#  @Ark_Aegis Ark Aegisπ‘ Ark Aegisπ‘ posts on X about linux, data, space, journey the most. They currently have [---] followers and [--] posts still getting attention that total [-------] engagements in the last [--] hours. ### Engagements: [-------] [#](/creator/twitter::2003083175300677632/interactions)  - [--] Week [---------] +19,837,389% ### Mentions: [--] [#](/creator/twitter::2003083175300677632/posts_active)  ### Followers: [---] [#](/creator/twitter::2003083175300677632/followers)  ### CreatorRank: [---------] [#](/creator/twitter::2003083175300677632/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) [stocks](/list/stocks) [celebrities](/list/celebrities) [finance](/list/finance) [ncaa football](/list/ncaa-football) [social networks](/list/social-networks) **Social topic influence** [linux](/topic/linux), [data](/topic/data), [space](/topic/space), [journey](/topic/journey), [software](/topic/software) #3359, [what is](/topic/what-is), [microsoft](/topic/microsoft), [edge](/topic/edge), [core](/topic/core), [windows](/topic/windows) **Top accounts mentioned or mentioned by** [@cyberrekk](/creator/undefined) [@chovwenofuru](/creator/undefined) [@emperoredetan](/creator/undefined) [@cybercombat](/creator/undefined) [@gabbytech01](/creator/undefined) [@beubby71](/creator/undefined) [@cyber_rekk](/creator/undefined) [@ireteeh](/creator/undefined) [@onijec](/creator/undefined) [@segoslavia](/creator/undefined) [@anic4uu](/creator/undefined) [@paul_in_defense](/creator/undefined) [@jayhunts](/creator/undefined) [@temitopesobulo](/creator/undefined) [@cyberrazz](/creator/undefined) [@cyberjeremiah](/creator/undefined) [@sudosheggs](/creator/undefined) [@elonmusk](/creator/undefined) [@sisinerd](/creator/undefined) [@cyberracheal](/creator/undefined) **Top assets mentioned** [Microsoft Corp. (MSFT)](/topic/microsoft) [Alphabet Inc Class A (GOOGL)](/topic/$googl) ### Top Social Posts Top posts by engagements in the last [--] hours "Just passed SAIP Phase [--] Assessment with a 94% score. Proud of the work the discipline and the growth. On to Phase [--]. π #CyberSecurity #LevelUp #Focused" [X Link](https://x.com/Ark_Aegis/status/2021868476458000461) 2026-02-12T08:46Z [---] followers, [---] engagements "Day 5/100 - Types of Ransomware Ransomware types include Crypto (encrypts files) Locker (locks systems) Scareware (fake alerts) Doxware/Leakware (data exposure threats) and RaaS (rented malicious tools). Modern attacks often use double extortion combining encryption with data theft or wiper malware that destroys data. Major variants include WannaCry LockBit and REvil. [--]. Crypto Ransomware: Encrypts files making them inaccessible until a ransom is paid for a decryption key. Examples include WannaCry Locky and CryptoLocker. [--]. Locker Ransomware: Locks users out of their operating system or" [X Link](https://x.com/Ark_Aegis/status/2022617856744010180) 2026-02-14T10:24Z [---] followers, [---] engagements "@twenty4_io @cyber_combat Brother the group is full" [X Link](https://x.com/Ark_Aegis/status/2020990269651550508) 2026-02-09T22:36Z [---] followers, [--] engagements "@cHef_vic__ @ireteeh @OnijeC @segoslavia @Ejikeetolue @jay_hunts @TemitopeSobulo @elormkdaniel Well done Victor" [X Link](https://x.com/Ark_Aegis/status/2021141077026058666) 2026-02-10T08:35Z [---] followers, [--] engagements "WHAT YOU DO NOT KNOW ABOUT CHROMIUM Chromium is an open-source web browser project primarily developed by Google that serves as the foundation for Google Chrome Microsoft Edge Opera and others. Launched in [----] it provides the core rendering engine (Blink) networking stack and JavaScript engine (V8) allowing for a faster more secure and minimalist browser experience. It is named "Chromium" because it is the base material used to create "Chrome" plating. Key Aspects of Chromium [--]. Open Source: Unlike Google Chrome which is proprietary Chromium's source code is freely available allowing" [X Link](https://x.com/Ark_Aegis/status/2021199719301616085) 2026-02-10T12:28Z [---] followers, [---] engagements "@sudosheggs @ireteeh @TemitopeSobulo @OnijeC @segoslavia @real_nuelOj @jay_hunts @CiscoNetAcad Go go go brooπ―" [X Link](https://x.com/Ark_Aegis/status/2021600259760099747) 2026-02-11T15:00Z [---] followers, [--] engagements "A STEP BY STEP GUIDE FOR CYBERSECURITY BEGINNERS. Free Certification Links attached. https://t.co/Je9Jmwic2Q https://t.co/Je9Jmwic2Q" [X Link](https://x.com/Ark_Aegis/status/2021605478145446365) 2026-02-11T15:21Z [---] followers, [---] engagements "A STEP BY STEP GUIDE FOR CYBERSECURITY BEGINNERS https://t.co/Je9Jmwic2Q https://t.co/Je9Jmwic2Q" [X Link](https://x.com/Ark_Aegis/status/2021605767032234013) 2026-02-11T15:22Z [---] followers, [---] engagements "@cyber_rekk Linux is far betterπ―π―π―" [X Link](https://x.com/Ark_Aegis/status/2021607623234117641) 2026-02-11T15:29Z [---] followers, [----] engagements "It is advisable for every cybersecurity analyst to use Linux Linux was built differently. In Linux: The system is modular. Components are separated. You can choose your browser desktop environment window manager even your kernel. Everything is