SecurityTrybe Profile Banner
Security Trybe Profile
Security Trybe

@SecurityTrybe

Followers
274K
Following
72K
Media
9K
Statuses
37K

Cybersecurity & Tech | https://t.co/NIuxWOtJYz

Earth
Joined February 2022
Don't wanna be here? Send us removal request.
@SecurityTrybe
Security Trybe
2 years
CyberSecurity Study Guide. Estimated Duration: 6-8 Months 👇.
125
1K
4K
@SecurityTrybe
Security Trybe
5 hours
RT @InterestingSTEM: What's he doing?
Tweet media one
0
32
0
@SecurityTrybe
Security Trybe
22 hours
How to avoid SIM swap scam:. 1. Don't share your personal information, like your phone number, address, or social security number, on public websites or social media. 2. Make a PIN or password for your mobile account that only you know. Don’t use things that are easy to guess,.
0
1
10
@SecurityTrybe
Security Trybe
22 hours
How a SIM swap scam works:. 1. The scammer finds out your personal information from public websites, social media, social engineering. 2. The scammer calls your phone company and acts like you. They ask to move your phone number to a new SIM card that they have. 3. The phone.
2
1
5
@SecurityTrybe
Security Trybe
22 hours
SIM Swap Scam ⚠️. A SIM swap scam is when someone pretends to be you and gets your phone number from your phone company. Then they can use your phone number to get into your online accounts, like your bank, email, or social media. They can take your money, data, or identity.
Tweet media one
4
9
25
@SecurityTrybe
Security Trybe
22 hours
OWASP Top 10
Tweet media one
0
4
19
@SecurityTrybe
Security Trybe
22 hours
What is Network?
Tweet media one
1
84
460
@SecurityTrybe
Security Trybe
22 hours
50 Cybersecurity Project Ideas
Tweet media one
4
31
229
@SecurityTrybe
Security Trybe
22 hours
Languages used in…. Cybersecurity:.*Python.*PHP.*Javascript.*SQL.*C.*Perl. Web Development:.*HTML.*CSS.*JavaScript .*Python .*Java.*Ruby .*ASP. NET .*SQL. Software Development:.*C.*C#.*C++.*Python.*Java.*Ruby .*Swift.*SQL. Machine Learning:.*Python.*C#.*Javascript.*Java.*Julia.
4
43
241
@SecurityTrybe
Security Trybe
22 hours
The AAA Framework: Authenticating People . Authentication: This step verifies your identity. It can use passwords, PINs, biometrics (like fingerprints or facial recognition), or security tokens. The goal is to ensure that you are who you claim to be. Authorization: After you’re
Tweet media one
0
3
26
@SecurityTrybe
Security Trybe
22 hours
The most productive setup is 9 here. Change my mind.
Tweet media one
16
15
145
@SecurityTrybe
Security Trybe
22 hours
Two type of Linux users
Tweet media one
0
5
29
@SecurityTrybe
Security Trybe
22 hours
Networking Protocols
Tweet media one
9
103
673
@SecurityTrybe
Security Trybe
22 hours
What is your favorite Linux command??
Tweet media one
113
24
265
@SecurityTrybe
Security Trybe
22 hours
Which one are you?
Tweet media one
69
21
398
@SecurityTrybe
Security Trybe
22 hours
Tweet media one
6
103
1K
@SecurityTrybe
Security Trybe
22 hours
Some fresh sudo fruits
Tweet media one
0
4
44
@SecurityTrybe
Security Trybe
22 hours
RT @xKnowledgeBANK: The best startup tools you need to know.
Tweet media one
0
79
0
@SecurityTrybe
Security Trybe
22 hours
RT @xKnowledgeBANK: Job interview cheat sheet
Tweet media one
0
17
0
@SecurityTrybe
Security Trybe
22 hours
Tweet media one
0
48
0
@SecurityTrybe
Security Trybe
22 hours
RT @InterestingSTEM: Can you solve it??
Tweet media one
0
19
0