Dark | Light
# ![@cyber_razz Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1850589024416886784.png) @cyber_razz Abdulkadir | Cybersecurity

Abdulkadir | Cybersecurity posts on X about linux, how to, ip, command the most. They currently have [------] followers and [---] posts still getting attention that total [-------] engagements in the last [--] hours.

### Engagements: [-------] [#](/creator/twitter::1850589024416886784/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:interactions.svg)

- [--] Week [---------] +13%
- [--] Month [----------] +432%
- [--] Months [----------] +1,102%
- [--] Year [----------] +2,093%

### Mentions: [---] [#](/creator/twitter::1850589024416886784/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:posts_active.svg)

- [--] Week [---] +125%
- [--] Month [---] +187%
- [--] Months [-----] +44%
- [--] Year [-----] +394%

### Followers: [------] [#](/creator/twitter::1850589024416886784/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:followers.svg)

- [--] Week [------] +5.80%
- [--] Month [------] +23%
- [--] Months [------] +195%
- [--] Year [------] +609%

### CreatorRank: [-------] [#](/creator/twitter::1850589024416886784/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  4.26% [social networks](/list/social-networks)  2.43% [finance](/list/finance)  1.82% [stocks](/list/stocks)  1.22% [products](/list/products)  1.22% [celebrities](/list/celebrities)  0.91% [countries](/list/countries)  0.3%

**Social topic influence**
[linux](/topic/linux) #19, [how to](/topic/how-to) 3.65%, [ip](/topic/ip) #1026, [command](/topic/command) #973, [network](/topic/network) #1810, [if you](/topic/if-you) 2.13%, [ai](/topic/ai) 2.13%, [level](/topic/level) 1.82%, [apt](/topic/apt) #372, [what is](/topic/what-is) #1901

**Top accounts mentioned or mentioned by**
[@grok](/creator/undefined) [@wyhycu](/creator/undefined) [@pawel_lasek](/creator/undefined) [@dangitman50](/creator/undefined) [@timetherington](/creator/undefined) [@tj18011800](/creator/undefined) [@elomena328](/creator/undefined) [@iamibnsanusi10](/creator/undefined) [@david_abasi](/creator/undefined) [@abaways](/creator/undefined) [@segoslavia](/creator/undefined) [@cyberrazz](/creator/undefined) [@aitrendzz](/creator/undefined) [@digitalvagrant](/creator/undefined) [@pablodelared](/creator/undefined) [@ark_aegis](/creator/undefined) [@cyberracheal](/creator/undefined) [@saintsai24](/creator/undefined) [@likhontamim](/creator/undefined) [@dingbangfook](/creator/undefined)

**Top assets mentioned**
[Alphabet Inc Class A (GOOGL)](/topic/$googl)
### Top Social Posts
Top posts by engagements in the last [--] hours

"My networking gurus explain this meme please"  
[X Link](https://x.com/cyber_razz/status/2015726408731967808)  2026-01-26T10:00Z 38.1K followers, 2.2M engagements


"Linux or nothing"  
[X Link](https://x.com/cyber_razz/status/2020774594404397504)  2026-02-09T08:19Z 38.1K followers, 21.3K engagements


"Red team tools vs Blue team tools"  
[X Link](https://x.com/cyber_razz/status/2020827927173267958)  2026-02-09T11:51Z 38.1K followers, 38.3K engagements


"Peak intelligence right there"  
[X Link](https://x.com/cyber_razz/status/2022556342393684197)  2026-02-14T06:19Z 38.1K followers, [----] engagements


"Linux users be like"  
[X Link](https://x.com/cyber_razz/status/2018663743752999145)  2026-02-03T12:31Z 38.1K followers, 51.2K engagements


"I use arch btw"  
[X Link](https://x.com/cyber_razz/status/2019384417026982077)  2026-02-05T12:15Z 38.1K followers, [----] engagements


"Apple Pay vs Google pay"  
[X Link](https://x.com/cyber_razz/status/2019696234483904545)  2026-02-06T08:54Z 38.1K followers, 4.5M engagements


"DNS vs DHCP vs ARP vs HTTPS vs TLS vs ICMP vs NTP vs SNMP vs KERBEROS"  
[X Link](https://x.com/cyber_razz/status/2020211302787092736)  2026-02-07T19:01Z 38.1K followers, 69.5K engagements


"Apparently its all chromium"  
[X Link](https://x.com/cyber_razz/status/2020923078545637881)  2026-02-09T18:09Z 38.1K followers, 1.8M engagements


"But it works"  
[X Link](https://x.com/cyber_razz/status/2020975525163040996)  2026-02-09T21:38Z 38.1K followers, 866.3K engagements


"Which protocol is responsible for automatically assigning IP addresses to devices on a network A. DNS B. DHCP C. ARP D. ICMP"  
[X Link](https://x.com/cyber_razz/status/2021335857781932300)  2026-02-10T21:29Z 38.1K followers, 62.8K engagements


"Virtual machines cool tools + and medium account"  
[X Link](https://x.com/cyber_razz/status/2021379354056425661)  2026-02-11T00:22Z 38.1K followers, 20.7K engagements


"I updated Kali on a Tuesday. That was my first mistake. The notification had been sitting there for a week. [---] packages. Routine. Id done it a hundred times. Apt update apt upgrade walk away come back everything works. This time something went quiet. The terminal spat out the usual wall of text. Unpacking. Preparing. Setting up. Then a pause. Then a prompt Id never seen before. Something about a modified config file. I hit Enter without reading it. Default. Fine. Then the screen cleared. I typed ifconfig. Command not found. I typed systemctl start networking. Failed to connect to bus. I"  
[X Link](https://x.com/cyber_razz/status/2021708001510379709)  2026-02-11T22:08Z 38.1K followers, 14.1K engagements


"Chat.what device is this"  
[X Link](https://x.com/cyber_razz/status/2021859777869959452)  2026-02-12T08:11Z 38.1K followers, 30.1K engagements


"Spanning Tree Protocol (STP) is a Layer [--] network protocol used by Ethernet switches to prevent switching loops in networks with redundant links by dynamically identifying and blocking unnecessary paths. It works by electing a root bridge calculating the shortest path to that root from each switch and placing redundant ports into a blocking state while keeping them available as backups ensuring loop-free communication preventing broadcast storms and maintaining network stability if a link fails. https://twitter.com/i/web/status/2021920025574006854"  
[X Link](https://x.com/cyber_razz/status/2021920025574006854)  2026-02-12T12:11Z 38.1K followers, [----] engagements


"What kind of a Linux user are you"  
[X Link](https://x.com/cyber_razz/status/2022204392783720671)  2026-02-13T07:01Z 38.1K followers, 101.4K engagements


"I laughed at this"  
[X Link](https://x.com/cyber_razz/status/2022631494246908381)  2026-02-14T11:18Z 38.1K followers, 242.2K engagements


"@UIbyBiba πŸ˜” make I paste aza for flowers"  
[X Link](https://x.com/cyber_razz/status/2022692378877005932)  2026-02-14T15:20Z 38.1K followers, [--] engagements


"Interviewer: Your site loads in 3s on 5G but 30s on 4G. Same content. Why Me: Because bandwidth isnt the problem. Latency is. 5G has ultra-low latency while 4G doesnt Your page isnt one file. Its 100+ requests: DNS TCP TLS JS CSS APIs fonts images On 5G: takes milliseconds On 4G: every handshake hurts Now Add: packet loss retransmissions head-of-line blocking JS blocking render no code splitting no lazy loading no CDN edge caching 5G masks poor architecture while 4G exposes it starkly. The same content results in different network behaviors. Interviewer: Your website loads in [--] seconds on 5G."  
[X Link](https://x.com/cyber_razz/status/2022707388264944040)  2026-02-14T16:19Z 38.1K followers, [----] engagements


"Why do most hackers and unauthorized groups use Tor Its not because it makes them invisible. Instead it raises the cost of tracking them. Tor routes your traffic through multiple relays across different countries so the destination doesnt see your real IP address. This alone disrupts the easiest way for defenders to attribute your actions Now lets Consider a real life scenario: Imagine accessing a misconfigured API or admin panel from your home IP address. A single log entry later your ISP city and approximate location are known. Now theres a trail of evidence. Now do the same thing over Tor."  
[X Link](https://x.com/cyber_razz/status/2016063225876435031)  2026-01-27T08:18Z 38.1K followers, 448.3K engagements


"On his first day as the new IT security manager Dave was eager to implement his zero-trust protocol but his own trust in the company was shattered before his second cup of coffee when a cheerful email entitled "Your Bonus Details" popped up. Figuring it was a warm welcome from HR he clicked it unleashing a ransomware attack that promptly encrypted the entire server and displayed a message demanding a hefty sum in Bitcoin which was signed off with "Happy First Day Champ" from an anonymous hacker. As his new boss stared at the glowing screens Daves only course of action was to slowly push the"  
[X Link](https://x.com/cyber_razz/status/2022711255614525728)  2026-02-14T16:35Z 38.1K followers, [----] engagements


"NETWORKING KNOWLEDGE CHECKPOINT We have 220.50.35.0/25 ip address. In the company we have [--] FLOORS for each floor we will use a different subnet. What is the THIRD FLOORS NETWORK ADDRESS ) 220.50.35.8 b) 220.50.35.32 c) 220.50.35.0 d) 220.50.35.64 e) 220.50.35.128"  
[X Link](https://x.com/anyuser/status/1882000328301887695)  2025-01-22T09:40Z 38.1K followers, 158.3K engagements


"NETWORKING KNOWLEDGE CHECKPOINT A network administrator needs to create a subnet with [--] usable host IP addresses. Which of the following subnet masks would meet this requirement a) 255.255.255.192 b) 255.255.255.224 c) 255.255.255.240 d) 255.255.255.248"  
[X Link](https://x.com/anyuser/status/1883091451657240720)  2025-01-25T09:56Z 38.1K followers, 72K engagements


"NETWORKING KNOWLEDGE CHECKPOINT:"  
[X Link](https://x.com/anyuser/status/1898019103568207879)  2025-03-07T14:33Z 38.1K followers, 144.5K engagements


"Networking Physical Tools"  
[X Link](https://x.com/anyuser/status/1962220457848881386)  2025-08-31T18:26Z 38.1K followers, 29.2K engagements


"ROUTING VS SWITCHING"  
[X Link](https://x.com/anyuser/status/1967559494571000037)  2025-09-15T12:01Z 38.1K followers, 23K engagements


"TYPES OF IP ADDRESSES"  
[X Link](https://x.com/anyuser/status/1968753579235160296)  2025-09-18T19:06Z 38.1K followers, 37.1K engagements


"TOP [--] CYBERSECURITY TOOLS IN 2025"  
[X Link](https://x.com/anyuser/status/1969114248493011203)  2025-09-19T18:59Z 38.1K followers, 33.8K engagements


"6 TYPES OF API TESTING"  
[X Link](https://x.com/anyuser/status/1970497079811194986)  2025-09-23T14:34Z 38.1K followers, 46.7K engagements


"IP command sheet"  
[X Link](https://x.com/anyuser/status/1974507408895746431)  2025-10-04T16:10Z 38.1K followers, 43.2K engagements


