Edward Nene(@ednene) 's Twitter Profileg
Edward Nene

@ednene

IT security specialist l Tech enthusiast l Man United supporter

ID:22774569

calendar_today04-03-2009 14:00:05

1,5K Tweets

389 Followers

3,0K Following

Fernando ๐Ÿ‡ฎ๐Ÿ‡น๐Ÿ‡จ๐Ÿ‡ญ(@Franc0Fernand0) 's Twitter Profile Photo

System design is the most challenging and exciting type of tech interview.

Here is a complete list of topics that will help you get ready:

{0/18} โ†“

account_circle
Africa Uncensored(@AfUncensored) 's Twitter Profile Photo

2 months ago, we rolled out our corruption tracking portal, . Since then, we have been hard at work to make it easier to go back in time and see where your money as a taxpayer was misappropriated and by who. So, today, we are announcing something...

account_circle
Abhay Bhargav(@abhaybhargav) 's Twitter Profile Photo

Its GIVEAWAY time! I'll be giving away 2 annual subscriptions to AppSecEngineer at the end of 24 hours. In addition, two of these winners will also get some AppSecEngineer swag and stickers

All you have to do is:
- Follow me
- Follow AppSecEngineer
- RT/Share this post

account_circle
48 Laws of Power by Robert Greene(@48LawsofPowerr) 's Twitter Profile Photo

Never be distracted by peopleโ€™s glamorous portraits of themselves and their lives; search and dig for what really imprisons them.

account_circle
Corporate Machiavelli Bot(@CorporateMacBot) 's Twitter Profile Photo

If you are unfaithful to your wife,

she is unlikely to divorce you.

If you are faithful to your wife,

but fail to provide for her economically,

she is very likely to divorce you.

Most women can forgive infidelity.

Few women will tolerate economic failure.

account_circle
48 Laws of Power by Robert Greene(@48LawsofPowerr) 's Twitter Profile Photo

Without enemies around us, we grow lazy. An enemy at our heels sharpens our wits, keeping us focused and alert. It is sometimes better, then, to use enemies as enemies rather than transforming them into friends or allies.

account_circle
CNN(@CNN) 's Twitter Profile Photo

A parrot steals a reporter's AirPod in Chile while he was telling the audience about rising crime rates.

account_circle
Fernando ๐Ÿ‡ฎ๐Ÿ‡น๐Ÿ‡จ๐Ÿ‡ญ(@Franc0Fernand0) 's Twitter Profile Photo

There are 3 main categories of load balancers:

- DNS based
- transport layer (L4)
- application layer (L7)

This how they work and their differences: {1/12} โ†“

There are 3 main categories of load balancers: - DNS based - transport layer (L4) - application layer (L7) This how they work and their differences: {1/12} โ†“
account_circle
Merill Fernando(@merill) 's Twitter Profile Photo

Why is MFA over SMS/Voice not considered safe vs other MFA methods like TOTP & Authenticator apps?

I'll break down a blog post by Microsoft's VP of Identity Security Alex Weinert on why he considers SMS to be the least secure of MFA methods.

๐Ÿ‘‡

account_circle
Niklas Tinner(@NiklasTinner) 's Twitter Profile Photo

LAPS for (later this year):
-Store passwords of AAD joined devices on the AAD device object
-Cloud-based management experience, passwords retrieved via Graph, Azure portal or rotated through Intune
-Settings configuration in the Intune portal

#Microsoft LAPS for #AzureAD (later this year): -Store passwords of AAD joined devices on the AAD device object -Cloud-based management experience, passwords retrieved via Graph, Azure portal or rotated through Intune -Settings configuration in the Intune portal #MSIntune
account_circle
Merill Fernando(@merill) 's Twitter Profile Photo

Are you tired of clicking around in Microsoft portals to get to a blade?

Introducing cmd.ms your Microsoft cloud command line for the browser!

Use the power of your keyboard and your memory to get to your favourite Microsoft portal or blade in seconds.

Are you tired of clicking around in Microsoft portals to get to a blade? Introducing cmd.ms your Microsoft cloud command line for the browser! Use the power of your keyboard and your memory to get to your favourite Microsoft portal or blade in seconds.
account_circle
Merill Fernando(@merill) 's Twitter Profile Photo

Who doesn't love Conditional Access in Azure AD?

Tomorrow you get to ask anything from the folks that build the feature plus get the ins and outs of all the new CA features that have come your way.

Click Set Reminder below! ๐Ÿ‘‡

twitter.com/i/spaces/1OyJAโ€ฆ

account_circle
Microsoft Developer Canada(@msdevCA) 's Twitter Profile Photo

Want to learn all about Azure DevOps? Catch the latest full tutorial with April Edwards and TechWorld with Nana | DevOps ๐Ÿš€ as they walk through ALL of the features. Watch the video and get a FREE exam voucher: msft.it/6010dwDZA

DevOps on Azure

Want to learn all about Azure DevOps? Catch the latest full tutorial with @TheAprilEdwards and @Njuchi_ as they walk through ALL of the features. Watch the video and get a FREE #DevOps exam voucher: msft.it/6010dwDZA @AzureDevOps #AzureDevOps #FreeLearning
account_circle
Merill Fernando(@merill) 's Twitter Profile Photo

Go to Authentication Methods, select Authenticator app and turn on 'Number Matching' today!!

Protect your users from MFA fatigue.

Go to Authentication Methods, select Authenticator app and turn on 'Number Matching' today!! Protect your users from MFA fatigue.
account_circle