just configurable. In @cyber_rekk words.This is why we love Linux Microsoft doesnt stop you from uninstalling Edge just to annoy you or take away your freedom. Its because in modern Windows Edge is no longer just a browser but rather part of the operating system itself. A lot of Windows components now depend on Edges rendering engine Microsoft doesnt" [X Link](https://x.com/Ark_Aegis/status/2021610253792444434) 2026-02-11T15:40Z [---] followers, [---] engagements "@glowfinds_amz Absolutely. DevOps is on my list. Ill be sharing a beginner-friendly roadmap covering Linux Git CI/CD Docker Kubernetes and AWS/Azure soon. Lets connect π€" [X Link](https://x.com/Ark_Aegis/status/2021697195439763938) 2026-02-11T21:25Z [---] followers, [--] engagements "@i_am_chinoski @cyberjeremiah Take good care of yourself bro. Health is Wealth" [X Link](https://x.com/Ark_Aegis/status/2021869065078550612) 2026-02-12T08:48Z [---] followers, [--] engagements "Decided to join the recent Trend : Go to ChatGPT and use this prompt: Create a caricature of me and my job based on everything you know about me. I AM A CYBERSECURITY ANALYST (Ethical Hacker) AND A WEB DEVELOPER Come back and share your photo: here is mine #CaricatureChallenge #caricaturetrend New Trend : Go to ChatGPT and use this prompt: Create a caricature of me and my job based on everything you know about me. Come back and share your photo: here is mine π https://t.co/lNyTzwGZ9V New Trend : Go to ChatGPT and use this prompt: Create a caricature of me and my job based on everything you" [X Link](https://x.com/Ark_Aegis/status/2021911092390207739) 2026-02-12T11:35Z [---] followers, [---] engagements "Decided to join the recent Trend Create a caricature of me and my job based on everything you know about me. I AM A CYBERSECURITY ANALYST (Ethical Hacker) AND A WEB DEVELOPER Come back and share your photo: here is mine #CaricatureChallenge #caricaturetrend i asked chatgpt to create a caricature of me and my job https://t.co/wZEdWt7SbJ i asked chatgpt to create a caricature of me and my job https://t.co/wZEdWt7SbJ" [X Link](https://x.com/Ark_Aegis/status/2021912092865953949) 2026-02-12T11:39Z [---] followers, [---] engagements "@Paul_In_Defense @cyber_combat @chovwenofuru @emperoredetan @gabbytech01 @cyber_rekk @_ekwodavid @Tegaebi @anic4uu Congrats brother. π«Ά" [X Link](https://x.com/Ark_Aegis/status/2021964883441467688) 2026-02-12T15:09Z [---] followers, [--] engagements "The CIA Triad (Confidentiality Integrity Availability) is the framework security professionals use to design and evaluate systems. Before implementing any security control we ask: Does it protect confidentiality Does it preserve integrity Does it ensure availability #cyberseurity CIA TRIAD The CIA Triad which stands for Confidentiality Integrity and Availability is a fundamental concept in information security that outlines the three core principles that guide the protection of data and information systems. These principles are crucial for https://t.co/MlZbDLPUaM CIA TRIAD The CIA Triad which" [X Link](https://x.com/Ark_Aegis/status/2021967392243335365) 2026-02-12T15:19Z [---] followers, [--] engagements "Tech ecosystem is evolving at an unprecedented pace. But whats really happening on the ground Join us on February 16th at 8PM as @chovwenofuru & @emperoredetan break down how technology integrated into Africa how it has evolved over the years and what that evolution means for beginners looking to grow within the Tech ecosystem. This session will deliver practical insights from builders who are actively shaping the space. Hosted by TechForge X Set your reminder and tune in on February 16th for a powerful and insightful conversation. https://x.com/i/spaces/1OwxWeXADbkGQ Tech ecosystem is" [X Link](https://x.com/Ark_Aegis/status/2022024508324839665) 2026-02-12T19:06Z [---] followers, [---] engagements "My Twitter Interaction Circle β‘ https://infinitetweet.me/interaction-circle https://infinitetweet.me/interaction-circle" [X Link](https://x.com/Ark_Aegis/status/2022218003040154072) 2026-02-13T07:55Z [---] followers, [--] engagements "@cyber_razz pwd" [X Link](https://x.com/Ark_Aegis/status/2022240466071335138) 2026-02-13T09:24Z [---] followers, [---] engagements "Congratulations brother. We would sure make it to the last phase. Made it to the next phase of my internship with Sardonyx. The last [--] weeks were intense deep learning unlearning and pushing beyond my comfort zone. I didnt perform in the exams to my full satisfaction but growth is greater than perfection. @ireteeh @segoslavia @OnijeC https://t.co/NiWIZTnsIg Made it to the next phase of my internship with Sardonyx. The last [--] weeks were intense deep learning unlearning and pushing beyond my comfort zone. I didnt perform in the exams to my full satisfaction but growth is greater than" [X Link](https://x.com/Ark_Aegis/status/2022248851206545585) 2026-02-13T09:57Z [---] followers, [---] engagements "@elonmusk banger pro max" [X Link](https://x.com/Ark_Aegis/status/2022250001603469372) 2026-02-13T10:02Z [---] followers, [---] engagements "@Beubby71 Hello Beulah. Let's connect" [X