PinnedAhmedFirewall Dynamics in Cybersecurity: Navigating Perception vs. RealityTable of Contents:May 20, 20232May 20, 20232
AhmedThe Security illusion: Why Two-Factor Authentication is No Longer EnoughTable of Contents:3d ago3d ago
Ahmed🦈Wireshark 101: Finding Passwords & Credentials in Plain Text TrafficTable of Contents:Oct 14Oct 14
AhmedCommand AT-ST: How Star Wars’ ‘Chicken Walker’ Can Shape the Future of ScienceTable of Contents:Sep 26Sep 26
AhmedDigital Signature vs. Electronic Signature: Concept, Applications, and SecurityTable of Contents:May 17May 17
AhmedXZ Backdoor (CVE-2024–3094): Incident, Utils Backdoor Analysis and Defensive MeasuresTable of Contents:Apr 19Apr 19