Cyberdostii's profile picture. CYBERDOSTI, an IT firm, prioritizes free internships for growth. Our motto: Learn more, grow more with us. We foster education and national contribution.

Cyberdosti

@Cyberdostii

CYBERDOSTI, an IT firm, prioritizes free internships for growth. Our motto: Learn more, grow more with us. We foster education and national contribution.

Cyberdosti reposted

In Linux, Logical Volume Manager (LVM) is a storage management framework that provides a more flexible approach to managing disk storage than traditional partitioning. LVM works by creating an abstraction layer between physical storage devices and the file system, allowing you to…

thatstraw's tweet image. In Linux, Logical Volume Manager (LVM) is a storage management framework that provides a more flexible approach to managing disk storage than traditional partitioning. LVM works by creating an abstraction layer between physical storage devices and the file system, allowing you to…

Cyberdosti reposted

Certifications for a full-stack career in 2024: 1. Web design 🔗freecodecamp.org/learn/2022/res… 2. JavaScript 🔗freecodecamp.org/learn/javascri… 3. Front-end libraries 🔗freecodecamp.org/learn/front-en… 5. Back-end and APIs 🔗 freecodecamp.org/learn/back-end… 6. Databases 🔗freecodecamp.org/learn/relation… 7.…

manishkumar_dev's tweet image. Certifications for a full-stack career in 2024:  

1. Web design
🔗freecodecamp.org/learn/2022/res…

2. JavaScript 
🔗freecodecamp.org/learn/javascri…

3. Front-end libraries 
🔗freecodecamp.org/learn/front-en…

5. Back-end and APIs 
🔗 freecodecamp.org/learn/back-end…

 6. Databases 
🔗freecodecamp.org/learn/relation…

7.…

Cyberdosti reposted

How DNS Works

SecurityTrybe's tweet image. How DNS Works

Cyberdosti reposted

How does a VPN work? This diagram below shows how we access the internet with and without VPNs. A VPN, or Virtual Private Network, is a technology that creates a secure, encrypted connection over a less secure network, such as the public internet. The primary purpose of a VPN…


Cyberdosti reposted

Structure of URL

SecurityTrybe's tweet image. Structure of URL

Cyberdosti reposted

Different Type of Cyber Attacks

LetsDefendIO's tweet image. Different Type of Cyber Attacks

Cyberdosti reposted

Linux Command Cheatsheet

SecurityTrybe's tweet image. Linux Command Cheatsheet

Cyberdosti reposted

Explaining 9 types of API testing. 🔹 Smoke Testing This is done after API development is complete. Simply validate if the APIs are working and nothing breaks. 🔹 Functional Testing This creates a test plan based on the functional requirements and compares the results with…


Cyberdosti reposted

REST API vs. GraphQL When it comes to API design, REST and GraphQL each have their own strengths and weaknesses. REST - Uses standard HTTP methods like GET, POST, PUT, DELETE for CRUD operations. - Works well when you need simple, uniform interfaces between separate…


Cyberdosti reposted

Ports mostly used by Hackers

InterestingSTEM's tweet image. Ports mostly used by Hackers

Cyberdosti reposted

Unix/Linux Command Reference

SecurityTrybe's tweet image. Unix/Linux Command Reference

Cyberdosti reposted

WordPress Sensitive File paths, add them in your worldlist #bugbounty #infosec #appsec #CyberSecurity #fuzzing #Security

sumit_cfe's tweet image. WordPress Sensitive File paths, add them in your worldlist

#bugbounty #infosec #appsec #CyberSecurity #fuzzing #Security

Cyberdosti reposted

I have made this mistake in the past and learned the lesson. The data structure you use matters a lot. Here are some examples: Hash Tables for Fast Lookup When a quick lookup is essential, hash tables (or hash maps) are ideal. They offer O(1) average time complexity for…

RaulJuncoV's tweet image. I have made this mistake in the past and learned the lesson.

The data structure you use matters a lot.

Here are some examples:

Hash Tables for Fast Lookup

When a quick lookup is essential, hash tables (or hash maps) are ideal.

They offer O(1) average time complexity for…

Cyberdosti reposted

10 Smallest Hacker Gadgets And Their Use 👇

SecurityTrybe's tweet image. 10 Smallest Hacker Gadgets And Their Use 👇

Cyberdosti reposted

Learn Data Analysis For Free in 2024: 1. Excel trumpexcel.com 2. SQL sqlbolt.com 3. PowerBI Reports in PowerBI (Datacamp) datacamp.com/courses/report… 4. Tableau tableau.com/learn/training 5. Python pythontutorial.net 6. R codecademy.com/learn/learn-r Make…


Cyberdosti reposted

Update your mindset and behaviours, not just your personal devices and settings If you and your family, friends, or colleagues haven’t got your personal cyber security basics covered, you can check them out & check them off at 👉 cyber.gov.au/protect-yourse…


United States Trends

Loading...

Something went wrong.


Something went wrong.