Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Authentication
Daniele Polencic
danielepolencic
THREAD: How does the Kubernetes API work?The Kubernetes API is made of several smaller components.In this thread you will learn about the component involved in storing resources into etcd. 1/10When
Read more
jorin 💤 💜
YawningJorin
1/ Hey friends, let's talk some online safety! Today a scammer made an attempt at making some money off of me and though it wasn't a particularly good attempt, it
Read more
AceOluwapelumi - {Computer bro}
olugize
#Tech101What are Progressive web apps?Advantages Offline mode Low data Low storage Improved performance Platform Specific featuresCompanies using it include: Twitter(twitter lite), Jumia, Starbucks, Pinterest, Forbes, The Washington post
Read more
Ankur💻🎧💪
TheAnkurTyagi
Yesterday I have written the first article on @hashnode After that, was exploring platform & Find a section called "AMA" by awesome devs. You want to learn from experts about
Read more
joanne🤡
hryjoanne
hello people all over twitter, no matter where u are, this is really important, now I do have to address this hacker situation again as apparently there’s another hacker link
Read more
Soumya
imsoumyarendra
NEW: NCRB has divulged more details about the Indian government's upcoming and controversial Automated Facial Recognition System, including that the system will soon be tested to detect mask-wearing faces, email
Read more
Brendan Keeler
healthbjk
Thinking about "API companies", with a strong group of them in the @ycombinator demo days.Thread and assessment of some of those companies: First - a company that has APIs ≠
Read more
Julien Vehent
jvehent
Five years ago, my security reviews were full of mitigations mostly abandoned today: selinux, ddos protection, ids, etc. Not that they were bad, but cloud infrastructure and containers have matured
Read more
Lea Kissner
LeaKissner
Do you like end-to-end encryption? Do you want your videoconferencing which scales to 1000 participants to have E2EE?Here's the design and roadmap for adding end-to-end encryption to Zoom meetings. For
Read more
Luciano Mammino 💛 Node.js
loige
Do you know what's in a #JWT token?Here's a quick thread to learn something about this! A JWT token (JSON Web Token) is just a string with a well-defined
Read more
💎𝗧𝗵𝗲 𝗪𝗵𝗶𝘁𝗲 𝗪𝗼𝗹𝗳 𝗼𝗳 𝗖𝗿𝘆𝗽𝘁𝗼💎
WolfGoneCrypto
$SATA / @SataToken"The future of authentication, authorization, identify, payments, and privacy" $2.8M MC / 1,063 Holders- Building Identity Guard & Anonymity -> Their framework- Supply is fixed w/ gradual releasesThe
Read more
Michael McGill 🚢
mcgillmd921
Naval Ravikant @Naval Mix TapeA collection of my favorite Naval wisdom "hits" from his podcast, interviews, and Tweets.Everything in quotes is Naval's "hits."Everything else is my "filler."/Press Play “I
Read more
Jake Williams
MalwareJake
On today’s #dogWalkingThread, let’s talk about the recently disclosed abuse of SAML by attackers to “bypass” MFA.For those not familiar with the concept, SAML allows the separation of identity providers
Read more
5-inch Lumpia
KazukiHizushi
Before I leave alter at the end of the week.Retweet, everyone needs to knowIf you're scared of your identity being exposed.Then be consistent in being cautiousBe consistent in covering up
Read more
Corben Leo
hacker_
In 2010, WikiLeaks released a classified document. A list of infrastructure critical to U.S national security.The government listed a Trans-Atlantic cable.3 years ago,19-year-old me gained ADMIN access to that cable
Read more
Cubs Authentics
CubsAuthentics
36 years ago today, the @Cubs came back to beat the #Cardinals 12-11 over 11 innings in what is known as the legendary “Sandberg Game.” To celebrate the anniversary, we’ll
Read more
‹
1
2
...
4
5
6
7
8
9
10
...
13
14
›