"Useful Wireshark Filters"  
[X Link](https://x.com/anyuser/status/1977058968770900161)  2025-10-11T17:09Z 38.1K followers, 68.7K engagements


"Red Team tools"  
[X Link](https://x.com/anyuser/status/1977739166398951610)  2025-10-13T14:12Z 38.1K followers, 26.4K engagements


"Top [--] Platforms to Practice Ethical Hacking"  
[X Link](https://x.com/anyuser/status/1988302277791436929)  2025-11-11T17:46Z 38.1K followers, 35.1K engagements


"FAT32 vs NTFS"  
[X Link](https://x.com/cyber_razz/status/1988334932536746415)  2025-11-11T19:56Z 37.9K followers, 43.5K engagements


"How to view all hidden logs and file activities on your windows PC (Perfect to know if someone messed around without your permission )"  
[X Link](https://x.com/cyber_razz/status/2013312276917305514)  2026-01-19T18:07Z 37.8K followers, 67.1K engagements


"How to enter BIOS on your windows PC without pressing any key"  
[X Link](https://x.com/cyber_razz/status/2015336525320331309)  2026-01-25T08:10Z 36.4K followers, 74.1K engagements


"Cant argue with this representation"  
[X Link](https://x.com/cyber_razz/status/2015472870198063255)  2026-01-25T17:12Z 36.6K followers, 207.4K engagements


"Can someone explain why operating systems like Mac or Linux are rarely infected by ransomware attacks"  
[X Link](https://x.com/cyber_razz/status/2016162643862602019)  2026-01-27T14:53Z 37K followers, 389.2K engagements


"You wont see a more perfect illustration"  
[X Link](https://x.com/cyber_razz/status/2016194021446557880)  2026-01-27T16:58Z 36.3K followers, 91K engagements


"How I love Linux jokes"  
[X Link](https://x.com/cyber_razz/status/2016514647898141143)  2026-01-28T14:12Z 37.5K followers, 139.3K engagements


"12 pillars of Network security"  
[X Link](https://x.com/cyber_razz/status/2016804602159481165)  2026-01-29T09:24Z 37K followers, 15.2K engagements


"Linux distributions if they were students"  
[X Link](https://x.com/cyber_razz/status/2016837791129174351)  2026-01-29T11:36Z 36.8K followers, 52.3K engagements


"And then your Linux machine breaks"  
[X Link](https://x.com/cyber_razz/status/2016886516069372259)  2026-01-29T14:49Z 36.9K followers, 65.1K engagements


"Chown vs chmod I think this illustration does justice wbu"  
[X Link](https://x.com/cyber_razz/status/2016886676191076725)  2026-01-29T14:50Z 36.9K followers, [----] engagements


"Ill stick to Kali tbh"  
[X Link](https://x.com/cyber_razz/status/2017178501929988430)  2026-01-30T10:10Z 36.7K followers, [----] engagements


"How DNS works"  
[X Link](https://x.com/cyber_razz/status/2017179919105622516)  2026-01-30T10:15Z 37.1K followers, [----] engagements


"IPv4 vs IPv6"  
[X Link](https://x.com/cyber_razz/status/2017212770274455623)  2026-01-30T12:26Z 37.8K followers, 20.9K engagements


"Do you know hackers dont need to stay logged in to keep control of a Linux server Once they leave behind access keys they can come back anytime silently"  
[X Link](https://x.com/cyber_razz/status/2017233065576182119)  2026-01-30T13:46Z 37.6K followers, 86.7K engagements


"More jobs to cybersecurity professionals"  
[X Link](https://x.com/cyber_razz/status/2017244664961569123)  2026-01-30T14:33Z 37.5K followers, [----] engagements


"Learn Linux first"  
[X Link](https://x.com/cyber_razz/status/2017250886481756591)  2026-01-30T14:57Z 37.5K followers, 20.8K engagements


"Types of Malwares"  
[X Link](https://x.com/cyber_razz/status/2017309858840629399)  2026-01-30T18:52Z 37.5K followers, [----] engagements


"A Linux administrator wants to schedule a script to run every day at 2:00 AM. Which tool should be used A. at B. cron C. systemctl D. nohup"  
[X Link](https://x.com/cyber_razz/status/2017311330076606726)  2026-01-30T18:57Z 36.8K followers, 55.4K engagements


"Legendary command Its been rumored to this day that no one knows what this command does Especially if you add sudo before running it"  
[X Link](https://x.com/cyber_razz/status/2017331912063254608)  2026-01-30T20:19Z 36.2K followers, 11.5K engagements


"That device on his back isnt a weapon; its electronic security gear. The antennas are used for RF control essentially managing wireless signals around high-risk events. The primary reasons for its use are: - Blocking phone calls mobile data Wi-Fi and Bluetooth. - Preventing remote-triggered threats. - Stopping unauthorized recordings or live streams. - Limiting coordination between hostile actors. Each antenna targets a different frequency band providing wider coverage. Youll typically see this device at: - VIP movements. - Political or religious gatherings. - High-security public events."  
[X Link](https://x.com/cyber_razz/status/2017487498293719171)  2026-01-31T06:37Z 37.1K followers, 23.2K engagements


"Types of Networks"  
[X Link](https://x.com/cyber_razz/status/2017513821930201093)  2026-01-31T08:22Z 37.5K followers, [----] engagements


"Hmmmm.I see"  
[X Link](https://x.com/cyber_razz/status/2017527474104467863)  2026-01-31T09:16Z 36.7K followers, 45.9K engagements


"The Pros = Cons"  
[X Link](https://x.com/cyber_razz/status/2017548156813131784)  2026-01-31T10:38Z 38.1K followers, 49.5K engagements


"Wait a minute"  
[X Link](https://x.com/cyber_razz/status/2017582677872763295)  2026-01-31T12:56Z 37.5K followers, 21.3K engagements


"Internet explorer isnt that bad anymore Right Guess the imposter 😭 https://t.co/eblkLfQLZq Guess the imposter 😭 https://t.co/eblkLfQLZq"  
[X Link](https://x.com/cyber_razz/status/2017583534668423668)  2026-01-31T12:59Z 37.5K followers, [----] engagements


"I wonder what cat9 Ethernet cables would look like"  
[X Link](https://x.com/cyber_razz/status/2017588515257639368)  2026-01-31T13:19Z 36.7K followers, [----] engagements


"A static IP address is one that doesnt change. Once its given to a device it stays the same every time the device connects to the network unless someone changes it themselves. So to put it simply: Static IP = a fixed permanent address Dynamic IP = a temporary address that can change Why we use static IPs: Hosting servers or websites Remote access (SSH VPN CCTV home labs) Network devices like printers routers firewalls Basically anything that needs to be consistently reachable The downside: *It costs more (from ISPs) *Its a bit easier to target if its exposed to the internet *It needs manual"  
[X Link](https://x.com/cyber_razz/status/2017590435326181461)  2026-01-31T13:26Z 37.5K followers, [----] engagements


"Who here wants to learn how to install a fully functional Linux machine(any distro) on their iPad or iPhones"  
[X Link](https://x.com/cyber_razz/status/2017602669066543329)  2026-01-31T14:15Z 37.8K followers, 253.2K engagements


"Good old days I see this now and wonder how much vulnerable was Facebook in its early post-production days"  
[X Link](https://x.com/cyber_razz/status/2017635879439757373)  2026-01-31T16:27Z 36.7K followers, [----] engagements


"Privilege escalation using Linux capabilities"  
[X Link](https://x.com/cyber_razz/status/2017659146846249018)  2026-01-31T18:00Z 37.7K followers, 26.4K engagements


"A network administrator needs to allow private IP addresses inside a network to access the internet using a single public IP address. Which technology BEST accomplishes this A. Static routing B. NAT C. VLAN D. ARP"  
[X Link](https://x.com/cyber_razz/status/2017682902142661100)  2026-01-31T19:34Z 37.5K followers, 20.1K engagements


"Its a new month already 1/12 Hope yall are working on crushing those goals you set out to achieve"  
[X Link](https://x.com/cyber_razz/status/2017827837680460174)  2026-02-01T05:10Z 37.4K followers, [----] engagements


"Were the Epstein files finally released"  
[X Link](https://x.com/cyber_razz/status/2017841684520882321)  2026-02-01T06:05Z 37.4K followers, [----] engagements


"Time to make the change πŸ™‚"  
[X Link](https://x.com/cyber_razz/status/2017900050421015007)  2026-02-01T09:57Z 37.5K followers, [----] engagements


".@Ubuntu is this true"  
[X Link](https://x.com/cyber_razz/status/2017921087602884640)  2026-02-01T11:20Z 37.8K followers, 112.8K engagements


"IPv4 Classes & Subnet Mask"  
[X Link](https://x.com/cyber_razz/status/2017921516768227660)  2026-02-01T11:22Z 37.6K followers, [----] engagements


"Windows has a memory and it never forgets. Every USB device youve ever plugged into a Windows PC gets logged including flash drives phones keyboards and even after you remove them. Unplugging doesnt erase the data; Windows keeps a record of drivers stability and forensics. Your system remembers the device type vendor serial number and the first and last time it was connected. So if you think youve removed a device Windows still has the receipts. Windows keeps a permanent record of every USB device youve ever plugged in even after its removed. Windows keeps a permanent record of every USB"  
[X Link](https://x.com/cyber_razz/status/2017922393180713417)  2026-02-01T11:26Z 37.5K followers, [----] engagements


"Me putting up signs as the new network engineer"  
[X Link](https://x.com/cyber_razz/status/2017923675442311424)  2026-02-01T11:31Z 37.9K followers, 110.3K engagements


"What is Kali Linux to you"  
[X Link](https://x.com/cyber_razz/status/2017960604951044458)  2026-02-01T13:57Z 37.5K followers, 12K engagements


"What did you achieve in January"  
[X Link](https://x.com/cyber_razz/status/2017983317300162750)  2026-02-01T15:28Z 37.5K followers, [----] engagements


"Tbh just felt like making this"  
[X Link](https://x.com/cyber_razz/status/2018013164323905559)  2026-02-01T17:26Z 37.5K followers, [----] engagements


"Linux will prolly run on the static electricity from socks"  
[X Link](https://x.com/cyber_razz/status/2018039202886152632)  2026-02-01T19:10Z 37.5K followers, 25.5K engagements


"The best of tools are open source"  
[X Link](https://x.com/cyber_razz/status/2018225981551476776)  2026-02-02T07:32Z 37.8K followers, 13.7K engagements


"Ever wondered why iPhone screenshots never reveal your password πŸ‘€ Apple doesnt simply blur it after the fact. Its a much more sophisticated approach. When you type a password on iOS its entered into a secure text field. The actual characters are never displayed on the screen. Only dots () are visually present. Therefore when you take a screenshot: iOS can only capture whats rendered And the password is not present to be captured Additionally iOS designates sensitive UI elements (passwords OTPs Apple Pay Face ID) as non-capturable. Even screen recordings and screen sharing cannot detect them."  
[X Link](https://x.com/cyber_razz/status/2018231323047886992)  2026-02-02T07:53Z 37.7K followers, 461.7K engagements


"Who can tell me what this is"  
[X Link](https://x.com/cyber_razz/status/2018252893376184709)  2026-02-02T09:19Z 37.4K followers, 27.2K engagements


