top of page
![](https://static.wixstatic.com/media/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.webp)
![Indicators Of Compromise](https://static.wixstatic.com/media/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_ad15e75216854dacaeb631c437a033dd~mv2.webp)
Dr. Afsaneh Javadi
6 min read
Indicators Of Compromise
Indicators of compromise are very important to find our system is in danger and can help us either prevent an eventual breach from...
![](https://static.wixstatic.com/media/a06cfa_80740047464a439db575e27b763fd300~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_80740047464a439db575e27b763fd300~mv2.webp)
![Kali Linux tools](https://static.wixstatic.com/media/a06cfa_80740047464a439db575e27b763fd300~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_80740047464a439db575e27b763fd300~mv2.webp)
Dr. Afsaneh Javadi
7 min read
Kali Linux tools
Dr.Afsaneh Javadi, Anirban Poul, Lovepreet Kaur Kali Linux is an Operating System designed for Penetration Testing, Security Auditing,...
![](https://static.wixstatic.com/media/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.webp)
![NMAP (Network Mapper)](https://static.wixstatic.com/media/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_139238d85c9f4940bcc922447152dc01~mv2.webp)
Dr. Afsaneh Javadi
8 min read
NMAP (Network Mapper)
Dr. Afsaneh Javadi, Karan Jindal 1.1 Introduction Nmap stands for Network Mapper. It is an open source tool used to find out...
![](https://static.wixstatic.com/media/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.webp)
![netcat: A computer networking utility for reading from and writing to network connection](https://static.wixstatic.com/media/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_b5a858597d194cd2947a475e59a2d680~mv2.webp)
Dr. Afsaneh Javadi
5 min read
netcat: A computer networking utility for reading from and writing to network connection
Dr. Afsaneh Javadi Anu Thakur Netcat is a network utility tool which is used to read and write data across the network by using...
![](https://static.wixstatic.com/media/a06cfa_7b51c0d86783415381ed6cfcb7769c14~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_7b51c0d86783415381ed6cfcb7769c14~mv2.webp)
![What is the difference between virus and worm?](https://static.wixstatic.com/media/a06cfa_7b51c0d86783415381ed6cfcb7769c14~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_7b51c0d86783415381ed6cfcb7769c14~mv2.webp)
Dr. Afsaneh Javadi
2 min read
What is the difference between virus and worm?
Viruses A computer virus propagates by inserting a copy of itself into and becoming part of another program. . Almost all viruses are...
![](https://static.wixstatic.com/media/a06cfa_bc8e1d3f07b44998a21d14bd3dac3286~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_bc8e1d3f07b44998a21d14bd3dac3286~mv2.webp)
![Everything about Virus-Part 1](https://static.wixstatic.com/media/a06cfa_bc8e1d3f07b44998a21d14bd3dac3286~mv2.jpg/v1/fill/w_427,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_bc8e1d3f07b44998a21d14bd3dac3286~mv2.webp)
Dr. Afsaneh Javadi
8 min read
Everything about Virus-Part 1
What is a Computer Virus? The computer virus got its name because it behaves like a biological virus: A biological virus can hardly be...
bottom of page