↑ Go to search

Languages Dutch (nl)
Users 14
Active users (last month) 1
Active users (last six months) 1
Characters per post (max) 500
Known instances 8,976
First sight Apr 29, 2022 UTC
Last successful check Sep 18, 2024 UTC
Noxious No
New No
Software Mastodon 4.2.12
Registrations Open (by admin approval)
Meta’s Threads moderation Unknown (this instance is not listed in the Anti-Meta Fedi Pact list), and its list of moderated instances is not accessible.
Most used hashtags (last week) uspol, history, Security
Short description
Welcome to the Mastodon Cybersecurity community. Feel free to post or discuss anything cybersecurity-related.
Long description
Welcome to the Mastodon Cybersecurity community. Feel free to post or discuss anything cybersecurity-related.
Instance rules
  1. Content not allowed: Any illegal content (doxing, leaking private information, under age content, etc) Adult (pornography) content Racism Threats of Physical violence against any person, animal or institution. Accounts breaking those rules will be banned without a warning.
  2. Code of Conduct: We are a nice community of cyber techies, sharing and helping each other. You are welcome to join! Basic rules: Be Polite Be Respectful - even if you disagree. And everything will be fine.
Moderated instances [?]
Not available
Instances certainly moderating this instance [?]
  1. freethought.online: suspension
  2. kemonodon.club: limitation
  3. m.daevien.com: suspension
  4. mastodon.cloud: suspension
  5. octodon.social: suspension
  6. pokemon.mastportal.info: suspension
  7. radio.quaqoostore.net: limitation
  8. social.afront.org: suspension
  9. sona.live: suspension
  10. sunbeam.city: suspension
  11. wandering.shop: suspension
  12. zoo.retro-ink.com: limitation
Date of creation Dec 29, 2021 UTC
Display name Joe Shenouda Cyber-Consult.org
Bio
https://www.cyber-consult.org/ Joe Shenouda is a hands-on technical team leader, engineer, speaker, trainer, consultant, and research fellow on all topics related to cybersecurity. Joe is often asked to map out and improve the maturity of companies in terms of cybersecurity by means of the implementation of (technical) security solutions such as SIEM, vulnerability scanners, sensors, and agents.
Statistics
Last 12 weeks activity (totals: 1 statuses, 2 logins, 0 registrations)
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
S: 0
L: 1
R: 0
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
S: 1
L: 1
R: 0
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
S: 0
L: 0
R: 0
Last checks (green: OK; red: KO)
9/11/24, 7:52:41 AM UTC9/12/24, 2:23:04 AM UTC9/13/24, 2:47:44 AM UTC9/14/24, 2:00:19 AM UTC9/15/24, 1:03:09 AM UTC9/16/24, 1:36:52 AM UTC9/17/24, 1:47:48 AM UTC9/18/24, 1:25:18 AM UTC
Succesful checks: 755/755 (100%)