Link](https://x.com/Ark_Aegis/status/2022960485579284583) 2026-02-15T09:05Z [---] followers, [--] engagements "Day 4/100 Understanding Ransomware π»π Ransomware is a category of malicious software (malware) designed to deny users access to their systems or data by encrypting files or locking devices and then demanding payment (ransom) in exchange for restoring access. Over the past decade ransomware has evolved into one of the most disruptive and financially damaging forms of cyberattack globally. Unlike traditional malware that focuses on data theft or espionage ransomware primarily targets system availability while often also compromising confidentiality and integrity. Its impact extends beyond" [X Link](https://x.com/Ark_Aegis/status/2022237280727867743) 2026-02-13T09:11Z [---] followers, [---] engagements "@Sisinerd @aicybermagazine This is what intentional community building looks like. π₯ 50+ contributors real industry operators and forward-looking AI security conversations in one issue Thats how you move the ecosystem forward. Massive respect to everyone involved. Congrats to the team" [X Link](https://x.com/Ark_Aegis/status/2022303475749535845) 2026-02-13T13:34Z [---] followers, [--] engagements "@Beubby71 Sent you a DM" [X Link](https://x.com/Ark_Aegis/status/2022961701541552542) 2026-02-15T09:10Z [---] followers, [--] engagements "@cyber_rekk Yeah.ππΌ Thanks for this insight" [X Link](https://x.com/Ark_Aegis/status/2022968231502414070) 2026-02-15T09:36Z [---] followers, 13.2K engagements "π APIs are like the unsung heroes of the web. Here are some important ones cyber beginners often overlook: - Rate Limiting APIs: Prevents abuse ensures fair usage and protects against DDoS attacks. - Geolocation APIs: Provides user location data useful for security and personalization. - Payment Gateway APIs: Enables secure transactions like Stripe or Paystack. - Authentication APIs: Manages user logins like OAuth or JWT. - Error Handling APIs: Provides insights into errors helps with debugging. What is API & how does it work https://t.co/cdFejrZTVy What is API & how does it work" [X Link](https://x.com/anyuser/status/2022969694035042695) 2026-02-15T09:42Z [---] followers, [--] engagements "The crazy part is most people panic when they see it but its actually Windows trying to protect your system from worse damage. Its not the villain its the emergency brake. π¨π» Question is - how many people actually read the error code before restarting π That code tells the whole story. https://twitter.com/i/web/status/2023095128554962999 https://twitter.com/i/web/status/2023095128554962999" [X Link](https://x.com/Ark_Aegis/status/2023095128554962999) 2026-02-15T18:00Z [---] followers, [---] engagements "@elonmusk Woooww" [X Link](https://x.com/Ark_Aegis/status/2023114587608858659) 2026-02-15T19:17Z [---] followers, [---] engagements "Day 6/100 - How Ransomware Attacks Occur How Ransomware Attacks Actually Happen π»π Ransomware doesnt just appear. It follows a process. Heres how most ransomware attacks occur simplified: [--] - Initial Access (The Entry Point) Attackers get in through: Phishing emails (malicious links or attachments) Unpatched software vulnerabilities Weak or reused passwords Exposed Remote Desktop (RDP) Misconfigured cloud systems One small mistake can open the door. [--] - Establishing Control Once inside attackers: Install backdoors Create hidden accounts Disable security tools They make sure they can stay in" [X Link](https://x.com/anyuser/status/2023114773131411482) 2026-02-15T19:18Z [---] followers, [---] engagements "@CyberRacheal Optic IDπ€" [X Link](https://x.com/Ark_Aegis/status/2023116611289309198) 2026-02-15T19:26Z [---] followers, [--] engagements "TechForgeX: Tech Awareness Space Recording (Tech In Africa) We talked about how Tech came to in Africa how it evolved and how beginners can position themselves in the tech space today Big thanks to our speakers for tonight @chovwenofuru @emperoredetan They shared really insightful opinions π See you all next Monday @cyber_combat @cyber_rekk @anic4uu @gabbytech01 https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL" [X Link](https://x.com/anyuser/status/2023501517773308402) 2026-02-16T20:55Z [---] followers, [---] engagements "A Step-by-Step Roadmap to Start Your Cybersecurity Career Starting your journey in cybersecurity can feel overwhelming so many topics so many tools so many certifications. Ive put together a step-by-step roadmap to help beginners focus learn and grow http://x.com/i/article/2020861672756334592 http://x.com/i/article/2020861672756334592" [X Link](https://x.com/anyuser/status/2020863690237477225) 2026-02-09T14:13Z [---] followers, [----] engagements "TechForgeX: Tech Awareness Space Recording (Tech In Africa) We talked about how Tech came to in Africa how it evolved and how beginners can position themselves in the tech space today Big thanks to our speakers for tonight @chovwenofuru @emperoredetan They shared really insightful opinions π See you all next Monday @cyber_combat @cyber_rekk @anic4uu @gabbytech01 https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL" [X Link](https://x.com/anyuser/status/2023501517773308402) 