top of page
Dr. Afsaneh Javadi
6 min read
Indicators Of Compromise
Indicators of compromise are very important to find our system is in danger and can help us either prevent an eventual breach from...
Dr. Afsaneh Javadi
7 min read
Kali Linux tools
Dr.Afsaneh Javadi, Anirban Poul, Lovepreet Kaur Kali Linux is an Operating System designed for Penetration Testing, Security Auditing,...
Dr. Afsaneh Javadi
8 min read
NMAP (Network Mapper)
Dr. Afsaneh Javadi, Karan Jindal 1.1 Introduction Nmap stands for Network Mapper. It is an open source tool used to find out...
Dr. Afsaneh Javadi
5 min read
netcat: A computer networking utility for reading from and writing to network connection
Dr. Afsaneh Javadi Anu Thakur Netcat is a network utility tool which is used to read and write data across the network by using...
Dr. Afsaneh Javadi
2 min read
What is the difference between virus and worm?
Viruses A computer virus propagates by inserting a copy of itself into and becoming part of another program. . Almost all viruses are...
Dr. Afsaneh Javadi
8 min read
Everything about Virus-Part 1
What is a Computer Virus? The computer virus got its name because it behaves like a biological virus: A biological virus can hardly be...
bottom of page