"Lisanil-gaib"  
[X Link](https://x.com/cyber_razz/status/2018255802968973560)  2026-02-02T09:30Z 37.4K followers, [----] engagements


"It really be like this"  
[X Link](https://x.com/cyber_razz/status/2018282040991351228)  2026-02-02T11:15Z 37.5K followers, [----] engagements


"Realest meme youd see today"  
[X Link](https://x.com/cyber_razz/status/2018282164354265153)  2026-02-02T11:15Z 37.5K followers, 20.2K engagements


"@segoslavia 😭I did without a sandbox Seems safe shaa Scanned it later and didnt download a thing from there"  
[X Link](https://x.com/cyber_razz/status/2018302552001941745)  2026-02-02T12:36Z 37.7K followers, [---] engagements


"A PC that was advertised with 32GB RAM arrived with 48GB and everyone immediately assumed it was a mistake. However theres a possibility that this isnt the case. Many prebuilt systems are marketed with a base configuration of 32GB RAM but sellers often add extra RAM discreetly for various reasons: - Leftover stock - Small performance upgrades - Mixed DIMMs (216 + [--] = 48GB) - Bundles that arent reflected in the listing Its important to note that marketing pages often lag behind actual builds. As long as the system boots properly runs smoothly and the RAM is compatible in terms of speed and"  
[X Link](https://x.com/cyber_razz/status/2018550517949964499)  2026-02-03T05:02Z 37.5K followers, 370.4K engagements


"Ive answered this before but it wouldnt hurt to go again So why do most hackers and unauthorized groups use Tor Its not because it makes them invisible. Instead it raises the cost of tracking them. Tor routes your traffic through multiple relays across different countries so the destination doesnt see your real IP address. This alone disrupts the easiest way for defenders to attribute your actions: quick attribution. Consider a real-life scenario: Imagine accessing a misconfigured API or admin panel from your home IP address. A single log entry later your ISP city and approximate location are"  
[X Link](https://x.com/cyber_razz/status/2018565427375313146)  2026-02-03T06:01Z 37.5K followers, 15.8K engagements


"I hate both types"  
[X Link](https://x.com/cyber_razz/status/2018600452796158088)  2026-02-03T08:20Z 37.5K followers, [----] engagements


"Hackers can run programs on Windows without creating a visible process"  
[X Link](https://x.com/cyber_razz/status/2018604039986967030)  2026-02-03T08:34Z 37.8K followers, [----] engagements


"Money can't buy you time but it can buy you an SSD. And that's basically the same thing right"  
[X Link](https://x.com/cyber_razz/status/2018651777420369967)  2026-02-03T11:44Z 37.7K followers, [----] engagements


"Do you get it"  
[X Link](https://x.com/cyber_razz/status/2018663519722627523)  2026-02-03T12:31Z 37.5K followers, 70.8K engagements


"Someone built a website to avoid black people 😭😭😭 http://peaceandquiet.io http://peaceandquiet.io"  
[X Link](https://x.com/cyber_razz/status/2018693063657275722)  2026-02-03T14:28Z 37.5K followers, [----] engagements


"Is it even possible Short answer: No. Long answer (simple physics πŸ‘‡): Wi-Fi operates on radio waves (2.4GHz or 5GHz). The human body is primarily composed of water which can absorb some of this radio energy. Therefore yes a person can slightly weaken a Wi-Fi signal if they are: - Positioned directly next to the router - Standing between the router and their device - The signal is already weak However heres the crucial point people often overlook: Wi-Fi doesnt travel in a straight line. It spreads bounces reflects and reaches your device from multiple paths. Therefore one person cannot block"  
[X Link](https://x.com/cyber_razz/status/2018730258636087803)  2026-02-03T16:56Z 37.7K followers, [----] engagements


"Annoying everytime 😭"  
[X Link](https://x.com/cyber_razz/status/2018747015975649445)  2026-02-03T18:02Z 37.5K followers, [----] engagements


"A Linux administrator needs to find which process is listening on TCP port [---] on a server. Which command BEST accomplishes this A. ps aux grep [---] B. ss -tulnp C. top D. df -h"  
[X Link](https://x.com/cyber_razz/status/2018761936725479683)  2026-02-03T19:02Z 37.9K followers, 53.8K engagements


"TeamViewer got me hacked ❌ Heres what actually happened: - I installed TeamViewer. - I reused the same old password. - That password had leaked from another website. - The attacker tried it on TeamViewer. - The login worked. Thats not hacking to be precise. Thats credential stuffing. There was no exploit. There was no breach. It was just logging in with a stolen key. Remote access tools are often blamed because when theyre abused its noticeable cursor movement files disappearing and panic everywhere. But its like this: Leaving your house key under the mat. A robber uses it. Then you say the"  
[X Link](https://x.com/cyber_razz/status/2018779137260106013)  2026-02-03T20:10Z 37.5K followers, [----] engagements


"Rouge DHCP SERVER ATTACK FOR DUMMIES"  
[X Link](https://x.com/cyber_razz/status/2018791938124857794)  2026-02-03T21:01Z 38K followers, 56.5K engagements


"You know what I respect this"  
[X Link](https://x.com/cyber_razz/status/2018809568202207584)  2026-02-03T22:11Z 37.5K followers, [----] engagements


"Linux says Disk Space Low but the math aint mathing. You check: df -h 100% full du -sh / 20GB used on a 100GB disk So where did the other 80GB go πŸ‘€ Deleted files Nope. Hidden mounts Nada. Then you run: df -i 100% And violla there it is You ran out of inodes. So what actually happened To understand the root cause lets delve into the mechanics of inodes. Each file regardless of its size requires an inode to be stored on the disk. When the inode table reaches its capacity the filesystem becomes unable to allocate new files even if there are ample free disk blocks available. Common applications"  
[X Link](https://x.com/cyber_razz/status/2018961074700067201)  2026-02-04T08:13Z 36.7K followers, 19K engagements


"Is learning a programming language necessary for someone trying to break into cybersecurity"  
[X Link](https://x.com/cyber_razz/status/2018964674390179888)  2026-02-04T08:27Z 37.5K followers, [----] engagements


"How Botnet works for Dummies"  
[X Link](https://x.com/cyber_razz/status/2018986102166847605)  2026-02-04T09:52Z 37.5K followers, 19.3K engagements


"There are levels to this sh*t"  
[X Link](https://x.com/cyber_razz/status/2019016991353266642)  2026-02-04T11:55Z 37.6K followers, 30.5K engagements


"And using password managers creates a single point of failure/ attack So what should be done SAFE PASSWORDS ARE DIFFICULT TO REMEMBER EVEN BY THE CREATOR OF IT SAFE PASSWORDS ARE DIFFICULT TO REMEMBER EVEN BY THE CREATOR OF IT"  
[X Link](https://x.com/cyber_razz/status/2019039268665262499)  2026-02-04T13:24Z 37.8K followers, [----] engagements


"If I had a dollar for everytime I was asked to hacked an Instagram or Facebook account"  
[X Link](https://x.com/cyber_razz/status/2019039947685261804)  2026-02-04T13:26Z 37.8K followers, [----] engagements


"A network administrator wants to reduce broadcast traffic and improve performance within a large Layer [--] network. Which solution BEST accomplishes this A. Implement VLANs B. Increase link bandwidth C. Enable port mirroring D. Use static IP addressing"  
[X Link](https://x.com/cyber_razz/status/2019142052886482948)  2026-02-04T20:12Z 37.5K followers, [----] engagements


"Runs on anything"  
[X Link](https://x.com/cyber_razz/status/2019142809698332962)  2026-02-04T20:15Z 37.8K followers, 31.7K engagements


":wq 😭 Every Vim user has this character arc. https://t.co/iaF2uzNjfm Every Vim user has this character arc. https://t.co/iaF2uzNjfm"  
[X Link](https://x.com/cyber_razz/status/2019142919970779259)  2026-02-04T20:16Z 37.4K followers, [----] engagements


"My DMs are flooded with messages like I want to start my cybersecurity journey. How can I begin Answer: Start from my pinned tweet on my profile. Good luck ❀"  
[X Link](https://x.com/cyber_razz/status/2019169700974854306)  2026-02-04T22:02Z 37.5K followers, [----] engagements


"Tell me What are you learning today"  
[X Link](https://x.com/cyber_razz/status/2019338398662816140)  2026-02-05T09:12Z 37.5K followers, [----] engagements


"Someone launched an AI website that lets you rent actual Human beings😭 If your AI agent wants to hire someone to perform an in-person task for them its as simple as making one MCP call. πŸ‘‰ http://rentahuman.ai http://rentahuman.ai"  
[X Link](https://x.com/cyber_razz/status/2019341392993218957)  2026-02-05T09:24Z 37.8K followers, [----] engagements


"😭witnessed this on my TL"  
[X Link](https://x.com/cyber_razz/status/2019344039913615690)  2026-02-05T09:35Z 37.5K followers, [----] engagements


"Types of Servers"  
[X Link](https://x.com/cyber_razz/status/2019353386211242060)  2026-02-05T10:12Z 37.7K followers, 10.1K engagements


"Learnt the basics Worked on labs Documented some Then start applying pookie πŸ˜—"  
[X Link](https://x.com/cyber_razz/status/2019371921629196695)  2026-02-05T11:25Z 37.5K followers, [----] engagements


"Just [---] years left"  
[X Link](https://x.com/cyber_razz/status/2019383743950077992)  2026-02-05T12:12Z 37.5K followers, [----] engagements


"The 3-2-1 Rule Effective against ransomware attacks"  
[X Link](https://x.com/cyber_razz/status/2019384547234968042)  2026-02-05T12:16Z 37.6K followers, [----] engagements


"@sebp888 @TutaPrivacy Can they"  
[X Link](https://x.com/cyber_razz/status/2019429444071641404)  2026-02-05T15:14Z 36.4K followers, [----] engagements


"I know someone that is surviving off energy drinks"  
[X Link](https://x.com/cyber_razz/status/2019434246629478410)  2026-02-05T15:33Z 37.5K followers, 37.1K engagements


"@helayxv Lmao you speak and type in English Is that the language of your ancestors"  
[X Link](https://x.com/cyber_razz/status/2019661332598124611)  2026-02-06T06:35Z 36.8K followers, [----] engagements


"Wanna see which of your LinkedIn connections appear in the Epstein files πŸ‘‰ http://github.com/cfinke/EpsteIn http://github.com/cfinke/EpsteIn"  
[X Link](https://x.com/cyber_razz/status/2019661772903661603)  2026-02-06T06:37Z 36.7K followers, [----] engagements


"Fun fact: The interview is tougher than the actual job"  
[X Link](https://x.com/cyber_razz/status/2019693812134867293)  2026-02-06T08:45Z 36.6K followers, [----] engagements


"You might be wondering how Ans: tailor different resumes to your different skills"  
[X Link](https://x.com/cyber_razz/status/2019696604530549079)  2026-02-06T08:56Z 37.1K followers, [----] engagements


"Dont lie will you install"  
[X Link](https://x.com/cyber_razz/status/2019704718772306251)  2026-02-06T09:28Z 37.5K followers, [----] engagements