2026-02-16T20:55Z [---] followers, [---] engagements "We're live. Tune in guys https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL" [X Link](https://x.com/anyuser/status/2023473486472376808) 2026-02-16T19:04Z [---] followers, [--] engagements "New space link Set a reminder for my upcoming Space https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL" [X Link](https://x.com/anyuser/status/2023469534401999306) 2026-02-16T18:48Z [---] followers, [--] engagements "Join us Today at 8PM as @chovwenofuru & @emperoredetan break down how technology integrated into Africa how it has evolved over the years and what that evolution means for beginners looking to grow within the Tech ecosystem. This session will deliver practical insights from builders who are actively shaping the space. Hosted by TechForge X https://x.com/i/spaces/1OwxWeXADbkGQ https://x.com/i/spaces/1OwxWeXADbkGQ" [X Link](https://x.com/anyuser/status/2023341283960373699) 2026-02-16T10:18Z [---] followers, [---] engagements "Day 6/100 - How Ransomware Attacks Occur How Ransomware Attacks Actually Happen π»π Ransomware doesnt just appear. It follows a process. Heres how most ransomware attacks occur simplified: [--] - Initial Access (The Entry Point) Attackers get in through: Phishing emails (malicious links or attachments) Unpatched software vulnerabilities Weak or reused passwords Exposed Remote Desktop (RDP) Misconfigured cloud systems One small mistake can open the door. [--] - Establishing Control Once inside attackers: Install backdoors Create hidden accounts Disable security tools They make sure they can stay in" [X Link](https://x.com/anyuser/status/2023114773131411482) 2026-02-15T19:18Z [---] followers, [---] engagements "Happening now Heres my gift of love to everyone β€ CAYA @CayaHQ is holding a very important conversation tomorrow evening on AdTech: Where Tech Data & Marketing Collide. Id like to specially invite you to this meeting where we will be looking into how AdTech powers the web and also the https://t.co/ikHe76dAGJ Heres my gift of love to everyone β€ CAYA @CayaHQ is holding a very important conversation tomorrow evening on AdTech: Where Tech Data & Marketing Collide. Id like to specially invite you to this meeting where we will be looking into how AdTech powers the web and also the" [X Link](https://x.com/anyuser/status/2023097263028089088) 2026-02-15T18:09Z [---] followers, [--] engagements "Heres my gift of love to everyone β€ CAYA @CayaHQ is holding a very important conversation tomorrow evening on AdTech: Where Tech Data & Marketing Collide. Id like to specially invite you to this meeting where we will be looking into how AdTech powers the web and also the career and income opportunities that come with it. @SorinolaGbenga & @theoluwafeyi would be joining the conversation to guide us through the intersection of Technology data and marketing sharing real insights into the careers roles and systems powering digital advertising. πSunday 15th February. 7pm π Dont say I didnt do" [X Link](https://x.com/anyuser/status/2022655096350179544) 2026-02-14T12:52Z [----] followers, [---] engagements "I think I already explained this meme" [X Link](https://x.com/anyuser/status/2023039012810977602) 2026-02-15T14:17Z 38.3K followers, [----] engagements "Tbh https://t.co/vGsoVU25Zj https://t.co/vGsoVU25Zj" [X Link](https://x.com/anyuser/status/2022975301374927303) 2026-02-15T10:04Z [---] followers, [--] engagements "IPv4 vs IPv6" [X Link](https://x.com/anyuser/status/2022767800721269198) 2026-02-14T20:19Z 38.3K followers, 15K engagements "π APIs are like the unsung heroes of the web. Here are some important ones cyber beginners often overlook: - Rate Limiting APIs: Prevents abuse ensures fair usage and protects against DDoS attacks. - Geolocation APIs: Provides user location data useful for security and personalization. - Payment Gateway APIs: Enables secure transactions like Stripe or Paystack. - Authentication APIs: Manages user logins like OAuth or JWT. - Error Handling APIs: Provides insights into errors helps with debugging. What is API & how does it work https://t.co/cdFejrZTVy What is API & how does it work" [X Link](https://x.com/anyuser/status/2022969694035042695) 2026-02-15T09:42Z [---] followers, [--] engagements "What is API & how does it work" [X Link](https://x.com/anyuser/status/2022783713759621202) 2026-02-14T21:23Z 38.3K followers, [----] engagements "W interaction" [X Link](https://x.com/anyuser/status/2022960911909327001) 2026-02-15T09:07Z 38.3K followers, 104.8K engagements "Nah windows [--] was peak" [X Link](https://x.com/anyuser/status/2022960988702834853) 2026-02-15T09:07Z 38.3K followers, 363.9K engagements "RT @cyber_rekk: .exe files cannot run on Linux because they are made for Windows and Linux uses a completely different program format so t" [X Link](https://x.com/anyuser/status/2022968155078103530) 2026-02-15T09:36Z [---] followers, [---] engagements ".exe files cannot run on Linux because they are made for Windows and Linux uses a completely different program format so the system does not understand how to execute them. If a malicious