Home / Jahanzaib Khan (page 4)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

Facebook Mistakenly Leaked Developer Analytics Reports To Testers

Facebook Mistakenly Leaked Developer Analytics Reports To Testers

This week an alarmed developer who contacted, informed that the Facebook App Analytics weekly summary email has been delivered outside their company. Which probably contains sensitive business information, including weekly average users, page views and new users? Forty-three hours after they contacted the Facebook about the issue, the social network …

Read More »

The Six Steps Toward Riches

The Six Steps Toward Riches

Every single human who reaches to an age where they are capable of understanding the purpose of money, wishing for it. Wishing will basically not bring any sort of riches. But desiring riches with a state of mind that becomes an obsession, then planning definite ways and means to acquire …

Read More »

Confidentiality and Strength

Confidentiality and Strength

Confidentiality and Strength: One of the major reasons of implement a cryptographic system is to ensure the confidentiality of the information being used. Confidentiality may be intended to prevent the unauthorized disclosures of information in a local network or to prevent the unauthorized disclosure of information across a network. A …

Read More »

Password Attacks

Password Attacks

Password Attacks occur when an account is attacked repeatedly. This is accomplished by using applications known as password crackers, which send possible passwords to the account in a systematic manner. The attacks are initially carried out to gain passwords for an access or modification attack. There are several types of …

Read More »

The Principles Behind Social Engineering

The Principles Behind Social Engineering

The Principles Behind Social Engineering: A number of principals, or elements, allow social engineering attacks to be effective. Most of these based on our nature to be helpful, or trust other in general, and to believe that there is a hierarchy of leadership that should be followed. For the exam, …

Read More »

Google Promises Its A.I Will Not Be Used For Weapons

Sundar Pichai, Google’s chief executive, at its annual Google I/O developer conference last month in Mountain View, Calif. On Thursday he laid out objectives for the company’s use of A.I. technology.

SAN FRANCISCO— Google, reeling from an employee protest over the use of Artificial Intelligence for military purposes, said Thursday that it would not use A.I for weapons or for surveillance that violates human rights. But it will continue to work with governments and the military. These new rules were the …

Read More »

Understanding Hashing

Understanding Hashing

Understanding Hashing: Simply yet, hashing can be considered a type of one-way encryption. More accurately, it is a process that creates a scrambled output that can’t be reversed—or at least can’t be revered easily. The process of hashing takes plain text and transform it into cipher text but does so …

Read More »