"Can someone explain how this is possible"  
[X Link](https://x.com/cyber_razz/status/2019760385302126624)  2026-02-06T13:09Z 37.6K followers, 23.8K engagements


"Just give me the flipper zero"  
[X Link](https://x.com/cyber_razz/status/2019785890084610510)  2026-02-06T14:50Z 37.7K followers, 30.1K engagements


"Lets not forget the OG notepad VS code is still the best. https://t.co/e1wjDZNIHf VS code is still the best. https://t.co/e1wjDZNIHf"  
[X Link](https://x.com/cyber_razz/status/2019798333489869134)  2026-02-06T15:40Z 37.4K followers, [----] engagements


"Thats all it is to that"  
[X Link](https://x.com/cyber_razz/status/2019844759624511875)  2026-02-06T18:44Z 37.5K followers, [----] engagements


"A Linux administrator wants to change the ownership of a file named report.txt to user alice and group finance. Which command BEST accomplishes this A. chmod alice:finance report.txt B. chown alice:finance report.txt C. usermod alice finance report.txt D. groupadd finance report.txt"  
[X Link](https://x.com/cyber_razz/status/2019862318402724202)  2026-02-06T19:54Z 37.6K followers, 12.3K engagements


"Its kind of stupid to do tbh If you know anything about university portals then youd know of the constant verification that are been carried out From the actual paper to the lecturers dashboard to the senate before it finally gets uploaded to the portal Once they are any disparates found it is 100% investigated. with this information any smart person knows that its always a matter of time before your friends gets caught and guess what Both of you will do JAIL Theyll term it defrauding the state or something similarly big in court lmao 😭. Itll only work if you hack both the lecturers"  
[X Link](https://x.com/cyber_razz/status/2019913159453159916)  2026-02-06T23:16Z 37.8K followers, 10.8K engagements


"You cant install Netflix on a 90s TV but you can still watch Netflix on it. Heres how: A typical 90s TV lacks an operating system internet access and only has antenna or RCA (red white yellow) inputs. Netflix on the other hand requires an operating system internet access and an app runtime. So the TV itself is essentially a dumb display. The workaround is to let another device handle the smart work. Heres how: - Use a modern device like a Chromecast Fire Stick Roku laptop or PlayStation. - Connect the device to the 90s TV using an HDMI cable. - Use an HDMI-to-RCA converter to connect the HDMI"  
[X Link](https://x.com/cyber_razz/status/2020030323610755080)  2026-02-07T07:02Z 37.8K followers, [----] engagements


"In master ugwes voice it is time"  
[X Link](https://x.com/cyber_razz/status/2020109751141437506)  2026-02-07T12:17Z 37.7K followers, 26.6K engagements


"Humans will forever be the weakest and easiest link"  
[X Link](https://x.com/cyber_razz/status/2020110043060854938)  2026-02-07T12:19Z 37.7K followers, [----] engagements


"Linux hate will not be tolerated 😑 https://t.co/pVxiY7IfNi https://t.co/pVxiY7IfNi"  
[X Link](https://x.com/cyber_razz/status/2020211636427161954)  2026-02-07T19:02Z 37.8K followers, [----] engagements


"Im about to make all my followers happy again Brb"  
[X Link](https://x.com/cyber_razz/status/2020215249660498016)  2026-02-07T19:17Z 37.9K followers, 11.8K engagements


"Has anyone here experienced visiting a data center That place was the most beautiful place in existence (atleast to me) we sadly werent allowed to record anything due to security reasons though. One of my many dreams is to work in one. https://t.co/3wpl6emgvb https://t.co/3wpl6emgvb"  
[X Link](https://x.com/cyber_razz/status/2020219915286802910)  2026-02-07T19:35Z 37K followers, [----] engagements


"So why does the Wi-Fi option on your Windows keep disappearing Heres the reason why: Its usually not your internet connection. Its Windows temporarily forgetting that your Wi-Fi card exists. Wi-Fi driver crash or failure: Windows communicates with your Wi-Fi hardware through drivers. If the driver malfunctions (sleeps hibernates or behaves unpredictably) Windows behaves as if theres no adapter at all. Windows Update fix: An update can replace a working driver with a broken or generic one. Although the hardware is present Windows cant communicate with it causing Wi-Fi to disappear."  
[X Link](https://x.com/cyber_razz/status/2020236321160040602)  2026-02-07T20:40Z 37.8K followers, [----] engagements


"ifconfig* for Linux"  
[X Link](https://x.com/cyber_razz/status/2020257779160850933)  2026-02-07T22:06Z 37.9K followers, 17.2K engagements


"How to find subdomains to expand attack surfaces on web applications"  
[X Link](https://x.com/cyber_razz/status/2020388894269661583)  2026-02-08T06:47Z 37.9K followers, 12.6K engagements


"Running cipher /w on an SSD is essentially self-sabotage. Heres why: cipher /w was designed for older hard disk drives (HDDs). Its purpose is to overwrite free space multiple times rendering deleted files unrecoverable. However this logic doesnt apply to SSDs. SSDs have several limitations: - Limited write cycles - Wear leveling (they strategically rearrange writes) - Hidden flash blocks that are inaccessible directly When you execute cipher /w on an SSD youre not actually cleaning anything. Instead youre forcing the SSD to perform unnecessary and excessive writes. The consequences of this"  
[X Link](https://x.com/cyber_razz/status/2020423318487138363)  2026-02-08T09:03Z 37.5K followers, [----] engagements


"Why cant data centers just use dirty water Why does it have to be clean drinking water Short answer: Servers arent rice so they dont need water. Long answer: Most data centers dont dump water onto servers. Instead they use it for cooling systems like chillers cooling towers and heat exchangers. However those systems hate dirty water. Dirty or untreated water contains: - Minerals that cause scale buildup - Dirt and sand that clog pipes - Microbes that lead to corrosion and biofouling These issues reduce heat transfer damage equipment and cause downtime which is the worst thing that can happen"  
[X Link](https://x.com/cyber_razz/status/2020426550647165357)  2026-02-08T09:16Z 38K followers, 28.5K engagements


"The algorithm really said for you today lol Lets get into it What if the load balancer itself goes down Thats the first thing architects worry about. Because yes a single load balancer can be a single point of failure. So in real systems its almost never just one. Heres how this is handled πŸ‘‡ Redundancy Load balancers come in pairs (or more). Active/active or active/passive. If one dies traffic shifts instantly. Health checks If a load balancer stops responding its removed automatically. No humans. No panic. Just failover. DNS failover If an entire load balancer layer goes down DNS can"  
[X Link](https://x.com/cyber_razz/status/2020427728139223472)  2026-02-08T09:21Z 37.8K followers, [----] engagements


"There was a time when everything functioned flawlessly on localhost. However production laughed and ignited a firestorm. The same code the same logic yet the outcome was drastically different. Why Because localhost is a deceptive illusion. On your machine you have the right operating system the correct library versions the appropriate ports and the ideal environment variables. You have the energy to believe that your code works perfectly. But production is a different beast altogether. It operates on a different operating system relies on different dependencies has different configurations"  
[X Link](https://x.com/cyber_razz/status/2020436966534201562)  2026-02-08T09:58Z 37.7K followers, 50.8K engagements


"@paul_nets Ding ding ding πŸ›Ž"  
[X Link](https://x.com/cyber_razz/status/2020440490168971505)  2026-02-08T10:12Z 37.2K followers, [---] engagements


"Were you this old"  
[X Link](https://x.com/cyber_razz/status/2020451611563131026)  2026-02-08T10:56Z 37.6K followers, [----] engagements


"The 2g days"  
[X Link](https://x.com/cyber_razz/status/2020469389934334315)  2026-02-08T12:06Z 37.4K followers, [----] engagements


"Is there an option to permanently turn this sh*t off You can be using your phone normally and mistakenly accept this thing"  
[X Link](https://x.com/cyber_razz/status/2020470827095839126)  2026-02-08T12:12Z 37.7K followers, [----] engagements


"In recent news πŸ˜‚"  
[X Link](https://x.com/cyber_razz/status/2020475597630095481)  2026-02-08T12:31Z 37.7K followers, 19.5K engagements


"Facts no cap"  
[X Link](https://x.com/cyber_razz/status/2020486512979083314)  2026-02-08T13:14Z 37.5K followers, [----] engagements


"@z_alijonov iPhone X (10)"  
[X Link](https://x.com/cyber_razz/status/2020499171112022111)  2026-02-08T14:05Z 37.2K followers, [--] engagements


"Why does this happen"  
[X Link](https://x.com/cyber_razz/status/2020540352604647669)  2026-02-08T16:48Z 37.8K followers, 36.5K engagements


"Wydm Linux is boring"  
[X Link](https://x.com/cyber_razz/status/2020545591332241852)  2026-02-08T17:09Z 37.8K followers, 61.8K engagements


"An organization wants to ensure that security incidents are detected as quickly as possible after they occur. Which metric BEST measures this capability A. MTTR B. RTO C. MTTD D. RPO"  
[X Link](https://x.com/cyber_razz/status/2020589751624216611)  2026-02-08T20:05Z 37.9K followers, [----] engagements


"Hit me with the harshest tech fact"  
[X Link](https://x.com/cyber_razz/status/2020599004309147859)  2026-02-08T20:41Z 37.8K followers, [----] engagements


"RAM-only VPN servers mean no logs right Well Not exactly. RAM-only (diskless) servers reduce whats stored long-term but theyre not forensics-proof. Heres why: RAM is not invisible; its volatile. Even while the server is running it retains: active VPN sessions temporary encryption keys connection states network buffers If access occurs before a reboot memory can be dumped and analyzed. The phrase no disk does not prevent live memory forensics. Most VPNs operate on cloud or hosted infrastructure. This means: hypervisors can take snapshots of VM memory providers can log network metadata traffic"  
[X Link](https://x.com/cyber_razz/status/2020723024224219323)  2026-02-09T04:54Z 37.7K followers, 36.8K engagements


"@chidirolex Mark my words Im gonna qoute this someday"  
[X Link](https://x.com/cyber_razz/status/2020732682783608945)  2026-02-09T05:33Z 37.5K followers, [---] engagements


"Tears inna me eyes 😭"  
[X Link](https://x.com/cyber_razz/status/2020773082009637066)  2026-02-09T08:13Z 37.8K followers, [----] engagements


"Windscribe ended up mostly fine because the data on those seized servers wasnt actionable: the timestamps they kept had no source IPs destinations or traffic logs so retroactive correlation was technically possible but practically useless without perfect ISP and exit visibility. They took the hit reputationally owned the mistake and fixed the underlying issue by moving to diskless infrastructure. https://twitter.com/i/web/status/2020774050071486528 https://twitter.com/i/web/status/2020774050071486528"  
[X Link](https://x.com/cyber_razz/status/2020774050071486528)  2026-02-09T08:17Z 37.6K followers, [----] engagements


"Someone gift me"  
[X Link](https://x.com/cyber_razz/status/2020774425856258064)  2026-02-09T08:19Z 37.8K followers, [----] engagements


"@DigitalVagrant @PabloDeLaRed ❀thanks fam"  
[X Link](https://x.com/cyber_razz/status/2020779430235582651)  2026-02-09T08:38Z 37.5K followers, [---] engagements