site downloads a .exe file onto your Linux system it will usually have no power and will just sit in your Downloads folder like a normal file. Linux also has strong security controls that prevent programs from running with administrator privileges by default which means no file can make important system changes unless you explicitly allow it using sudo. In addition Linux requires execute permission before" [X Link](https://x.com/anyuser/status/2022964172024168938) 2026-02-15T09:20Z 10.1K followers, 321.1K engagements "RT @Ark_Aegis: Just less than a year starting out my cybersecurity journey and this motivates me to keep going. We are getting there. A ma" [X Link](https://x.com/anyuser/status/2022967835023282392) 2026-02-15T09:34Z [---] followers, [--] engagements "Just less than a year starting out my cybersecurity journey and this motivates me to keep going. We are getting there. A matter of time.π― This year makes it [--] years since I began my Cybersecurity journey. Every contribution I make is driven by Knowledge Skills and Experience. Ive learned that growth in this field is about depth and impact β€ This year makes it [--] years since I began my Cybersecurity journey. Every contribution I make is driven by Knowledge Skills and Experience. Ive learned that growth in this field is about depth and impact β€" [X Link](https://x.com/anyuser/status/2022250963596369948) 2026-02-13T10:06Z [---] followers, [---] engagements "This year makes it [--] years since I began my Cybersecurity journey. Every contribution I make is driven by Knowledge Skills and Experience. Ive learned that growth in this field is about depth and impact β€" [X Link](https://x.com/anyuser/status/2021971834690846907) 2026-02-12T15:37Z 137.8K followers, [----] engagements "Cybersecurity certification path" [X Link](https://x.com/anyuser/status/2022573218146750475) 2026-02-14T07:26Z 16.4K followers, 37.4K engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@Ark_Aegis Ark Aegisπ‘Ark Aegisπ‘ posts on X about linux, data, space, journey the most. They currently have [---] followers and [--] posts still getting attention that total [-------] engagements in the last [--] hours.
Social category influence technology brands stocks celebrities finance ncaa football social networks
Social topic influence linux, data, space, journey, software #3359, what is, microsoft, edge, core, windows
Top accounts mentioned or mentioned by @cyberrekk @chovwenofuru @emperoredetan @cybercombat @gabbytech01 @beubby71 @cyber_rekk @ireteeh @onijec @segoslavia @anic4uu @paul_in_defense @jayhunts @temitopesobulo @cyberrazz @cyberjeremiah @sudosheggs @elonmusk @sisinerd @cyberracheal
Top assets mentioned Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL)
Top posts by engagements in the last [--] hours
"Just passed SAIP Phase [--] Assessment with a 94% score. Proud of the work the discipline and the growth. On to Phase [--]. π #CyberSecurity #LevelUp #Focused"
X Link 2026-02-12T08:46Z [---] followers, [---] engagements
"Day 5/100 - Types of Ransomware Ransomware types include Crypto (encrypts files) Locker (locks systems) Scareware (fake alerts) Doxware/Leakware (data exposure threats) and RaaS (rented malicious tools). Modern attacks often use double extortion combining encryption with data theft or wiper malware that destroys data. Major variants include WannaCry LockBit and REvil. [--]. Crypto Ransomware: Encrypts files making them inaccessible until a ransom is paid for a decryption key. Examples include WannaCry Locky and CryptoLocker. [--]. Locker Ransomware: Locks users out of their operating system or"
X Link 2026-02-14T10:24Z [---] followers, [---] engagements
"@twenty4_io @cyber_combat Brother the group is full"
X Link 2026-02-09T22:36Z [---] followers, [--] engagements
"@cHef_vic__ @ireteeh @OnijeC @segoslavia @Ejikeetolue @jay_hunts @TemitopeSobulo @elormkdaniel Well done Victor"
X Link 2026-02-10T08:35Z [---] followers, [--] engagements
"WHAT YOU DO NOT KNOW ABOUT CHROMIUM Chromium is an open-source web browser project primarily developed by Google that serves as the foundation for Google Chrome Microsoft Edge Opera and others. Launched in [----] it provides the core rendering engine (Blink) networking stack and JavaScript engine (V8) allowing for a faster more secure and minimalist browser experience. It is named "Chromium" because it is the base material used to create "Chrome" plating. Key Aspects of Chromium [--]. Open Source: Unlike Google Chrome which is proprietary Chromium's source code is freely available allowing"
X Link 2026-02-10T12:28Z [---] followers, [---] engagements
"@sudosheggs @ireteeh @TemitopeSobulo @OnijeC @segoslavia @real_nuelOj @jay_hunts @CiscoNetAcad Go go go brooπ―"
X Link 2026-02-11T15:00Z [---] followers, [--] engagements
"A STEP BY STEP GUIDE FOR CYBERSECURITY BEGINNERS. Free Certification Links attached. https://t.co/Je9Jmwic2Q https://t.co/Je9Jmwic2Q"
X Link 2026-02-11T15:21Z [---] followers, [---] engagements
"A STEP BY STEP GUIDE FOR CYBERSECURITY BEGINNERS https://t.co/Je9Jmwic2Q https://t.co/Je9Jmwic2Q"
X Link 2026-02-11T15:22Z [---] followers, [---] engagements
