sec_r0 Profile Banner
Rohit Profile
Rohit

@sec_r0

Followers
23K
Following
7K
Media
666
Statuses
5K

Security engineer & a globetrotter.

127.0.0.1
Joined March 2010
Don't wanna be here? Send us removal request.
@sec_r0
Rohit
4 years
This collection is growwwwwing !! https://t.co/K22RLmerbj Which one do you like ? #infosec
64
532
2K
@sec_r0
Rohit
9 months
Lets encourage each other for travel. Waiting to see you there.
0
0
2
@sec_r0
Rohit
9 months
Hey friends! 👋 Did you know only 0.1% of people ever trek to Everest Base Camp? 🏔️ I’ve started documenting my travel adventures — from crazy flights to breathtaking Himalayan views — all on Instagram. https://t.co/BrieOEN3J7 If you’re into travel inspo and raw mountain vibes,
1
0
2
@shl
Sahil Lavingia
11 months
No longer hiring junior or even mid-level software engineers. Our tokens per codebase: Gumroad: 2M Flexile: 800K Helper: 500K Iffy: 200K Shortest: 100K Both Claude 3.5 Sonnet and o3-mini have context windows of 200K tokens, meaning they can now write 100% of our Iffy and
532
929
13K
@sec_r0
Rohit
10 months
Simple diagram showing the difference between OSI and TCP/IP model of networking.
0
2
14
@sec_r0
Rohit
10 months
HTTP - The Language of Web. How it works and the idea behind the usage of that protocol.
1
1
11
@sec_r0
Rohit
10 months
Docker Internals. How it works and the most simple logic behind the modern application's tech stack.
0
0
3
@sec_r0
Rohit
10 months
Some food for the browser to help us with the sessions - Cookies
0
1
9
@sec_r0
Rohit
10 months
OAuth - Resource owner password grant
0
2
12
@sec_r0
Rohit
10 months
OAuth 2.0 - Implicit Code
0
0
4
@sec_r0
Rohit
10 months
OAuth 2.0 - Client Credentials Code Flow
1
0
12
@sec_r0
Rohit
10 months
OAuth 2.0 - Authorization Code Flow.
0
1
9
@sec_r0
Rohit
10 months
Kubernetes Architecture Simplified.
0
1
9
@sec_r0
Rohit
10 months
What makes docker tech stack so important.
0
2
4
@sec_r0
Rohit
10 months
Grok says ..
0
0
0
@sec_r0
Rohit
10 months
Few important cookie attributes.
1
0
6
@techyoutbe
Tech Fusionist
10 months
End-to-end Kubernetes lifecycle (security, networking, deployment, and observability)
4
31
186
@_avichawla
Avi Chawla
10 months
A cheat sheet of 40 NumPy methods used 95% of the time:
5
107
642
@sec_r0
Rohit
10 months
0
0
3
@sec_r0
Rohit
11 months
♾️ DevOps Zero to Hero ♾️ 💻 AWS Zero to Hero Course https://t.co/hUT3TdeJQ4 💻 DevOps Zero to Hero Course https://t.co/gPekLzwNLz 💻Terraform Zero to Hero https://t.co/yEPri37diz 💻 Docker https://t.co/vxCfVXzuDl 💻 Kubernetes https://t.co/oyl2Ui5dN5 💻
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
8
21
@galnagli
Nagli
11 months
Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data. No one is safe from security mistakes, follow along to learn more 🧵
45
375
2K