Lemon8Lifestyle community

Send To

Line
Facebook
WhatsApp
Twitter
Copy link

Get the full app experience

Discover more posts, hashtags, and features on the app.

Open Lemon8
Open Lemon8
Open Lemon8
Not now
Not now
Not now
  • Category
    • For You
    • Outfits
    • Skincare
    • Nails
    • Home
    • Recipes
    • Makeup
    • Hair
    • Accessories
    • Perfume
    • Dessert
    • Music
    • Shoes
    • Travel
    • Dining
    • Home skills
    • Bags
    • Reading
    • Photography
    • TV & Film
    • Outdoors
    • Tech
    • Art & Design
    • Gardening
    • Career
    • Games
    • Education
    • Cars
    • Wedding
    • Pets
  • App version
  • Help
  • UK
    • UK
    • 日本
    • ไทย
    • Indonesia
    • Việt Nam
    • Malaysia
    • Singapore
    • US
    • Australia
    • Canada
    • New Zealand
Official websitePrivacy PolicyTerms of ServiceCookies PolicyUK AVMS
Well-known TCP/UDP ports
Well-known TCP/UDP ports are the standard port numbers from 0 to 1023, assigned by IANA so common network services can be found consistently across systems. Here at a list of well-known TCP/UDP port numbers and their applications 😎☝️ Find high-res pdf ebooks with all my networking related inf
Dan Nanni

Dan Nanni

1 like

Popular CVE vulnerability scanners
CVE scanners help find known vulnerabilities in software and systems by checking them against the CVE database. Here are a list of popular open-source or commercial CVE scanners 😎👆 Find high-res pdf ebooks with all my cybersecurity related infographics at https://study-notes.org #cybersec
Dan Nanni

Dan Nanni

1 like

Linux /etc/shadow overview
On Linux, /etc/passwd keeps basic user account details. Password hashes used to live there too, but for security, they were moved to /etc/shadow, which is readable only by root. Here is how to interpret the /etc/shadow 😎👆 Find high-res pdf ebooks with all my Linux related infographics at https:
Dan Nanni

Dan Nanni

1 like

Cybersecurity glossary A to Z
The cybersecurity field keeps evolving, so knowing the core terms matters. Here is an A-to-Z guide to key cybersecurity concepts worth understanding 😎👆 Find high-res pdf ebooks with all my cybersecurity related infographics at https://study-notes.org #cybersecurity #infosec #informatio
Dan Nanni

Dan Nanni

3 likes

Understanding WiFi frequencies
WiFi runs on 2.4 GHz, 5 GHz, and the newer 6 GHz bands. Lower frequencies give you better range, while higher frequencies give you more speed. Choosing the right band is basically choosing your trade-off: wider coverage or faster performance 😎👆 Find high-res pdf ebooks with all my networking an
Dan Nanni

Dan Nanni

1 like

Virtual labs for learning IP networking
Virtual labs are great for learning IP networking, testing configurations, and troubleshooting protocols in a safe isolated environment — often by simulating or emulating real networks. Here are virtual lab tools for IP networking 😎👆 Find a high-res pdf book with all my networking related inf
Dan Nanni

Dan Nanni

1 like

Different types of HTTP methods
HTTP requests (aka HTTP methods) are the verbs of the web: they define not only what a request does, but whether it is safe to repeat, safe from side effects, or reusable through caching. Let’s review and compare different HTTP requests 😎👆 Find high-res pdf ebooks with all my DevOps related i
Dan Nanni

Dan Nanni

1 like

Wireless penetration tools
Wireless pentesting is about finding weak spots in Wi-Fi and other wireless networks by capturing traffic, analyzing signals, and testing how well authentication holds up against real-world attacks. Here are popular wireless pentest tools 😎👆 Find high-res pdf ebooks with all my Linux and cyb
Dan Nanni

Dan Nanni

1 like

New updates on my DevOps infographics
In this update in my DevOps infographics, I added four new topics: ✅ Kubernetes pod networking ✅ AWS CLI cheatsheet ✅ REST vs. RPC ✅ How GitHub Actions work If you already bought my DevOps infographic pack or ebook, these are exclusively available to you for free. Use the same download li
Dan Nanni