"@cyber_rekk Linux is far betterπ―π―π―"
X Link 2026-02-11T15:29Z [---] followers, [----] engagements
"It is advisable for every cybersecurity analyst to use Linux Linux was built differently. In Linux: The system is modular. Components are separated. You can choose your browser desktop environment window manager even your kernel. Everything is just configurable. In @cyber_rekk words.This is why we love Linux Microsoft doesnt stop you from uninstalling Edge just to annoy you or take away your freedom. Its because in modern Windows Edge is no longer just a browser but rather part of the operating system itself. A lot of Windows components now depend on Edges rendering engine Microsoft doesnt"
X Link 2026-02-11T15:40Z [---] followers, [---] engagements
"@glowfinds_amz Absolutely. DevOps is on my list. Ill be sharing a beginner-friendly roadmap covering Linux Git CI/CD Docker Kubernetes and AWS/Azure soon. Lets connect π€"
X Link 2026-02-11T21:25Z [---] followers, [--] engagements
"@i_am_chinoski @cyberjeremiah Take good care of yourself bro. Health is Wealth"
X Link 2026-02-12T08:48Z [---] followers, [--] engagements
"Decided to join the recent Trend : Go to ChatGPT and use this prompt: Create a caricature of me and my job based on everything you know about me. I AM A CYBERSECURITY ANALYST (Ethical Hacker) AND A WEB DEVELOPER Come back and share your photo: here is mine #CaricatureChallenge #caricaturetrend New Trend : Go to ChatGPT and use this prompt: Create a caricature of me and my job based on everything you know about me. Come back and share your photo: here is mine π https://t.co/lNyTzwGZ9V New Trend : Go to ChatGPT and use this prompt: Create a caricature of me and my job based on everything you"
X Link 2026-02-12T11:35Z [---] followers, [---] engagements
"Decided to join the recent Trend Create a caricature of me and my job based on everything you know about me. I AM A CYBERSECURITY ANALYST (Ethical Hacker) AND A WEB DEVELOPER Come back and share your photo: here is mine #CaricatureChallenge #caricaturetrend i asked chatgpt to create a caricature of me and my job https://t.co/wZEdWt7SbJ i asked chatgpt to create a caricature of me and my job https://t.co/wZEdWt7SbJ"
X Link 2026-02-12T11:39Z [---] followers, [---] engagements
"@Paul_In_Defense @cyber_combat @chovwenofuru @emperoredetan @gabbytech01 @cyber_rekk @_ekwodavid @Tegaebi @anic4uu Congrats brother. π«Ά"
X Link 2026-02-12T15:09Z [---] followers, [--] engagements
"The CIA Triad (Confidentiality Integrity Availability) is the framework security professionals use to design and evaluate systems. Before implementing any security control we ask: Does it protect confidentiality Does it preserve integrity Does it ensure availability #cyberseurity CIA TRIAD The CIA Triad which stands for Confidentiality Integrity and Availability is a fundamental concept in information security that outlines the three core principles that guide the protection of data and information systems. These principles are crucial for https://t.co/MlZbDLPUaM CIA TRIAD The CIA Triad which"
X Link 2026-02-12T15:19Z [---] followers, [--] engagements
"Tech ecosystem is evolving at an unprecedented pace. But whats really happening on the ground Join us on February 16th at 8PM as @chovwenofuru & @emperoredetan break down how technology integrated into Africa how it has evolved over the years and what that evolution means for beginners looking to grow within the Tech ecosystem. This session will deliver practical insights from builders who are actively shaping the space. Hosted by TechForge X Set your reminder and tune in on February 16th for a powerful and insightful conversation. https://x.com/i/spaces/1OwxWeXADbkGQ Tech ecosystem is"
X Link 2026-02-12T19:06Z [---] followers, [---] engagements
"My Twitter Interaction Circle β‘ https://infinitetweet.me/interaction-circle https://infinitetweet.me/interaction-circle"
X Link 2026-02-13T07:55Z [---] followers, [--] engagements
"@cyber_razz pwd"
X Link 2026-02-13T09:24Z [---] followers, [---] engagements
"Congratulations brother. We would sure make it to the last phase. Made it to the next phase of my internship with Sardonyx. The last [--] weeks were intense deep learning unlearning and pushing beyond my comfort zone. I didnt perform in the exams to my full satisfaction but growth is greater than perfection. @ireteeh @segoslavia @OnijeC https://t.co/NiWIZTnsIg Made it to the next phase of my internship with Sardonyx. The last [--] weeks were intense deep learning unlearning and pushing beyond my comfort zone. I didnt perform in the exams to my full satisfaction but growth is greater than"
X Link 2026-02-13T09:57Z [---] followers, [---] engagements
"@elonmusk banger pro max"
X Link 2026-02-13T10:02Z [---] followers, [---] engagements
"@Beubby71 Hello Beulah. Let's connect"
X Link 2026-02-15T09:05Z [---] followers, [--] engagements
