Advertisement Β· 728 Γ— 90

Posts by Dan Nanni

Post image

Markdown editors are simple text tools that let you format content fast using plain syntax, widely used as a de facto language in #AI workflows for structuring prompts, docs, and outputs πŸ˜ŽπŸ‘‡

Find pdf books with all my #DevOps infographics at study-notes.org/devops-ebook...

#softwaredeveloper

3 hours ago 1 0 0 0
Post image

The AI/ML software stack is basically a layered toolkit that covers the full AI/ML workflow πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #technology related infographics at study-notes.org/technology-i...

#machinelearning #machinelearningtools #ai #deeplearning #softwarestack

1 day ago 0 0 0 0
Post image

Power plugs aren’t universalβ€”each region uses its own shape, size, and grounding standard to match its electrical system πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #technology related infographics from study-notes.org/technology-i...

#hardware #tech #engineering #electronics #gadgets

2 days ago 4 1 1 1
Post image

Managed switches give you full controlβ€”monitor traffic, optimize performance, and enforce security πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #networking related infographics at study-notes.org/networking-e...

#datacenter #cloudengineer #networkequipment #technology #networkengineer

3 days ago 2 0 0 0
Post image

nmcli is a CLI tool that lets you create and manage connections, check status, and run basic network diagnostics right from the terminal. Here are useful nmcli command examples πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #Linux related infographics at study-notes.org/linux-ebook....

#sysadmin #opensource

4 days ago 2 0 0 0
Post image

Big-O shows how an #algorithm scales as input grows β€” not exact time, but how fast things get expensive. Here are examples across common complexity levels πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #technology related infographics from study-notes.org/technology-e...

#computerscience #programming #coding

5 days ago 2 0 0 0
Post image

Layered security architecture is about not relying on a single defense. It stacks protection across your network, endpoints, apps, and users πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #cybersecurity related infographics at study-notes.org/cybersecurit...

#infosec#informationsecurity #cybersecuritytraining

6 days ago 0 0 0 0
Post image

Sysdig is one of those hidden gem tools that shows exactly what your #Linux system is doing in real time β€” system calls, containers, network traffic, file access πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #cybersecurity related infographics at study-notes.org/cybersecurit...

#infosec

1 week ago 2 0 0 0
Post image

In this update in my DevOps infographics, I added four new topics.

If you already bought my DevOps infographic pack or #ebook, use the same download link to access the latest additions like these 😎

Find hpdf ebooks with all my #DevOps related infographics at study-notes.org/devops-ebook...

1 week ago 0 0 0 0
Post image

On Linux, cgroups control and isolate CPU, memory, and I/O per process or containerβ€”this is what makes predictable container performance possible πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my Linux and DevOps related infographics from study-notes.org

#linux #docker #kubernetes #devops #k8s

1 week ago 2 1 0 0
Advertisement
Post image

Here are some portable devices commonly used in penetration testingπŸ˜ŽπŸ‘‡

Find a high-res pdf ebook with all my cybersecurity related infographics from study-notes.org/cybersecurit...

#cybersecurity #hacking #infosec #ethicalhacker #pentesting

1 week ago 5 0 0 0
Post image

A #malware sandbox is an isolated environment used to safely run and observe suspicious files. Here are available malware analysis sandbox tools and services πŸ˜ŽπŸ‘‡

Find a pdf ebook with all my #cybersecurity infographics from study-notes.org

#infosec #ethicalhacker

1 week ago 0 0 0 0
Post image

Here are widely used network automation tools πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my networking related infographics at study-notes.org/networking-e...

#networkadmin #networkengineer #ethernet #datacenter #technology

1 week ago 0 0 0 0
Post image

DNS issues usually come down to a few things: broken connectivity, bad configs, or flaky #DNS servers.

Here are useful commands for diagnosing DNS issues on Linux πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #Linux infographics at study-notes.org/linux-ebook....