Dan Nanni

1 like

Popular wireless protocols for smart home automation
Smart homes use wireless technologies like BLE, Zigbee, Z-Wave, and Wi-Fi to connect lights, thermostats, cameras, locks, and other devices, letting you monitor and control your home more easily from almost anywhere. Here is a quick comparison of different wireless technologies 😎☝️ Find high-
Dan Nanni

Dan Nanni

2 likes

Open-source firewall OS
A firewall OS turns dedicated hardware into a security gateway, giving you deeper control over network traffic, VPN access, intrusion detection, and custom security policies. Here are popular open-source firewall OS 😎👆 Find high-res pdf ebooks with all my Linux and cybersecurity related info
Dan Nanni

Dan Nanni

2 likes

How DHCP works
DHCP saves you from manually configuring every device by automatically giving it the network settings it needs to connect and communicate. Here is how DHCP works 😎👆 Find high-res pdf ebooks with all my networking related infographics at https://study-notes.org/networking-ebook.html #networki
Dan Nanni

Dan Nanni

2 likes

Useful browser extensions for pentesters
Pentesters often use browser extensions because they keep testing close to the web app—making it easier to inspect cookies, tweak traffic, and catch client-side issues without constantly switching tools Here are useful browser extensions for pentesting 😎👆 Find high-res pdf ebooks with all my
Dan Nanni

Dan Nanni

2 likes

Free online resources for software developers
Even in the AI era, learning to code still matters. It is the difference between just using AI tools and actually controlling what they can do. And if you have that mindset, there are plenty of great resources online to help you start 😎👆 Find high-res pdf ebooks with all my technology related in
Dan Nanni

Dan Nanni

2 likes

Different types of DNS attacks
DNS attacks go after weaknesses in the Domain Name System — one of the internet’s core components — to disrupt services or redirect traffic, which is why DNS remains a high-value target for attackers 😎👆 Find high-res pdf ebooks with all my cybersecurity infographics at https://study-notes.org
Dan Nanni

Dan Nanni

1 like

Online training platforms for cybersecurity
Cybersecurity training platforms give both red and blue teams a safe place to practice real-world scenarios, from exploiting vulnerabilities to detecting, investigating, and responding to attacks Here are popular online cybersecurity training platforms and their pricing options 😎👆 Find high-r
Dan Nanni

Dan Nanni

1 like

Different types of spoofing attacks
Spoofing attacks manipulate identity or trust signals across network layers to deceive systems and redirect or disrupt legitimate communication. Here are different types of spoofing attacks across OSI layers 😎👆 Find high-res pdf ebooks with all my cybersecurity infographics at https://study-n
Dan Nanni

Dan Nanni

2 likes

Useful browser extensions for defensive security
Browser extensions can quietly do a lot of security work while you browse: blocking malicious ads, managing passwords, limiting risky scripts, and warning you before phishing pages get a chance to bite 😎👆 Find high-res pdf ebooks with all my cybersecurity infographics at https://study-notes.org
Dan Nanni

Dan Nanni

2 likes

Essential /etc config files on Linux
On Linux, /etc is basically where system-wide configs live — both core system settings and app-specific configs. Let’s break down the most common stuff you’ll find in there 😎👆 Find high-res pdf ebooks with all my Linux related infographics at https://study-notes.org #linux #softwarede
Dan Nanni

Dan Nanni

2 likes

Free OS fingerprinting software
OS fingerprinting looks at how a system responds on the network to figure out what OS it is. In offensive security, that intel lets attackers line up exploits that actually fit the target instead of guessing. Here are freely available OS fingerprinting tools 😎👆 Find high-res pdf ebooks with a
Dan Nanni

Dan Nanni

3 likes

See more
Dan Nanni
14Following
1496Followers
10.6KLikes and saves

Dan Nanni

dan_nanni

dan_nanni

study-notes.org

Cancel

Linux, networking & cybersecurity made simple 👆