top of page
![Virus Detection Techniques](https://static.wixstatic.com/media/a06cfa_540ccb280d69462e99661a3e1c04f8ba~mv2.png/v1/fill/w_375,h_213,fp_0.50_0.50,q_95,enc_auto/a06cfa_540ccb280d69462e99661a3e1c04f8ba~mv2.webp)
Dr. Afsaneh Javadi
6 min read
Virus Detection Techniques
By Srihari Peddamail, Nihal R Palle What is Computer Virus? “Virus is a computer program which replicates itself byte-by-byte to create a...
![](https://static.wixstatic.com/media/a06cfa_ae821d54541f4f2999fcd0ce4f4802b0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a06cfa_ae821d54541f4f2999fcd0ce4f4802b0~mv2.webp)
![Scan for Suspicious Open Ports Using Different Tools: Netcat, FPort, TCPView](https://static.wixstatic.com/media/a06cfa_ae821d54541f4f2999fcd0ce4f4802b0~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/a06cfa_ae821d54541f4f2999fcd0ce4f4802b0~mv2.webp)
Dr. Afsaneh Javadi
6 min read
Scan for Suspicious Open Ports Using Different Tools: Netcat, FPort, TCPView
By Sarita rani, Dishesh Jani History of Netcat The original version of Netcat was UNIX program and composed by author Hobbit. Initially,...
![Concealment Tools: Practice of hiding malicious code](https://static.wixstatic.com/media/a06cfa_a938dca9faf545a0ac1eb0fd1eac6bc3~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/a06cfa_a938dca9faf545a0ac1eb0fd1eac6bc3~mv2.webp)
Dr. Afsaneh Javadi
6 min read
Concealment Tools: Practice of hiding malicious code
By Rajbir Kaur Wrappers Wrapper is an application which can concatenate two executable files and produce an application containing both....
bottom of page