#devops #network #techtips #networkengineer

1 week ago 0 0 0 0

Thanks, that’s a good one πŸ‘

1 week ago 1 0 0 0

You are right! That example is not HTTP spec-compliant πŸ‘

1 week ago 0 0 0 0
Post image

Locking down a #Linux system comes down to shrinking the attack surface, tightening access, and cutting off anything unnecessaryβ€”here are the commands that help you do it πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #cybersecurity related infographics at study-notes.org/cybersecurit...

#infosec

1 week ago 1 0 1 1
Post image

A new update on my Linux infographics is out!

If you already bought my Linux infographic pack or ebook, these are exclusively available to you for free. Use the same download link 😎

Find high-res pdf ebooks with all my #Linux related infographics at study-notes.org/linux-ebook....

2 weeks ago 0 0 0 0
Post image

In Linux, file types tell the kernel how to treat a file β€” read it, write to it, or execute it. Here are available file types on Linux πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my Linux related infographics at study-notes.org/linux-ebook....

#linux #kalilinux #devops #software #techtips

2 weeks ago 4 0 0 0
Post image

Netcat is the Swiss army knife of #networking. It lets you read and write data over TCP/UDP, and #infosec folks use it for quick port scans, grabbing service banners, or reverse shells πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #Linux related infographics at study-notes.org/linux-ebook....

2 weeks ago 45 7 2 0
Advertisement
Post image

#Cybersecurity moves fast. If you want to keep up with new threats and real-world defense tactics, top security podcasts are one of the easiest ways to stay in the loop πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #infosec related infographics at study-notes.org/cybersecurit...

#informationsecurity

2 weeks ago 2 0 0 0
Post image

The init system is what boots your Linux system, starts services, and keeps processes in check. Here are init systems and which distros use them by default πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #Linux related infographics from study-notes.org/linux-ebook....

#software #operatingsystem #devops #sysadmin

2 weeks ago 2 0 0 0
Post image

Programming languages and their creators by age πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my DevOps related infographics at study-notes.org

#dev #programming #technology #coding #programmer

2 weeks ago 3 0 0 0
Post image

New updates on my #networking infographics πŸ˜ŽπŸ‘‡

If you already purchased my networking infographic package or #ebook, you are covered. You can always use the same download link to access the latest version, exclusively available to you:

study-notes.org

#networkengineer #technology

2 weeks ago 1 0 0 0
Post image

Ethernet cables come in CAT categories, each one defines bandwidth, speed, and how far you can push data before signal quality drops πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my networking related infographics at study-notes.org

#ethernet #homelab #networkengineer #networkcable #technology

3 weeks ago 1 0 0 0
Post image

A MAC address is a 48-bit ID tied to your #network interface that lets switches deliver frames to the right device within a local #Ethernet network πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #networking related infographics at study-notes.org

#computernetworking #networkengineer #datacenter

3 weeks ago 1 0 0 0
Post image

Endianness describes how a system orders bytes in memory, and it is a core concept in #computerscience that affects data encoding, processor design, and cross-platform compatibility πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #technology related infographics at study-notes.org

#operatingsystem

3 weeks ago 1 0 0 0
Advertisement
Post image

If you are interested in #hacking, privacy, or the real-world events shaping today’s connected systems, these cybersecurity documentaries are worth watching πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my #cybersecurity related infographics at study-notes.org

#infosec #ethicalhacker #pentesting

3 weeks ago 1 0 0 0
Post image

Cybersecurity relies on multiple specialized teamsβ€”offensive, defensive, engineering, and oversightβ€”working in coordination to maintain overall system security πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #cybersecurity related infographics at study-notes.org

#infosec #cybersecurityawareness

3 weeks ago 2 0 0 0
Post image

pv (Pipe Viewer) is one of those hidden gems on Linux. Just toss it into a pipe (pipes are already super convenient) and you get a live view of progress, speed, and ETA as data flows through πŸ˜ŽπŸ‘‡

Find pdf ebooks with all my #Linux related infographics at study-notes.org

#softwareengineer #devops

3 weeks ago 18 1 2 1