users, enhance privacy, and support ethical hacking or incident response πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and #cybersecurity infographics at study-notes.org

Here are top-15 publicly traded companies specializing in cybersecurity πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

AAA (Authentication, Authorization, and Accounting) ensures secure access control by verifying user identity, enforcing permissions, and monitoring usage to detect anomalies and prevent misuse πŸ˜ŽπŸ‘‡ Find pdf books with all my #cybersecurity related infographics at study-notes.org

While the ps command is one of the most often used Linux utilities, many of you may not fully utilize its capabilities due to its complex and often confusing syntax Here are a list of useful ps command examples πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux related infographics at study-notes.org

Pentesters sometimes rely on browser extensions for convenience and direct integration with web applications during testing. Here are useful browser extensions for pentesters πŸ˜ŽπŸ‘‡ #infosec #pentest Find pdf books with all my #cybersecurity related infographics at study-notes.org

REMnux is a #Linux distro designed for malware analysis and reverse engineering. It comes with a pre-configured environment with tools for examining malicious software, digital forensics artifacts, network traffic, memory forensics, etc πŸ˜ŽπŸ‘‡ #infosec #cybersecurity remnux.org

Rack-mounted server specs are defined by a number of configurations including form factor, CPU cores, memory capacity, storage options, NIC bandwidth, cooling mode, power supply, and PCIe expansion slotsπŸ˜ŽπŸ‘‡ Find pdf books with all my #technology related infographics at study-notes.org

Cybersecurity training platforms offer interactive labs and challenges that replicate real-world attacks, allowing you to build and test pentesting skills in a safe environment πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Sniffnet is a cross-platform network monitoring tool that lets you sniff and analyze your traffic in real time. Cool features include real-time traffic chartvisualization, support for 6000+ layer-7 services, IP geolocation, etc. Available on #Linux, #macOS and #Windows πŸ˜ŽπŸ‘‡ sniffnet.net

Want to pick up a new programming language or master a DevOps tool? No problem! Plenty of great learning resources are available online for free! πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #DevOps related infographics at study-notes.org

A list of the most popular GitHub repositories related to cybersecurity πŸ˜ŽπŸ‘‡ Find pdf books with all my #cybersecurity related infographics at study-notes.org

Linux architecture separates User Space from Kernel Space. The Hardware Abstraction Layer (HAL) connects the kernel to hardware πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux related infographics at study-notes.org

Gear up for a movie night with these top cybersecurity flicks! πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

The vast array of Linux distros reflects the diversity of user needs, offering solutions for everything from minimal setups to complex, specialized tasks Which Linux distro is your choice? Find high-res pdf books with all my #Linux related infographics at study-notes.org

Public clouds operate in multiple geographical regions to ensure low latency, redundancy, and disaster recovery Here is a comparison of cloud regions for #AWS, #Azure and #Google Cloud Platform πŸ˜ŽπŸ‘‡ Find pdf books with all my #DevOps related infographics at study-notes.org

Starting as an init system on Linux, systemd has evolved into a comprehensive service manager, handling system initialization, service orchestration, logging, network configuration, time sync and more πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux infographics at study-notes.org

Wireless penetration testing focuses on identifying and exploiting vulnerabilities in WiFi and other wireless networks. Here are a list of wireless pentest tools available on Linux πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and #infosec related infographics at study-notes.org

Over the last few decades, network technology has evolved to meet the growing demands for faster, more reliable, and scalable communication πŸ˜ŽπŸ‘‡ Find pdf books with all my networking and cybersecurity related infographics at study-notes.org

fzf is a fast command-line fuzzy finder enabling interactive search and filtering. Unlike exact matching, fuzzy search finds results even if you mistype or skip characters. Combined with pipes, it unlocks endless possibilities πŸ˜ŽπŸ‘‡ Available on #Linux, #macOS and #Windows github.com/junegunn/fzf

DHCP snooping is a security mechanism implemented on network switches to monitor and control DHCP traffic πŸ˜ŽπŸ‘‡ #ccnp #ccna Find pdf books with all my #cybersecurity related infographics at study-notes.org

Rainfrog is a terminal-based database UI written in Rust, primarily for PostgreSQL, but with basic MySQL and SQLite support. Runs on #Linux, #macOS, #Windows, and #Android (via Termux) πŸ˜ŽπŸ‘‡ #devops github.com/achristmasca...