"Day 4/100 Understanding Ransomware π»π Ransomware is a category of malicious software (malware) designed to deny users access to their systems or data by encrypting files or locking devices and then demanding payment (ransom) in exchange for restoring access. Over the past decade ransomware has evolved into one of the most disruptive and financially damaging forms of cyberattack globally. Unlike traditional malware that focuses on data theft or espionage ransomware primarily targets system availability while often also compromising confidentiality and integrity. Its impact extends beyond"
X Link 2026-02-13T09:11Z [---] followers, [---] engagements
"@Sisinerd @aicybermagazine This is what intentional community building looks like. π₯ 50+ contributors real industry operators and forward-looking AI security conversations in one issue Thats how you move the ecosystem forward. Massive respect to everyone involved. Congrats to the team"
X Link 2026-02-13T13:34Z [---] followers, [--] engagements
"@Beubby71 Sent you a DM"
X Link 2026-02-15T09:10Z [---] followers, [--] engagements
"@cyber_rekk Yeah.ππΌ Thanks for this insight"
X Link 2026-02-15T09:36Z [---] followers, 13.2K engagements
"π APIs are like the unsung heroes of the web. Here are some important ones cyber beginners often overlook: - Rate Limiting APIs: Prevents abuse ensures fair usage and protects against DDoS attacks. - Geolocation APIs: Provides user location data useful for security and personalization. - Payment Gateway APIs: Enables secure transactions like Stripe or Paystack. - Authentication APIs: Manages user logins like OAuth or JWT. - Error Handling APIs: Provides insights into errors helps with debugging. What is API & how does it work https://t.co/cdFejrZTVy What is API & how does it work"
X Link 2026-02-15T09:42Z [---] followers, [--] engagements
"The crazy part is most people panic when they see it but its actually Windows trying to protect your system from worse damage. Its not the villain its the emergency brake. π¨π» Question is - how many people actually read the error code before restarting π That code tells the whole story. https://twitter.com/i/web/status/2023095128554962999 https://twitter.com/i/web/status/2023095128554962999"
X Link 2026-02-15T18:00Z [---] followers, [---] engagements
"@elonmusk Woooww"
X Link 2026-02-15T19:17Z [---] followers, [---] engagements
"Day 6/100 - How Ransomware Attacks Occur How Ransomware Attacks Actually Happen π»π Ransomware doesnt just appear. It follows a process. Heres how most ransomware attacks occur simplified: [--] - Initial Access (The Entry Point) Attackers get in through: Phishing emails (malicious links or attachments) Unpatched software vulnerabilities Weak or reused passwords Exposed Remote Desktop (RDP) Misconfigured cloud systems One small mistake can open the door. [--] - Establishing Control Once inside attackers: Install backdoors Create hidden accounts Disable security tools They make sure they can stay in"
X Link 2026-02-15T19:18Z [---] followers, [---] engagements
"@CyberRacheal Optic IDπ€"
X Link 2026-02-15T19:26Z [---] followers, [--] engagements
"TechForgeX: Tech Awareness Space Recording (Tech In Africa) We talked about how Tech came to in Africa how it evolved and how beginners can position themselves in the tech space today Big thanks to our speakers for tonight @chovwenofuru @emperoredetan They shared really insightful opinions π See you all next Monday @cyber_combat @cyber_rekk @anic4uu @gabbytech01 https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL"
X Link 2026-02-16T20:55Z [---] followers, [---] engagements
"A Step-by-Step Roadmap to Start Your Cybersecurity Career Starting your journey in cybersecurity can feel overwhelming so many topics so many tools so many certifications. Ive put together a step-by-step roadmap to help beginners focus learn and grow http://x.com/i/article/2020861672756334592 http://x.com/i/article/2020861672756334592"
X Link 2026-02-09T14:13Z [---] followers, [----] engagements
"TechForgeX: Tech Awareness Space Recording (Tech In Africa) We talked about how Tech came to in Africa how it evolved and how beginners can position themselves in the tech space today Big thanks to our speakers for tonight @chovwenofuru @emperoredetan They shared really insightful opinions π See you all next Monday @cyber_combat @cyber_rekk @anic4uu @gabbytech01 https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL"
X Link 2026-02-16T20:55Z [---] followers, [---] engagements
"We're live. Tune in guys https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL"
X Link 2026-02-16T19:04Z [---] followers, [--] engagements
"New space link Set a reminder for my upcoming Space https://x.com/i/spaces/1nAJEEEdozaJL https://x.com/i/spaces/1nAJEEEdozaJL"
X Link 2026-02-16T18:48Z [---] followers, [--] engagements
"Join us Today at 8PM as @chovwenofuru & @emperoredetan break down how technology integrated into Africa how it has evolved over the years and what that evolution means for beginners looking to grow within the Tech ecosystem. This session will deliver practical insights from builders who are actively shaping the space. Hosted by TechForge X https://x.com/i/spaces/1OwxWeXADbkGQ https://x.com/i/spaces/1OwxWeXADbkGQ"
X Link 2026-02-16T10:18Z [---] followers, [---] engagements