"Every termux user used tool this then"  
[X Link](https://x.com/cyber_razz/status/2020801501581480359)  2026-02-09T10:06Z 38K followers, [----] engagements


"Not really. Cold boot mitigations only help against physical powered off attacks where RAM decay is the limiting factor. They do nothing against live memory dumps or hypervisor level snapshots where RAM is captured intact with keys sessions and buffers still valid. If the host or cloud provider controls the hypervisor the guest OS loses by default At best short lived keys and minimal in RAM state reduce impact but they dont prevent the actual extraction. https://twitter.com/i/web/status/2020809781494096233 https://twitter.com/i/web/status/2020809781494096233"  
[X Link](https://x.com/cyber_razz/status/2020809781494096233)  2026-02-09T10:39Z 37.7K followers, [----] engagements


"Google Chrome vs The Google App (most people think theyre the same) Google Chrome is a full web browser. Tabs. Bookmarks. Passwords. Extensions. Its where you actually browse the internet. The Google App is a search and assistant app that provides quick answers voice search a news feed and Google Lens. Unlike a full browser links open in a mini browser. Heres a simple way to remember the difference: Chrome is like driving your own car while the Google App is like ordering an Uber . Both apps get you online but one gives you full control while the other offers speed and convenience. Thats why"  
[X Link](https://x.com/cyber_razz/status/2020824609294033125)  2026-02-09T11:38Z 37.9K followers, [----] engagements


"Why does Chrome eat so much RAM Chrome doesnt consider RAM as something to save; instead it views it as something to use. Each tab operates independently in its own process along with extensions and a significant portion of the modern web. The rationale behind this is that if one tab crashes the rest of the tabs remain functional. This approach prioritizes security and stability which in turn allows for more memory usage. Chrome also maintains tabs in a warm state preloaded cached and ready for immediate use. Unused RAM is essentially wasted RAM. Furthermore modern websites have evolved"  
[X Link](https://x.com/cyber_razz/status/2020884970865131910)  2026-02-09T15:38Z 37.8K followers, 16.5K engagements


"A Linux administrator needs to search for the word error inside all .log files in the /var/log directory and its subdirectories. Which command BEST accomplishes this A. find /var/log -name "*.log" error B. grep -R "error" /var/log/*.log C. grep "error" /var/log D. cat /var/log/*.log search error https://twitter.com/i/web/status/2020938887150154207 https://twitter.com/i/web/status/2020938887150154207"  
[X Link](https://x.com/cyber_razz/status/2020938887150154207)  2026-02-09T19:12Z 38K followers, [----] engagements


"Even if you arent intending on becoming something as sophisticated as a network engineer Learn NETWORKING Just for the fun of it You wont ever regret that decision"  
[X Link](https://x.com/cyber_razz/status/2020974661828477215)  2026-02-09T21:34Z 37.7K followers, [----] engagements


"βœ…Correct Answer: B grep -R "error" /var/log/*.log Why its correct: grep searches text patterns. -R = recursive (includes subdirectories) "error" = search pattern /var/log/*.log = target log files This finds every occurrence of error across log files. Why the other options are wrong A. find /var/log -name "*.log" error find locates files it does not search file contents. C. grep "error" /var/log /var/log is a directory; grep needs files unless used recursively. D. cat /var/log/*.log search error search is not a valid Linux command. A Linux administrator needs to search for the word error"  
[X Link](https://x.com/cyber_razz/status/2021083254145642700)  2026-02-10T04:46Z 38K followers, [----] engagements


"When calculators were introduced people panicked. Teachers predicted that students would cease to think. Consequently schools banned calculators which I recall was a significant challenge for our school to adapt to even at the high school level. Real math was believed to be performed manually. So what really happened Calculators did not replace mathematicians. Instead they replaced individuals whose sole purpose was to perform arithmetic calculations. The skill evolved from calculation to thinking from execution to judgment. Fast forward to the era of artificial intelligence. Security"  
[X Link](https://x.com/cyber_razz/status/2021124432018759785)  2026-02-10T07:29Z 37.7K followers, [----] engagements


"Why cybersecurity"  
[X Link](https://x.com/cyber_razz/status/2021200639997640775)  2026-02-10T12:32Z 37.9K followers, [----] engagements


"Been a real one since birth"  
[X Link](https://x.com/cyber_razz/status/2021214163226255602)  2026-02-10T13:26Z 37.7K followers, [----] engagements


"Who saw the one about SSH a terminal"  
[X Link](https://x.com/cyber_razz/status/2021235443119890558)  2026-02-10T14:50Z 38K followers, [----] engagements


"@elormkdaniel πŸ˜”Make I paste aza"  
[X Link](https://x.com/cyber_razz/status/2021240618647711878)  2026-02-10T15:11Z 37.7K followers, [--] engagements


"Virtualization vs Containerization"  
[X Link](https://x.com/cyber_razz/status/2021241433294766559)  2026-02-10T15:14Z 37.8K followers, [----] engagements


"Skill up Every professional was once a total clueless beginner too"  
[X Link](https://x.com/cyber_razz/status/2021271817197875351)  2026-02-10T17:15Z 37.8K followers, [----] engagements


"El-perfecto"  
[X Link](https://x.com/cyber_razz/status/2021291845456695437)  2026-02-10T18:35Z 37.8K followers, [----] engagements


"Non-arguable fact: PYTHON SOLOS"  
[X Link](https://x.com/cyber_razz/status/2021295047090581638)  2026-02-10T18:47Z 37.8K followers, [----] engagements


"Its called a clipboard. And on iPhone its intentionally dumb. iOS maintains a single item at a time in the clipboard. Copying something new erases the previous item. Why Apple views the clipboard as sensitive memory not a convenience feature. Anything copied can include: Passwords OTPs Credit card numbers Private messages If iOS displayed a visible clipboard history any app could potentially access past copies. This poses a significant privacy risk. Therefore Apples trade-off is: Reduced convenience Enhanced privacy A smaller attack surface Android allows clipboard history but with increased"  
[X Link](https://x.com/cyber_razz/status/2021497636876927184)  2026-02-11T08:12Z 37.9K followers, [----] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@cyber_razz Avatar @cyber_razz Abdulkadir | Cybersecurity

Abdulkadir | Cybersecurity posts on X about linux, how to, ip, command the most. They currently have [------] followers and [---] posts still getting attention that total [-------] engagements in the last [--] hours.

Engagements: [-------] #

Engagements Line Chart

  • [--] Week [---------] +13%
  • [--] Month [----------] +432%
  • [--] Months [----------] +1,102%
  • [--] Year [----------] +2,093%

Mentions: [---] #

Mentions Line Chart

  • [--] Week [---] +125%
  • [--] Month [---] +187%
  • [--] Months [-----] +44%
  • [--] Year [-----] +394%

Followers: [------] #

Followers Line Chart

  • [--] Week [------] +5.80%
  • [--] Month [------] +23%
  • [--] Months [------] +195%
  • [--] Year [------] +609%

CreatorRank: [-------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands 4.26% social networks 2.43% finance 1.82% stocks 1.22% products 1.22% celebrities 0.91% countries 0.3%

Social topic influence linux #19, how to 3.65%, ip #1026, command #973, network #1810, if you 2.13%, ai 2.13%, level 1.82%, apt #372, what is #1901

Top accounts mentioned or mentioned by @grok @wyhycu @pawel_lasek @dangitman50 @timetherington @tj18011800 @elomena328 @iamibnsanusi10 @david_abasi @abaways @segoslavia @cyberrazz @aitrendzz @digitalvagrant @pablodelared @ark_aegis @cyberracheal @saintsai24 @likhontamim @dingbangfook

Top assets mentioned Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last [--] hours

"My networking gurus explain this meme please"
X Link 2026-01-26T10:00Z 38.1K followers, 2.2M engagements

"Linux or nothing"
X Link 2026-02-09T08:19Z 38.1K followers, 21.3K engagements

"Red team tools vs Blue team tools"
X Link 2026-02-09T11:51Z 38.1K followers, 38.3K engagements

"Peak intelligence right there"
X Link 2026-02-14T06:19Z 38.1K followers, [----] engagements

"Linux users be like"
X Link 2026-02-03T12:31Z 38.1K followers, 51.2K engagements

"I use arch btw"
X Link 2026-02-05T12:15Z 38.1K followers, [----] engagements

"Apple Pay vs Google pay"
X Link 2026-02-06T08:54Z 38.1K followers, 4.5M engagements

"DNS vs DHCP vs ARP vs HTTPS vs TLS vs ICMP vs NTP vs SNMP vs KERBEROS"
X Link 2026-02-07T19:01Z 38.1K followers, 69.5K engagements

"Apparently its all chromium"
X Link 2026-02-09T18:09Z 38.1K followers, 1.8M engagements

"But it works"
X Link 2026-02-09T21:38Z 38.1K followers, 866.3K engagements

"Which protocol is responsible for automatically assigning IP addresses to devices on a network A. DNS B. DHCP C. ARP D. ICMP"
X Link 2026-02-10T21:29Z 38.1K followers, 62.8K engagements

"Virtual machines cool tools + and medium account"
X Link 2026-02-11T00:22Z 38.1K followers, 20.7K engagements

"I updated Kali on a Tuesday. That was my first mistake. The notification had been sitting there for a week. [---] packages. Routine. Id done it a hundred times. Apt update apt upgrade walk away come back everything works. This time something went quiet. The terminal spat out the usual wall of text. Unpacking. Preparing. Setting up. Then a pause. Then a prompt Id never seen before. Something about a modified config file. I hit Enter without reading it. Default. Fine. Then the screen cleared. I typed ifconfig. Command not found. I typed systemctl start networking. Failed to connect to bus. I"
X Link 2026-02-11T22:08Z 38.1K followers, 14.1K engagements

"Chat.what device is this"
X Link 2026-02-12T08:11Z 38.1K followers, 30.1K engagements

"Spanning Tree Protocol (STP) is a Layer [--] network protocol used by Ethernet switches to prevent switching loops in networks with redundant links by dynamically identifying and blocking unnecessary paths. It works by electing a root bridge calculating the shortest path to that root from each switch and placing redundant ports into a blocking state while keeping them available as backups ensuring loop-free communication preventing broadcast storms and maintaining network stability if a link fails. https://twitter.com/i/web/status/2021920025574006854"
X Link 2026-02-12T12:11Z 38.1K followers, [----] engagements

"What kind of a Linux user are you"
X Link 2026-02-13T07:01Z 38.1K followers, 101.4K engagements

"I laughed at this"
X Link 2026-02-14T11:18Z 38.1K followers, 242.2K engagements

"@UIbyBiba πŸ˜” make I paste aza for flowers"
X Link 2026-02-14T15:20Z 38.1K followers, [--] engagements

"Interviewer: Your site loads in 3s on 5G but 30s on 4G. Same content. Why Me: Because bandwidth isnt the problem. Latency is. 5G has ultra-low latency while 4G doesnt Your page isnt one file. Its 100+ requests: DNS TCP TLS JS CSS APIs fonts images On 5G: takes milliseconds On 4G: every handshake hurts Now Add: packet loss retransmissions head-of-line blocking JS blocking render no code splitting no lazy loading no CDN edge caching 5G masks poor architecture while 4G exposes it starkly. The same content results in different network behaviors. Interviewer: Your website loads in [--] seconds on 5G."
X Link 2026-02-14T16:19Z 38.1K followers, [----] engagements