Network routing types include shortest path routing, strict source routing, segment routing, and ECMP (Equal-Cost Multi-Path) routing πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and networking related infographics at study-notes.org #ccnp #ccna #sysadmin

Linux provides two versatile socket-based networking command-line tools. Netcat is a simple tool for network communication, while socat is a more advanced and versatile option with multi protocol support πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and #infosec infographics at study-notes.org

Virtual labs allow you to simulate or emulate networks, test configurations, and experiment with protocols in a risk-free environment. Here are available virtual lab tools for IP networking πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my Linux and networking related infographics at study-notes.org

Linux offers various ways to remove files and directories based on filename patterns, time, size, ownership, permissions, or security needs Here are useful command line examples of removing files or directories on Linux πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux infographics at study-notes.org

Lazygit is a terminal-based Git UI developed in Go, which simplifies #git operations with a fast, keyboard-driven interface. Available on #Linux, #macOS, and #windows. Pretty handy tool for #devops πŸ˜ŽπŸ‘‡ github.com/jesseduffiel...

Looking to build a career in cybersecurity? Explore these free online courses from top universities, tech giants, and industry leaders, perfect for all skill levels πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux and #cybersecurity related infographics at study-notes.org

Localized country-specific #Linux distros are tailored for users in a particular country, often to comply with government regulations, promote local software ecosystems, or cater to language and cultural preferences πŸ˜ŽπŸ‘‡ Find pdf books with all my infographics at study-notes.org

The PDF standard (ISO 32000) includes security features like encryption, password protection, digital signatures, and access permissions to protect content and ensure document integrity πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and #cybersecurity related infographics at study-notes.org

BGP is a protocol for routing traffic between different ISP networks, and its path selection process aims to choose the best route to a destination based on a number of policies and attributes πŸ˜ŽπŸ‘‡ Find pdf books with all my networking related infographics at study-notes.org #ccna #ccnp #datacenter

Single-board computers are compact, all-in-one computers with a processor, memory, and storage integrated onto a single circuit board. They are widely used in cybersecurity and #IoT πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #Linux and #cybersecurity related infographics at study-notes.org

RustScan is a ultra-fast port scanner written In Rust (e.g., can scan 64K ports merely in seconds). It passes the results directly to Nmap for in-depth service enumeration and vulnerability analysis πŸ˜ŽπŸ‘‡ RustScan is available on #Linux, #macOS and #Android termux github.com/RustScan/Rus...

Linux capabilities let you break up root privileges into smaller units, so processes only get the specific powers they need. Use setcap/getcap to set or view capabilities. Here are useful Linux capabilities πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and #cybersecurity infographics at study-notes.org

Network virtualization allows operators to create and manage isolated logical networks over physical network resources via SDN, where software switches are programmed by the centralized SDN controller πŸ˜ŽπŸ‘‡ Find pdf books with all my infographics at study-notes.org #datacenter #cloudcomputing

Browser extensions play a crucial role in enhancing security for your online activities. They can block malicious ads, manage passwords safely, control scripts, and protect against phishing attempts πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #cybersecurity infographics at study-notes.org

Netscanner is a terminal-based network and diagnostics tool with modern TUI. It is written in Go, and is designed for fast and efficient discovery of active devices on a network πŸ˜ŽπŸ‘‡ Available on #Linux, #macOS or #Windows (with npcap) #infosec github.com/Chleba/netsc...

The Linux /proc filesystem is a virtual interface that provides real-time access to system hardware, processes, and kernel parameters on Linux. Here are a list of useful /proc entries πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux and #cybersecurity related infographics at study-notes.org

Cybersecurity is a constantly evolving field, and understanding essential terms is vital to staying prepared against digital threats. Here are a list of key cybersecurity terms organized from A to Z πŸ˜ŽπŸ‘‡ Find high-res pdf books with all my #cybersecurity related infographics at study-notes.org

Linux provides a wide range of open-source multimedia tools for tasks like image editing, video production, media conversion, and streaming. Here are a categorized list of #opensource multimedia software available on Linux πŸ˜ŽπŸ‘‡ Find pdf books with all my #Linux infographics at study-notes.org

Zellij is a modern, Rust-based terminal multiplexer that makes terminal workflows smoother and more flexible on #Linux and #macOS. It offers tiled layouts, tabs, customizable keybindings, and session persistence, and supports WebAssembly plugins πŸ˜ŽπŸ‘‡ github.com/zellij-org/z...

Confused about the difference between VLANs and subnets? Understanding their roles is essential for efficient network segmentation and management. Here is a quick overview of their differences πŸ˜ŽπŸ‘‡ Find pdf books with all my networking related infographics at study-notes.org #sysadmin #ccnp #ccna