Skip to content
View xzebcex's full-sized avatar
Block or Report

Block or report xzebcex

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
xzebcex/README.md

Alt Text

Header

Hi 👋! My name is ... and I'm a ..., from ....

About Me...


🔭 I’m currently working on expanding my knowledge and skills in computer science with a focus on networking and cybersecurity. From understanding the intricacies of network protocols to exploring the latest trends in cybersecurity threats, I'm deeply immersed in the dynamic world of information technology.

👯 I’m looking to collaborate on innovative projects that leverage networking technologies and cybersecurity principles to solve real-world challenges. Whether it's developing robust network infrastructures or implementing cutting-edge security measures, I'm eager to collaborate with like-minded individuals passionate about pushing the boundaries of technology.

🤝 I’m looking for help with mastering advanced networking concepts and enhancing my expertise in cybersecurity practices. Seeking guidance from experienced professionals or mentors who can offer insights into complex networking protocols and effective cybersecurity strategies would be invaluable to my learning journey.

🌱 I’m currently learning about advanced networking protocols, such as MPLS and BGP, to deepen my understanding of network infrastructure design and optimization. Additionally, I'm diving into the realm of ethical hacking and penetration testing to strengthen my cybersecurity skills and contribute to creating more secure digital environments.

💬 Ask me about anything related to networking principles, cybersecurity best practices, or the intersection of technology and society. I'm always enthusiastic about discussing the latest developments in IT and sharing insights into how they impact our digital world.

⚡ Fun fact: The first computer virus, named "Creeper," was created in the early 1970s as an experiment and spread through ARPANET, the precursor to the internet. It displayed the message "I'm the creeper, catch me if you can!" and led to the development of the first antivirus program, "Reaper," designed to remove it.

My Skills ...


anaconda logo jupyter logo python logo flask logo github logo git logo django logo numpy logo pandas logo opencv logo postgresql logo powershell logo bash logo

Portfolio...

stats graph languages graph streak graph


Contact Me...

Popular repositories

  1. Water-Bucket-Puzzle Water-Bucket-Puzzle Public

    This application mimics the famous game of "Water Bucket Puzzle," which requires players to measure a given amount of water using three buckets of varied capacities (8L, 5L, and 3L).

    Python 3

  2. Calendar Calendar Public

    Calendar

    Python 1

  3. Guess-The-Number Guess-The-Number Public

    Guess The Number

    Python 1

  4. Countdown-Timer Countdown-Timer Public

    Countdown Timer

    Python 1

  5. BMI-Calculator-Program BMI-Calculator-Program Public

    BMI Calculator

    Python 1

  6. Currency-Conversion Currency-Conversion Public

    Currency-Converter

    Python 1