"Day 6/100 - How Ransomware Attacks Occur How Ransomware Attacks Actually Happen π»π Ransomware doesnt just appear. It follows a process. Heres how most ransomware attacks occur simplified: [--] - Initial Access (The Entry Point) Attackers get in through: Phishing emails (malicious links or attachments) Unpatched software vulnerabilities Weak or reused passwords Exposed Remote Desktop (RDP) Misconfigured cloud systems One small mistake can open the door. [--] - Establishing Control Once inside attackers: Install backdoors Create hidden accounts Disable security tools They make sure they can stay in"
X Link 2026-02-15T19:18Z [---] followers, [---] engagements
"Happening now Heres my gift of love to everyone β€ CAYA @CayaHQ is holding a very important conversation tomorrow evening on AdTech: Where Tech Data & Marketing Collide. Id like to specially invite you to this meeting where we will be looking into how AdTech powers the web and also the https://t.co/ikHe76dAGJ Heres my gift of love to everyone β€ CAYA @CayaHQ is holding a very important conversation tomorrow evening on AdTech: Where Tech Data & Marketing Collide. Id like to specially invite you to this meeting where we will be looking into how AdTech powers the web and also the"
X Link 2026-02-15T18:09Z [---] followers, [--] engagements
"Heres my gift of love to everyone β€ CAYA @CayaHQ is holding a very important conversation tomorrow evening on AdTech: Where Tech Data & Marketing Collide. Id like to specially invite you to this meeting where we will be looking into how AdTech powers the web and also the career and income opportunities that come with it. @SorinolaGbenga & @theoluwafeyi would be joining the conversation to guide us through the intersection of Technology data and marketing sharing real insights into the careers roles and systems powering digital advertising. πSunday 15th February. 7pm π Dont say I didnt do"
X Link 2026-02-14T12:52Z [----] followers, [---] engagements
"I think I already explained this meme"
X Link 2026-02-15T14:17Z 38.3K followers, [----] engagements
"Tbh https://t.co/vGsoVU25Zj https://t.co/vGsoVU25Zj"
X Link 2026-02-15T10:04Z [---] followers, [--] engagements
"IPv4 vs IPv6"
X Link 2026-02-14T20:19Z 38.3K followers, 15K engagements
"π APIs are like the unsung heroes of the web. Here are some important ones cyber beginners often overlook: - Rate Limiting APIs: Prevents abuse ensures fair usage and protects against DDoS attacks. - Geolocation APIs: Provides user location data useful for security and personalization. - Payment Gateway APIs: Enables secure transactions like Stripe or Paystack. - Authentication APIs: Manages user logins like OAuth or JWT. - Error Handling APIs: Provides insights into errors helps with debugging. What is API & how does it work https://t.co/cdFejrZTVy What is API & how does it work"
X Link 2026-02-15T09:42Z [---] followers, [--] engagements
"What is API & how does it work"
X Link 2026-02-14T21:23Z 38.3K followers, [----] engagements
"W interaction"
X Link 2026-02-15T09:07Z 38.3K followers, 104.8K engagements
"Nah windows [--] was peak"
X Link 2026-02-15T09:07Z 38.3K followers, 363.9K engagements
"RT @cyber_rekk: .exe files cannot run on Linux because they are made for Windows and Linux uses a completely different program format so t"
X Link 2026-02-15T09:36Z [---] followers, [---] engagements
".exe files cannot run on Linux because they are made for Windows and Linux uses a completely different program format so the system does not understand how to execute them. If a malicious site downloads a .exe file onto your Linux system it will usually have no power and will just sit in your Downloads folder like a normal file. Linux also has strong security controls that prevent programs from running with administrator privileges by default which means no file can make important system changes unless you explicitly allow it using sudo. In addition Linux requires execute permission before"
X Link 2026-02-15T09:20Z 10.1K followers, 321.1K engagements
"RT @Ark_Aegis: Just less than a year starting out my cybersecurity journey and this motivates me to keep going. We are getting there. A ma"
X Link 2026-02-15T09:34Z [---] followers, [--] engagements
"Just less than a year starting out my cybersecurity journey and this motivates me to keep going. We are getting there. A matter of time.π― This year makes it [--] years since I began my Cybersecurity journey. Every contribution I make is driven by Knowledge Skills and Experience. Ive learned that growth in this field is about depth and impact β€ This year makes it [--] years since I began my Cybersecurity journey. Every contribution I make is driven by Knowledge Skills and Experience. Ive learned that growth in this field is about depth and impact β€"
X Link 2026-02-13T10:06Z [---] followers, [---] engagements
"This year makes it [--] years since I began my Cybersecurity journey. Every contribution I make is driven by Knowledge Skills and Experience. Ive learned that growth in this field is about depth and impact β€"
X Link 2026-02-12T15:37Z 137.8K followers, [----] engagements
"Cybersecurity certification path"
X Link 2026-02-14T07:26Z 16.4K followers, 37.4K engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/x::Ark_Aegis