“Tampering is Great Art of Creativity, but on the Cost of Others” Introduction I was to purchase an I Phone I was discussing this with my friend at the bus stop suddenly a boy approached me and said that he knows a dealer who could give me an I Phone with android applications working in
Starting a Network Architecture Review
Network Architecture, I am sure every one of us have heard it and often copied them from Internet for our assignments for network classes. But when it comes to reviewing them, it often becomes a confusing task for the new-comers in auditing. So here I will share some of the basic tips on how to
Email Phishing and Attacks
Phishing was a word in the beginning used to portray email attacks that were used to rob your online banking username and security password. On the other hand, the term has evolved and now refers to almost any email-based attack. Phishing uses social engineering, a method where cyber attackers try to fool you into performing