"Why do most hackers and unauthorized groups use Tor Its not because it makes them invisible. Instead it raises the cost of tracking them. Tor routes your traffic through multiple relays across different countries so the destination doesnt see your real IP address. This alone disrupts the easiest way for defenders to attribute your actions Now lets Consider a real life scenario: Imagine accessing a misconfigured API or admin panel from your home IP address. A single log entry later your ISP city and approximate location are known. Now theres a trail of evidence. Now do the same thing over Tor."
X Link 2026-01-27T08:18Z 38.1K followers, 448.3K engagements

"On his first day as the new IT security manager Dave was eager to implement his zero-trust protocol but his own trust in the company was shattered before his second cup of coffee when a cheerful email entitled "Your Bonus Details" popped up. Figuring it was a warm welcome from HR he clicked it unleashing a ransomware attack that promptly encrypted the entire server and displayed a message demanding a hefty sum in Bitcoin which was signed off with "Happy First Day Champ" from an anonymous hacker. As his new boss stared at the glowing screens Daves only course of action was to slowly push the"
X Link 2026-02-14T16:35Z 38.1K followers, [----] engagements

"NETWORKING KNOWLEDGE CHECKPOINT We have 220.50.35.0/25 ip address. In the company we have [--] FLOORS for each floor we will use a different subnet. What is the THIRD FLOORS NETWORK ADDRESS ) 220.50.35.8 b) 220.50.35.32 c) 220.50.35.0 d) 220.50.35.64 e) 220.50.35.128"
X Link 2025-01-22T09:40Z 38.1K followers, 158.3K engagements

"NETWORKING KNOWLEDGE CHECKPOINT A network administrator needs to create a subnet with [--] usable host IP addresses. Which of the following subnet masks would meet this requirement a) 255.255.255.192 b) 255.255.255.224 c) 255.255.255.240 d) 255.255.255.248"
X Link 2025-01-25T09:56Z 38.1K followers, 72K engagements

"NETWORKING KNOWLEDGE CHECKPOINT:"
X Link 2025-03-07T14:33Z 38.1K followers, 144.5K engagements

"Networking Physical Tools"
X Link 2025-08-31T18:26Z 38.1K followers, 29.2K engagements

"ROUTING VS SWITCHING"
X Link 2025-09-15T12:01Z 38.1K followers, 23K engagements

"TYPES OF IP ADDRESSES"
X Link 2025-09-18T19:06Z 38.1K followers, 37.1K engagements

"TOP [--] CYBERSECURITY TOOLS IN 2025"
X Link 2025-09-19T18:59Z 38.1K followers, 33.8K engagements

"6 TYPES OF API TESTING"
X Link 2025-09-23T14:34Z 38.1K followers, 46.7K engagements

"IP command sheet"
X Link 2025-10-04T16:10Z 38.1K followers, 43.2K engagements

"Useful Wireshark Filters"
X Link 2025-10-11T17:09Z 38.1K followers, 68.7K engagements

"Red Team tools"
X Link 2025-10-13T14:12Z 38.1K followers, 26.4K engagements

"Top [--] Platforms to Practice Ethical Hacking"
X Link 2025-11-11T17:46Z 38.1K followers, 35.1K engagements

"FAT32 vs NTFS"
X Link 2025-11-11T19:56Z 37.9K followers, 43.5K engagements

"How to view all hidden logs and file activities on your windows PC (Perfect to know if someone messed around without your permission )"
X Link 2026-01-19T18:07Z 37.8K followers, 67.1K engagements

"How to enter BIOS on your windows PC without pressing any key"
X Link 2026-01-25T08:10Z 36.4K followers, 74.1K engagements

"Cant argue with this representation"
X Link 2026-01-25T17:12Z 36.6K followers, 207.4K engagements

"Can someone explain why operating systems like Mac or Linux are rarely infected by ransomware attacks"
X Link 2026-01-27T14:53Z 37K followers, 389.2K engagements

"You wont see a more perfect illustration"
X Link 2026-01-27T16:58Z 36.3K followers, 91K engagements

"How I love Linux jokes"
X Link 2026-01-28T14:12Z 37.5K followers, 139.3K engagements

"12 pillars of Network security"
X Link 2026-01-29T09:24Z 37K followers, 15.2K engagements

"Linux distributions if they were students"
X Link 2026-01-29T11:36Z 36.8K followers, 52.3K engagements

"And then your Linux machine breaks"
X Link 2026-01-29T14:49Z 36.9K followers, 65.1K engagements

"Chown vs chmod I think this illustration does justice wbu"
X Link 2026-01-29T14:50Z 36.9K followers, [----] engagements

"Ill stick to Kali tbh"
X Link 2026-01-30T10:10Z 36.7K followers, [----] engagements

"How DNS works"
X Link 2026-01-30T10:15Z 37.1K followers, [----] engagements

"IPv4 vs IPv6"
X Link 2026-01-30T12:26Z 37.8K followers, 20.9K engagements

"Do you know hackers dont need to stay logged in to keep control of a Linux server Once they leave behind access keys they can come back anytime silently"
X Link 2026-01-30T13:46Z 37.6K followers, 86.7K engagements

"More jobs to cybersecurity professionals"
X Link 2026-01-30T14:33Z 37.5K followers, [----] engagements

"Learn Linux first"
X Link 2026-01-30T14:57Z 37.5K followers, 20.8K engagements

"Types of Malwares"
X Link 2026-01-30T18:52Z 37.5K followers, [----] engagements

"A Linux administrator wants to schedule a script to run every day at 2:00 AM. Which tool should be used A. at B. cron C. systemctl D. nohup"
X Link 2026-01-30T18:57Z 36.8K followers, 55.4K engagements

"Legendary command Its been rumored to this day that no one knows what this command does Especially if you add sudo before running it"
X Link 2026-01-30T20:19Z 36.2K followers, 11.5K engagements

"That device on his back isnt a weapon; its electronic security gear. The antennas are used for RF control essentially managing wireless signals around high-risk events. The primary reasons for its use are: - Blocking phone calls mobile data Wi-Fi and Bluetooth. - Preventing remote-triggered threats. - Stopping unauthorized recordings or live streams. - Limiting coordination between hostile actors. Each antenna targets a different frequency band providing wider coverage. Youll typically see this device at: - VIP movements. - Political or religious gatherings. - High-security public events."
X Link 2026-01-31T06:37Z 37.1K followers, 23.2K engagements

"Types of Networks"
X Link 2026-01-31T08:22Z 37.5K followers, [----] engagements

"Hmmmm.I see"
X Link 2026-01-31T09:16Z 36.7K followers, 45.9K engagements

"The Pros = Cons"
X Link 2026-01-31T10:38Z 38.1K followers, 49.5K engagements

"Wait a minute"
X Link 2026-01-31T12:56Z 37.5K followers, 21.3K engagements

"Internet explorer isnt that bad anymore Right Guess the imposter 😭 https://t.co/eblkLfQLZq Guess the imposter 😭 https://t.co/eblkLfQLZq"
X Link 2026-01-31T12:59Z 37.5K followers, [----] engagements

"I wonder what cat9 Ethernet cables would look like"
X Link 2026-01-31T13:19Z 36.7K followers, [----] engagements

"A static IP address is one that doesnt change. Once its given to a device it stays the same every time the device connects to the network unless someone changes it themselves. So to put it simply: Static IP = a fixed permanent address Dynamic IP = a temporary address that can change Why we use static IPs: Hosting servers or websites Remote access (SSH VPN CCTV home labs) Network devices like printers routers firewalls Basically anything that needs to be consistently reachable The downside: *It costs more (from ISPs) *Its a bit easier to target if its exposed to the internet *It needs manual"
X Link 2026-01-31T13:26Z 37.5K followers, [----] engagements

"Who here wants to learn how to install a fully functional Linux machine(any distro) on their iPad or iPhones"
X Link 2026-01-31T14:15Z 37.8K followers, 253.2K engagements

"Good old days I see this now and wonder how much vulnerable was Facebook in its early post-production days"
X Link 2026-01-31T16:27Z 36.7K followers, [----] engagements

"Privilege escalation using Linux capabilities"
X Link 2026-01-31T18:00Z 37.7K followers, 26.4K engagements

"A network administrator needs to allow private IP addresses inside a network to access the internet using a single public IP address. Which technology BEST accomplishes this A. Static routing B. NAT C. VLAN D. ARP"
X Link 2026-01-31T19:34Z 37.5K followers, 20.1K engagements

"Its a new month already 1/12 Hope yall are working on crushing those goals you set out to achieve"
X Link 2026-02-01T05:10Z 37.4K followers, [----] engagements

"Were the Epstein files finally released"
X Link 2026-02-01T06:05Z 37.4K followers, [----] engagements

"Time to make the change πŸ™‚"
X Link 2026-02-01T09:57Z 37.5K followers, [----] engagements

".@Ubuntu is this true"
X Link 2026-02-01T11:20Z 37.8K followers, 112.8K engagements

"IPv4 Classes & Subnet Mask"
X Link 2026-02-01T11:22Z 37.6K followers, [----] engagements

"Windows has a memory and it never forgets. Every USB device youve ever plugged into a Windows PC gets logged including flash drives phones keyboards and even after you remove them. Unplugging doesnt erase the data; Windows keeps a record of drivers stability and forensics. Your system remembers the device type vendor serial number and the first and last time it was connected. So if you think youve removed a device Windows still has the receipts. Windows keeps a permanent record of every USB device youve ever plugged in even after its removed. Windows keeps a permanent record of every USB"
X Link 2026-02-01T11:26Z 37.5K followers, [----] engagements

"Me putting up signs as the new network engineer"
X Link 2026-02-01T11:31Z 37.9K followers, 110.3K engagements

"What is Kali Linux to you"
X Link 2026-02-01T13:57Z 37.5K followers, 12K engagements

"What did you achieve in January"
X Link 2026-02-01T15:28Z 37.5K followers, [----] engagements

"Tbh just felt like making this"
X Link 2026-02-01T17:26Z 37.5K followers, [----] engagements

"Linux will prolly run on the static electricity from socks"
X Link 2026-02-01T19:10Z 37.5K followers, 25.5K engagements

"The best of tools are open source"
X Link 2026-02-02T07:32Z 37.8K followers, 13.7K engagements

"Ever wondered why iPhone screenshots never reveal your password πŸ‘€ Apple doesnt simply blur it after the fact. Its a much more sophisticated approach. When you type a password on iOS its entered into a secure text field. The actual characters are never displayed on the screen. Only dots () are visually present. Therefore when you take a screenshot: iOS can only capture whats rendered And the password is not present to be captured Additionally iOS designates sensitive UI elements (passwords OTPs Apple Pay Face ID) as non-capturable. Even screen recordings and screen sharing cannot detect them."
X Link 2026-02-02T07:53Z 37.7K followers, 461.7K engagements

"Who can tell me what this is"
X Link 2026-02-02T09:19Z 37.4K followers, 27.2K engagements

