Rimwaka's Property
@RimwakaP
Followers
265
Following
6K
Media
86
Statuses
659
Life with Jesus is worth living || Arsenal || Student || Unlimited answers.
127.0.0.1:3000
Joined September 2021
This tweet needs to get to the right people with resources and manpower. A young man named Bildad fell into the Longonot Crater yesterday. He is still alive and KWS & Red Cross have been trying to rescue him but they have not been successful so far as he appears to be stuck in a
44
2K
2K
Anyone who is 23 and feels that way, I want to tell you that I didn’t make my first actual saving till I was 26. Do not bow to imaginary pressure. Run your own race.
24
269
1K
IBM reported that 1 in 4 public Wi-Fi hotspots is unsecured. In Nairobi, unsecured café hotspots are a growing target for data interception. Risks include “man in the middle” attacks, credential theft, and malware injection. Best practices: ● Use VPN for sensitive transactions.
4
97
299
Social engineering attacks account for 98% of cyberattacks worldwide (Stanford Cybersecurity study). In Kenya, incidents of impersonation fraud through calls and SMS surged with the rise of mobile money. Tactics include urgency (“act now or lose access”), secrecy (“don’t tell
2
24
98
What about creating a repository with a record of my main tasks of the day? https://t.co/ZZRGKVmDvX
github.com
This is a repository highlighting my daily involvements through the day. - rimwaka/My-Daily-Activities-Record
0
0
0
- Easy Discovery: Basic Nmap revealed tons of security holes - Stay Vigilant: Patch regularly, scan often, monitor everything
0
1
8
@Kossy__Mercy A clean Conscience is the most comfortable pillow to sleep on - Me, 2025.
6
93
895
ATTENTION: ODPC will soon conduct nationwide inspections targeting the hospitality sector. Compliance with the Data Protection Act is not optional…it’s mandatory. Here’s what you need to know: ✅ All hospitality businesses must register as Data Controllers or Processors ✅
0
23
22
I completed "Microsoft Applied Skills: Get started with identities and access using Microsoft Entra"! I'm so proud to be celebrating this achievement and hope this inspires you to start your own @MicrosoftLearn journey! https://t.co/lvt0BUHVal
https://t.co/lvt0BUHVal
0
0
0
In this case, my xpon router decided to send back a lot of signal, let's end it by saying it has been a good week. Optical signal from the router, +01.62dBm.
0
0
0
A glitch in the system. This xpon router decided to escape the matrix. In a PON network, routers receive higher optical signals from the OLT, and in return send a minima value of optical signals to the OLT, this facilitates communication e.g ICMP ptocol.
1
0
0
Champions of open source hardware. Which sensor would you recommend, I have an idea of using ML (processing) as well as cameras for input and displays with a buzzers for output/warning.
0
0
0
Mind successfully refreshed. Creating subnets is the easiest task, one of the few reasons for creating subnets is to minimize the broadcast domain within a network, this eases management, improves speed, and security at large. #networkengineeringjokes
0
0
0
...Attached images should serve as an example. Should you be interested, you have all my ears, or is it x reply?
0
0
0
of the electric fence twice per month while submitting reports. The reports will include images, location (GPS coordinates), and a brief summary of the materials that might be needed if restoration is required
1
0
0
Made in Kenya USB Cables. Buy and collect at your nearest @MasokoKe Safaricom shop. https://t.co/KZs7XxYptt
16
290
671
MASTER OSINT is a user-friendly open-source intelligence toolkit that includes various investigative modules designed to enhance your investigative skills in open source intelligence and cybersecurity. Do check it out!! #OSINT
#Cybersecurity
https://t.co/xx2899Jg0A
github.com
A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, email breach checks, domain lookup, metadata extraction, Googl...
2
14
79
A witness can potentially become an accused person through various circumstances, such as when their testimony reveals their own involvement in the crime or when evidence indicates their complicity. https://t.co/Ch8oyOmOpd
new.kenyalaw.org
0
84
178