Home / Jahanzaib Khan (page 3)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

Types of Attackers

Types of Attackers

Controlling access is not limited to the control of authorized users; it also includes preventing unauthorized access. Information systems may be attacked by a variety of attackers, ranging from script kiddies to worms to militarized attacks. Attackers may use a variety of methods in their attempts to compromise the confidentiality, …

Read More »

CRIMINAL, CIVIL AND ADMINISTRATOR LAW

CRIMINAL, CIVIL AND ADMINISTRATOR LAW

Within common law there are various branches of laws, including the criminal, civil and the administrative law. Criminal Law Criminal law pertains to those laws where the victims can be seen as the society itself. While it may seen odd to consider the society as the victim when an individual …

Read More »

Hackers Took Over Gentoo Linux GitHub Repository

Hackers Took Over Gentoo Linux GitHub Repository

The most popular Linux distribution Gentoo has been “totally pwned” according to the researcher at Sophos, and currently none of the code could be trusted. The team has posted an immediate update and noted that none of the real code has been compromised. However, they have pulled the GitHub repository …

Read More »

Facebook and Twitter Spy Into Who’s Behind Their Ads

Facebook and Twitter Spy Into Who’s Behind Their Ads

MENLO PARK, Calif, Social media companies, are stepping up to stop the disinformation on their online platforms ahead of this year’s elections, the news was out on Thursday that the new tools will be aiming to improve the transparency around advertisements. In the announcement, Facebook and Twitter said that they …

Read More »

Protocol Analyzers

Protocol Analyzers

The terms protocol analyzing and packet sniffing are interchangeable. They refer to the process of monitoring the data that is transmitted across the network. The software that performs the operation is called either an analyzer or a snifter. Sniffers are readily available on the Internet. These tools were initially intended …

Read More »

DarkMarket and Master Splynter

DarkMarket and Master Splynter

In 2009 a story broke about an underground group called DarkMarket —the so called eBay for criminals, a very tight group that traded stolen credit card numbers and identity theft tools, as well as the items needed to make fake credentials and more. An FBI agent by the name of …

Read More »

Facebook is Reversing its Crypto ad Ban

Facebook is Reversing its Crypto ad Ban

As you may be able to see much of ad revenue potential to ignore, Facebook today has announced that they are reversing back its cryptocurrency ad ban immediately. This decisions indeed comes with a variety of conditions, However, The company do say that they will allow the ads and related …

Read More »