"Lisanil-gaib"
X Link 2026-02-02T09:30Z 37.4K followers, [----] engagements

"It really be like this"
X Link 2026-02-02T11:15Z 37.5K followers, [----] engagements

"Realest meme youd see today"
X Link 2026-02-02T11:15Z 37.5K followers, 20.2K engagements

"@segoslavia 😭I did without a sandbox Seems safe shaa Scanned it later and didnt download a thing from there"
X Link 2026-02-02T12:36Z 37.7K followers, [---] engagements

"A PC that was advertised with 32GB RAM arrived with 48GB and everyone immediately assumed it was a mistake. However theres a possibility that this isnt the case. Many prebuilt systems are marketed with a base configuration of 32GB RAM but sellers often add extra RAM discreetly for various reasons: - Leftover stock - Small performance upgrades - Mixed DIMMs (216 + [--] = 48GB) - Bundles that arent reflected in the listing Its important to note that marketing pages often lag behind actual builds. As long as the system boots properly runs smoothly and the RAM is compatible in terms of speed and"
X Link 2026-02-03T05:02Z 37.5K followers, 370.4K engagements

"Ive answered this before but it wouldnt hurt to go again So why do most hackers and unauthorized groups use Tor Its not because it makes them invisible. Instead it raises the cost of tracking them. Tor routes your traffic through multiple relays across different countries so the destination doesnt see your real IP address. This alone disrupts the easiest way for defenders to attribute your actions: quick attribution. Consider a real-life scenario: Imagine accessing a misconfigured API or admin panel from your home IP address. A single log entry later your ISP city and approximate location are"
X Link 2026-02-03T06:01Z 37.5K followers, 15.8K engagements

"I hate both types"
X Link 2026-02-03T08:20Z 37.5K followers, [----] engagements

"Hackers can run programs on Windows without creating a visible process"
X Link 2026-02-03T08:34Z 37.8K followers, [----] engagements

"Money can't buy you time but it can buy you an SSD. And that's basically the same thing right"
X Link 2026-02-03T11:44Z 37.7K followers, [----] engagements

"Do you get it"
X Link 2026-02-03T12:31Z 37.5K followers, 70.8K engagements

"Someone built a website to avoid black people 😭😭😭 http://peaceandquiet.io http://peaceandquiet.io"
X Link 2026-02-03T14:28Z 37.5K followers, [----] engagements

"Is it even possible Short answer: No. Long answer (simple physics πŸ‘‡): Wi-Fi operates on radio waves (2.4GHz or 5GHz). The human body is primarily composed of water which can absorb some of this radio energy. Therefore yes a person can slightly weaken a Wi-Fi signal if they are: - Positioned directly next to the router - Standing between the router and their device - The signal is already weak However heres the crucial point people often overlook: Wi-Fi doesnt travel in a straight line. It spreads bounces reflects and reaches your device from multiple paths. Therefore one person cannot block"
X Link 2026-02-03T16:56Z 37.7K followers, [----] engagements

"Annoying everytime 😭"
X Link 2026-02-03T18:02Z 37.5K followers, [----] engagements

"A Linux administrator needs to find which process is listening on TCP port [---] on a server. Which command BEST accomplishes this A. ps aux grep [---] B. ss -tulnp C. top D. df -h"
X Link 2026-02-03T19:02Z 37.9K followers, 53.8K engagements

"TeamViewer got me hacked ❌ Heres what actually happened: - I installed TeamViewer. - I reused the same old password. - That password had leaked from another website. - The attacker tried it on TeamViewer. - The login worked. Thats not hacking to be precise. Thats credential stuffing. There was no exploit. There was no breach. It was just logging in with a stolen key. Remote access tools are often blamed because when theyre abused its noticeable cursor movement files disappearing and panic everywhere. But its like this: Leaving your house key under the mat. A robber uses it. Then you say the"
X Link 2026-02-03T20:10Z 37.5K followers, [----] engagements

"Rouge DHCP SERVER ATTACK FOR DUMMIES"
X Link 2026-02-03T21:01Z 38K followers, 56.5K engagements

"You know what I respect this"
X Link 2026-02-03T22:11Z 37.5K followers, [----] engagements

"Linux says Disk Space Low but the math aint mathing. You check: df -h 100% full du -sh / 20GB used on a 100GB disk So where did the other 80GB go πŸ‘€ Deleted files Nope. Hidden mounts Nada. Then you run: df -i 100% And violla there it is You ran out of inodes. So what actually happened To understand the root cause lets delve into the mechanics of inodes. Each file regardless of its size requires an inode to be stored on the disk. When the inode table reaches its capacity the filesystem becomes unable to allocate new files even if there are ample free disk blocks available. Common applications"
X Link 2026-02-04T08:13Z 36.7K followers, 19K engagements

"Is learning a programming language necessary for someone trying to break into cybersecurity"
X Link 2026-02-04T08:27Z 37.5K followers, [----] engagements

"How Botnet works for Dummies"
X Link 2026-02-04T09:52Z 37.5K followers, 19.3K engagements

"There are levels to this sh*t"
X Link 2026-02-04T11:55Z 37.6K followers, 30.5K engagements

"And using password managers creates a single point of failure/ attack So what should be done SAFE PASSWORDS ARE DIFFICULT TO REMEMBER EVEN BY THE CREATOR OF IT SAFE PASSWORDS ARE DIFFICULT TO REMEMBER EVEN BY THE CREATOR OF IT"
X Link 2026-02-04T13:24Z 37.8K followers, [----] engagements

"If I had a dollar for everytime I was asked to hacked an Instagram or Facebook account"
X Link 2026-02-04T13:26Z 37.8K followers, [----] engagements

"A network administrator wants to reduce broadcast traffic and improve performance within a large Layer [--] network. Which solution BEST accomplishes this A. Implement VLANs B. Increase link bandwidth C. Enable port mirroring D. Use static IP addressing"
X Link 2026-02-04T20:12Z 37.5K followers, [----] engagements

"Runs on anything"
X Link 2026-02-04T20:15Z 37.8K followers, 31.7K engagements

":wq 😭 Every Vim user has this character arc. https://t.co/iaF2uzNjfm Every Vim user has this character arc. https://t.co/iaF2uzNjfm"
X Link 2026-02-04T20:16Z 37.4K followers, [----] engagements

"My DMs are flooded with messages like I want to start my cybersecurity journey. How can I begin Answer: Start from my pinned tweet on my profile. Good luck ❀"
X Link 2026-02-04T22:02Z 37.5K followers, [----] engagements

"Tell me What are you learning today"
X Link 2026-02-05T09:12Z 37.5K followers, [----] engagements

"Someone launched an AI website that lets you rent actual Human beings😭 If your AI agent wants to hire someone to perform an in-person task for them its as simple as making one MCP call. πŸ‘‰ http://rentahuman.ai http://rentahuman.ai"
X Link 2026-02-05T09:24Z 37.8K followers, [----] engagements

"😭witnessed this on my TL"
X Link 2026-02-05T09:35Z 37.5K followers, [----] engagements

"Types of Servers"
X Link 2026-02-05T10:12Z 37.7K followers, 10.1K engagements

"Learnt the basics Worked on labs Documented some Then start applying pookie πŸ˜—"
X Link 2026-02-05T11:25Z 37.5K followers, [----] engagements

"Just [---] years left"
X Link 2026-02-05T12:12Z 37.5K followers, [----] engagements

"The 3-2-1 Rule Effective against ransomware attacks"
X Link 2026-02-05T12:16Z 37.6K followers, [----] engagements

"@sebp888 @TutaPrivacy Can they"
X Link 2026-02-05T15:14Z 36.4K followers, [----] engagements

"I know someone that is surviving off energy drinks"
X Link 2026-02-05T15:33Z 37.5K followers, 37.1K engagements

"@helayxv Lmao you speak and type in English Is that the language of your ancestors"
X Link 2026-02-06T06:35Z 36.8K followers, [----] engagements

"Wanna see which of your LinkedIn connections appear in the Epstein files πŸ‘‰ http://github.com/cfinke/EpsteIn http://github.com/cfinke/EpsteIn"
X Link 2026-02-06T06:37Z 36.7K followers, [----] engagements

"Fun fact: The interview is tougher than the actual job"
X Link 2026-02-06T08:45Z 36.6K followers, [----] engagements

"You might be wondering how Ans: tailor different resumes to your different skills"
X Link 2026-02-06T08:56Z 37.1K followers, [----] engagements

"Dont lie will you install"
X Link 2026-02-06T09:28Z 37.5K followers, [----] engagements

"Can someone explain how this is possible"
X Link 2026-02-06T13:09Z 37.6K followers, 23.8K engagements

"Just give me the flipper zero"
X Link 2026-02-06T14:50Z 37.7K followers, 30.1K engagements

"Lets not forget the OG notepad VS code is still the best. https://t.co/e1wjDZNIHf VS code is still the best. https://t.co/e1wjDZNIHf"
X Link 2026-02-06T15:40Z 37.4K followers, [----] engagements

"Thats all it is to that"
X Link 2026-02-06T18:44Z 37.5K followers, [----] engagements

"A Linux administrator wants to change the ownership of a file named report.txt to user alice and group finance. Which command BEST accomplishes this A. chmod alice:finance report.txt B. chown alice:finance report.txt C. usermod alice finance report.txt D. groupadd finance report.txt"
X Link 2026-02-06T19:54Z 37.6K followers, 12.3K engagements

"Its kind of stupid to do tbh If you know anything about university portals then youd know of the constant verification that are been carried out From the actual paper to the lecturers dashboard to the senate before it finally gets uploaded to the portal Once they are any disparates found it is 100% investigated. with this information any smart person knows that its always a matter of time before your friends gets caught and guess what Both of you will do JAIL Theyll term it defrauding the state or something similarly big in court lmao 😭. Itll only work if you hack both the lecturers"
X Link 2026-02-06T23:16Z 37.8K followers, 10.8K engagements

"You cant install Netflix on a 90s TV but you can still watch Netflix on it. Heres how: A typical 90s TV lacks an operating system internet access and only has antenna or RCA (red white yellow) inputs. Netflix on the other hand requires an operating system internet access and an app runtime. So the TV itself is essentially a dumb display. The workaround is to let another device handle the smart work. Heres how: - Use a modern device like a Chromecast Fire Stick Roku laptop or PlayStation. - Connect the device to the 90s TV using an HDMI cable. - Use an HDMI-to-RCA converter to connect the HDMI"
X Link 2026-02-07T07:02Z 37.8K followers, [----] engagements

"In master ugwes voice it is time"
X Link 2026-02-07T12:17Z 37.7K followers, 26.6K engagements

"Humans will forever be the weakest and easiest link"
X Link 2026-02-07T12:19Z 37.7K followers, [----] engagements

"Linux hate will not be tolerated 😑 https://t.co/pVxiY7IfNi https://t.co/pVxiY7IfNi"
X Link 2026-02-07T19:02Z 37.8K followers, [----] engagements

"Im about to make all my followers happy again Brb"
X Link 2026-02-07T19:17Z 37.9K followers, 11.8K engagements

"Has anyone here experienced visiting a data center That place was the most beautiful place in existence (atleast to me) we sadly werent allowed to record anything due to security reasons though. One of my many dreams is to work in one. https://t.co/3wpl6emgvb https://t.co/3wpl6emgvb"
X Link 2026-02-07T19:35Z 37K followers, [----] engagements

