PixelDrive
185 subscribers
49 photos
12 videos
11 files
31 links
Primarily hacking the cyber world, but we also play around with design and code
Download Telegram
Post - 4 Series of elmasiri's book:
Tuning as a Life Cycle


File systems have no a One-Time Fix

​Many teams launch a database and only "tune" it when it crashes. Elmasri argues that Database Tuning (Phase 6 of the design process) must be a continuous loop.

​The Concept: Tuning involves adjusting the Internal Schema (indexes, record placement, and buffering) based on real-world transaction frequencies.
​Real-World Project Impact:
An index that speeds up a SELECT query will inevitably slow down every INSERT and UPDATE.
As your app grows from 100 users to 100,000, the "correct" index today becomes a "bottleneck" tomorrow.
​The Pro Move: Use Database Profiling to identify which queries are "heavy" and adjust your physical design (Phase 5) dynamically as user behavior changes.
As of your project u need to pay attention on what is most friction right now. is it performance, data accuracy or scale

#Dataenginering #Backend #systemdesign #dataintegrity

@pixeldrive
1👍1
😁31
🚀 Want to step into the world of Cyber Security & Ethical Hacking?

This hands-on practical course covers everything from Linux Basics to Website Hacking & Post Exploitation 🔐

What You’ll Learn:

✔️ Linux Fundamentals
✔️ Network Hacking & Security
✔️ Attacks & Cracking Techniques
✔️ Gaining Access to Systems
✔️ Social Engineering
✔️ Website Hacking & Vulnerabilities
✔️ Post Exploitation
✔️ Bonus Advanced Sections

Download Link 🔗
https://drive.google.com/drive/mobile/folders/1if6MCeBCj8sxWwJIKhtgwU0GBuBW8uLx

🎯 Perfect for:
👨‍💻 Beginners | 🎓 Students | 🛡️ Cyber Security Enthusiasts
🔥1
Forwarded from Genesis (ISRAƎL)
i still think about this everyday
🔥5
This little guy thinks he’s the main character. Designed a mascot for my future game/comic

#medibangillustrator

@pixeldrive
😁3
Forwarded from Debugging Epohul (epohul)
I was meant to share this a while back. It's a really nice book, easy to follow and pretty up-to-date since it's published this year.

(Only 127 pages)

the book is in the comment
🔥3👏21
Democracy Install now or later
😭3👎1
Forwarded from Nahom G.
🌟 We Built AlgoWars at a Global Hackathon From Ethiopia

We joined Vercel’s “Prompt to Production” week in Addis Ababa — a global hackathon where teams build real AI projects from idea to working prototype in one night. The experience was intense, creative, and inspiring.

Our team built AlgoWars – Where Code is Weapon (@@fuauda) — a project that turns coding and logic into a competitive strategy concept, highlighting innovation, problem-solving, and engineering skills.

Now our project is live, and we need your vote to compete globally and represent Addis Ababa and Ethiopia. Every vote helps us move closer to the top.

How to vote:
1️⃣ Open → https://v0-v0prompttoproduction2026.vercel.app/browse
2️⃣ Sign in
3️⃣ Select Engineering from categories
4️⃣ Find @@fuauda (make sure look for the project with an image b/c there is a one )
5️⃣ Click Vote ❤️

Let’s show the world what Addis Ababa can build — your support makes a real difference.

#PromptToProduction #AlgoWars #Ethiopia
2
A neighborhood near Al Sheena is known for its sea of ~1,500 identical houses.
Same layout. Same design. Same structure.
From above, it looks efficient.
From a security perspective? It’s a monoculture.
In security, uniformity is a double-edged sword.
When every system, device, or configuration looks the same:
Management is easier
Deployment is faster
One vulnerability scales instantly
That’s why modern security focuses on:
• Segmentation over sprawl
• Diversity over uniformity
• Zero Trust over assumed safety

Resilient design looks boring from above but survives real attacks

@pixeldrive
Designed this last night looking at it in the light of day, i can see many problems

@pixeldrive
👍4
💻 Just started an intermediate course in Ethical Hacking.
​I’ll be spending the next few weeks focusing on [pick 1 or 2: Active Directory exploitation, Buffer Overflows, or Advanced Network Pivoting]. It’s a challenge, but that’s where the growth is. Stay tuned for some project updates!
Duration: 70hrs ~
Passing the exam on NetAcad

#Pentesting #HackTheBox #CyberSkills

@pixeldrive
I redesigned AASTU’s website.

If the slogan is “University for Industry”… why doesn’t the website feel like it?

I’ve always believed that a website is more than just information. It’s identity. It’s positioning. It’s power. And when I looked at the original site, I felt like something was missing a university that calls itself university for industry. they could've focused on the creation process, success, entrepreneurship. Education shouldn’t be a conveyor belt to industry


@pixeldrive
5🔥2
this is today's progress it's not finished yet there is a lot i have to add but i need to move to other stuff now

#Day5challenge #pixeldrive

@pixeldrive
👍1🔥1
So I made this using help of ai ofc 😅😅 optimized landing page for Highlights:
​Desktop-First Architecture: Tailored specifically for large-scale displays to ensure the 3D assets and typography maintain perfect visual balance.
​live model Integration: A custom-rendered 3D planet that serves as a high-impact focal point for the theme "cyber-game"
​Sleek Aesthetics: A minimalist navigation and brand-heavy layout, powered i don't think it was built for desktop screen descriptive

Link: Pixeldrive.vercel.app

@pixeldrive
🔥7
If you’re into OSINT, or just love exploring the internet’s hidden layers, you need to check out Shodan

Often called the “search engine for the Internet of Things” Shodan lets you discover exposed servers, webcams, routers, industrial systems, analyze vulnerabilities and security risks and more
👍1
😁3
TIP: Hacking is NOT a Crime ( hackingisnotacrime.org ) is a nonprofit organization that attempts to raise awareness about the pejorative use of the term hacker. Historically, hackers have been portrayed as evil or illegal. Luckily, a lot of people already know that hackers are curious individuals who want to understand how things work and how to make them more secure.
2