just like pagliacci(@ffg) 's Twitter Profile Photo

Can I just say how adorable it is that PuTTY, which is an application used by hundreds of thousands (if not millions) of sysadmins still has this almost comically gory URL?

Can I just say how adorable it is that PuTTY, which is an application used by hundreds of thousands (if not millions) of sysadmins still has this almost comically gory URL?
account_circle
Michael Buckbee(@mbuckbee) 's Twitter Profile Photo

I wrote a step-by-step guide to blocking AI bots from harvesting your site, designed for developers and sysadmins.

Over 90% of the sites Iโ€™ve reviewed in the last two months have had more requests from bot traffic than humans.

AI bots are scraping your site for purposes like:

account_circle
Pro Life libertarian(@PLLibertarian) 's Twitter Profile Photo

In recent news, a massive, coordinated attempt to sneak back door code into millions of Linux systems was thwarted by a dev who was annoyed he had to wait an extra half second to connect to another machine.

Sysadmins, man.

In recent news, a massive, coordinated attempt to sneak back door code into millions of Linux systems was thwarted by a dev who was annoyed he had to wait an extra half second to connect to another machine. 

Sysadmins, man.
account_circle
PentesterLab(@PentesterLab) 's Twitter Profile Photo

One of your best ally and worst enemy when doing Pentest and Code Review: Assumptions!

What assumptions are the sysadmins making when deploying the application?
What assumptions are the developers making when writing the code?
What assumptions are you making when pentesting or

One of your best ally and worst enemy when doing Pentest and Code Review: Assumptions!

What assumptions are the sysadmins making when deploying the application?
What assumptions are the developers making when writing the code?
What assumptions are you making when pentesting or
account_circle
Bipin Jitiya(@win3zz) 's Twitter Profile Photo

Sysadmins & Devs: Resist the temptation to stash Azure creds (plaintext) in /etc ๐Ÿ”ด

- Use token-based authentication (temporary credentials) for specific services and implement token rotation policies to regularly refresh and expire access tokens. โœ…

Sysadmins & Devs: Resist the temptation to stash Azure creds (plaintext) in /etc ๐Ÿ”ด

- Use token-based authentication (temporary credentials) for specific services and implement token rotation policies to regularly refresh and expire access tokens. โœ…
account_circle
Shantanu Goel(@shantanugoel) 's Twitter Profile Photo

Around late 2000s, I read Cory Doctorow NONCONSENSUAL BLUE TICK 's When Sysadmins Ruled the Earth (a short excerpt below) and was totally in awe of Google, this almost mythical tech beast that will lead us through even the apocalypse.
Don't know how I feel about the Google of today sadly being actively

Around late 2000s, I read @doctorow 's When Sysadmins Ruled the Earth (a short excerpt below) and was totally in awe of Google, this almost mythical tech beast that will lead us through even the apocalypse. 
Don't know how I feel about the Google of today sadly being actively
account_circle
Hashnode(@hashnode) 's Twitter Profile Photo

๐Ÿ‘‹ Hey developers & sysadmins!

Monitoring CPU usage & memory utilization is crucial for maintaining system health.

Keep an eye on your systemโ€™s health in real-time by building a live monitoring dashboard with NestJS, Socket.IO, and Plotly in this tutorial.

๐Ÿ‘‹ Hey developers & sysadmins! 

Monitoring CPU usage & memory utilization is crucial for maintaining system health.

Keep an eye on your systemโ€™s health in real-time by building a live monitoring dashboard with NestJS, Socket.IO, and Plotly in this tutorial.
account_circle