"So why does the Wi-Fi option on your Windows keep disappearing Heres the reason why: Its usually not your internet connection. Its Windows temporarily forgetting that your Wi-Fi card exists. Wi-Fi driver crash or failure: Windows communicates with your Wi-Fi hardware through drivers. If the driver malfunctions (sleeps hibernates or behaves unpredictably) Windows behaves as if theres no adapter at all. Windows Update fix: An update can replace a working driver with a broken or generic one. Although the hardware is present Windows cant communicate with it causing Wi-Fi to disappear."
X Link 2026-02-07T20:40Z 37.8K followers, [----] engagements

"ifconfig* for Linux"
X Link 2026-02-07T22:06Z 37.9K followers, 17.2K engagements

"How to find subdomains to expand attack surfaces on web applications"
X Link 2026-02-08T06:47Z 37.9K followers, 12.6K engagements

"Running cipher /w on an SSD is essentially self-sabotage. Heres why: cipher /w was designed for older hard disk drives (HDDs). Its purpose is to overwrite free space multiple times rendering deleted files unrecoverable. However this logic doesnt apply to SSDs. SSDs have several limitations: - Limited write cycles - Wear leveling (they strategically rearrange writes) - Hidden flash blocks that are inaccessible directly When you execute cipher /w on an SSD youre not actually cleaning anything. Instead youre forcing the SSD to perform unnecessary and excessive writes. The consequences of this"
X Link 2026-02-08T09:03Z 37.5K followers, [----] engagements

"Why cant data centers just use dirty water Why does it have to be clean drinking water Short answer: Servers arent rice so they dont need water. Long answer: Most data centers dont dump water onto servers. Instead they use it for cooling systems like chillers cooling towers and heat exchangers. However those systems hate dirty water. Dirty or untreated water contains: - Minerals that cause scale buildup - Dirt and sand that clog pipes - Microbes that lead to corrosion and biofouling These issues reduce heat transfer damage equipment and cause downtime which is the worst thing that can happen"
X Link 2026-02-08T09:16Z 38K followers, 28.5K engagements

"The algorithm really said for you today lol Lets get into it What if the load balancer itself goes down Thats the first thing architects worry about. Because yes a single load balancer can be a single point of failure. So in real systems its almost never just one. Heres how this is handled πŸ‘‡ Redundancy Load balancers come in pairs (or more). Active/active or active/passive. If one dies traffic shifts instantly. Health checks If a load balancer stops responding its removed automatically. No humans. No panic. Just failover. DNS failover If an entire load balancer layer goes down DNS can"
X Link 2026-02-08T09:21Z 37.8K followers, [----] engagements

"There was a time when everything functioned flawlessly on localhost. However production laughed and ignited a firestorm. The same code the same logic yet the outcome was drastically different. Why Because localhost is a deceptive illusion. On your machine you have the right operating system the correct library versions the appropriate ports and the ideal environment variables. You have the energy to believe that your code works perfectly. But production is a different beast altogether. It operates on a different operating system relies on different dependencies has different configurations"
X Link 2026-02-08T09:58Z 37.7K followers, 50.8K engagements

"@paul_nets Ding ding ding πŸ›Ž"
X Link 2026-02-08T10:12Z 37.2K followers, [---] engagements

"Were you this old"
X Link 2026-02-08T10:56Z 37.6K followers, [----] engagements

"The 2g days"
X Link 2026-02-08T12:06Z 37.4K followers, [----] engagements

"Is there an option to permanently turn this sh*t off You can be using your phone normally and mistakenly accept this thing"
X Link 2026-02-08T12:12Z 37.7K followers, [----] engagements

"In recent news πŸ˜‚"
X Link 2026-02-08T12:31Z 37.7K followers, 19.5K engagements

"Facts no cap"
X Link 2026-02-08T13:14Z 37.5K followers, [----] engagements

"@z_alijonov iPhone X (10)"
X Link 2026-02-08T14:05Z 37.2K followers, [--] engagements

"Why does this happen"
X Link 2026-02-08T16:48Z 37.8K followers, 36.5K engagements

"Wydm Linux is boring"
X Link 2026-02-08T17:09Z 37.8K followers, 61.8K engagements

"An organization wants to ensure that security incidents are detected as quickly as possible after they occur. Which metric BEST measures this capability A. MTTR B. RTO C. MTTD D. RPO"
X Link 2026-02-08T20:05Z 37.9K followers, [----] engagements

"Hit me with the harshest tech fact"
X Link 2026-02-08T20:41Z 37.8K followers, [----] engagements

"RAM-only VPN servers mean no logs right Well Not exactly. RAM-only (diskless) servers reduce whats stored long-term but theyre not forensics-proof. Heres why: RAM is not invisible; its volatile. Even while the server is running it retains: active VPN sessions temporary encryption keys connection states network buffers If access occurs before a reboot memory can be dumped and analyzed. The phrase no disk does not prevent live memory forensics. Most VPNs operate on cloud or hosted infrastructure. This means: hypervisors can take snapshots of VM memory providers can log network metadata traffic"
X Link 2026-02-09T04:54Z 37.7K followers, 36.8K engagements

"@chidirolex Mark my words Im gonna qoute this someday"
X Link 2026-02-09T05:33Z 37.5K followers, [---] engagements

"Tears inna me eyes 😭"
X Link 2026-02-09T08:13Z 37.8K followers, [----] engagements

"Windscribe ended up mostly fine because the data on those seized servers wasnt actionable: the timestamps they kept had no source IPs destinations or traffic logs so retroactive correlation was technically possible but practically useless without perfect ISP and exit visibility. They took the hit reputationally owned the mistake and fixed the underlying issue by moving to diskless infrastructure. https://twitter.com/i/web/status/2020774050071486528 https://twitter.com/i/web/status/2020774050071486528"
X Link 2026-02-09T08:17Z 37.6K followers, [----] engagements

"Someone gift me"
X Link 2026-02-09T08:19Z 37.8K followers, [----] engagements

"@DigitalVagrant @PabloDeLaRed ❀thanks fam"
X Link 2026-02-09T08:38Z 37.5K followers, [---] engagements

"Every termux user used tool this then"
X Link 2026-02-09T10:06Z 38K followers, [----] engagements

"Not really. Cold boot mitigations only help against physical powered off attacks where RAM decay is the limiting factor. They do nothing against live memory dumps or hypervisor level snapshots where RAM is captured intact with keys sessions and buffers still valid. If the host or cloud provider controls the hypervisor the guest OS loses by default At best short lived keys and minimal in RAM state reduce impact but they dont prevent the actual extraction. https://twitter.com/i/web/status/2020809781494096233 https://twitter.com/i/web/status/2020809781494096233"
X Link 2026-02-09T10:39Z 37.7K followers, [----] engagements

"Google Chrome vs The Google App (most people think theyre the same) Google Chrome is a full web browser. Tabs. Bookmarks. Passwords. Extensions. Its where you actually browse the internet. The Google App is a search and assistant app that provides quick answers voice search a news feed and Google Lens. Unlike a full browser links open in a mini browser. Heres a simple way to remember the difference: Chrome is like driving your own car while the Google App is like ordering an Uber . Both apps get you online but one gives you full control while the other offers speed and convenience. Thats why"
X Link 2026-02-09T11:38Z 37.9K followers, [----] engagements

"Why does Chrome eat so much RAM Chrome doesnt consider RAM as something to save; instead it views it as something to use. Each tab operates independently in its own process along with extensions and a significant portion of the modern web. The rationale behind this is that if one tab crashes the rest of the tabs remain functional. This approach prioritizes security and stability which in turn allows for more memory usage. Chrome also maintains tabs in a warm state preloaded cached and ready for immediate use. Unused RAM is essentially wasted RAM. Furthermore modern websites have evolved"
X Link 2026-02-09T15:38Z 37.8K followers, 16.5K engagements

"A Linux administrator needs to search for the word error inside all .log files in the /var/log directory and its subdirectories. Which command BEST accomplishes this A. find /var/log -name ".log" error B. grep -R "error" /var/log/.log C. grep "error" /var/log D. cat /var/log/*.log search error https://twitter.com/i/web/status/2020938887150154207 https://twitter.com/i/web/status/2020938887150154207"
X Link 2026-02-09T19:12Z 38K followers, [----] engagements

"Even if you arent intending on becoming something as sophisticated as a network engineer Learn NETWORKING Just for the fun of it You wont ever regret that decision"
X Link 2026-02-09T21:34Z 37.7K followers, [----] engagements

"βœ…Correct Answer: B grep -R "error" /var/log/.log Why its correct: grep searches text patterns. -R = recursive (includes subdirectories) "error" = search pattern /var/log/.log = target log files This finds every occurrence of error across log files. Why the other options are wrong A. find /var/log -name ".log" error find locates files it does not search file contents. C. grep "error" /var/log /var/log is a directory; grep needs files unless used recursively. D. cat /var/log/.log search error search is not a valid Linux command. A Linux administrator needs to search for the word error"
X Link 2026-02-10T04:46Z 38K followers, [----] engagements

"When calculators were introduced people panicked. Teachers predicted that students would cease to think. Consequently schools banned calculators which I recall was a significant challenge for our school to adapt to even at the high school level. Real math was believed to be performed manually. So what really happened Calculators did not replace mathematicians. Instead they replaced individuals whose sole purpose was to perform arithmetic calculations. The skill evolved from calculation to thinking from execution to judgment. Fast forward to the era of artificial intelligence. Security"
X Link 2026-02-10T07:29Z 37.7K followers, [----] engagements

"Why cybersecurity"
X Link 2026-02-10T12:32Z 37.9K followers, [----] engagements

"Been a real one since birth"
X Link 2026-02-10T13:26Z 37.7K followers, [----] engagements

"Who saw the one about SSH a terminal"
X Link 2026-02-10T14:50Z 38K followers, [----] engagements

"@elormkdaniel πŸ˜”Make I paste aza"
X Link 2026-02-10T15:11Z 37.7K followers, [--] engagements

"Virtualization vs Containerization"
X Link 2026-02-10T15:14Z 37.8K followers, [----] engagements

"Skill up Every professional was once a total clueless beginner too"
X Link 2026-02-10T17:15Z 37.8K followers, [----] engagements

"El-perfecto"
X Link 2026-02-10T18:35Z 37.8K followers, [----] engagements

"Non-arguable fact: PYTHON SOLOS"
X Link 2026-02-10T18:47Z 37.8K followers, [----] engagements

"Its called a clipboard. And on iPhone its intentionally dumb. iOS maintains a single item at a time in the clipboard. Copying something new erases the previous item. Why Apple views the clipboard as sensitive memory not a convenience feature. Anything copied can include: Passwords OTPs Credit card numbers Private messages If iOS displayed a visible clipboard history any app could potentially access past copies. This poses a significant privacy risk. Therefore Apples trade-off is: Reduced convenience Enhanced privacy A smaller attack surface Android allows clipboard history but with increased"
X Link 2026-02-11T08:12Z 37.9K followers, [----] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

creator/x::cyber_razz
/creator/x::cyber_razz