PinnedMahbuba ShahrininSystem WeaknessUsing Wireshark: Compare Protocols and PortsStandard protocols running on customer networks. In a SOHO network, as an IT Technician, we need to verify that services such as DHCP and…Apr 9Apr 9
Mahbuba ShahrinSmishing, Text Message PhishingScammers or bad actors use tools to harvest phone numbers. An example that explains what went wrong in the spam message. Also, a deep root…May 28May 28
Mahbuba ShahrinComparing Networking HardwareThis is helpful to know for an IT Technician who supports Managed Service Provider (MSP). MSP helps businesses install and manage their…Apr 6Apr 6
Mahbuba ShahrinHow to secure a SOHO networkHow to change the administrator password on a router.Dec 1, 2023Dec 1, 2023
Mahbuba ShahrinSecure Your VoiceWe sometimes hesitate to pick up our phone call when scammers start calling early mornings. This is what had happened to an incident like…Nov 24, 2023Nov 24, 2023
Mahbuba ShahrinExploring Data in BigQuery in Google CloudBigQuery is used to view and analyze data from many sources. BigQuery is a data warehouse on Google Cloud that data analysts can use to…Aug 8, 2022Aug 8, 2022
Mahbuba ShahrinHow To Use Splunk Platform Visualizations With Sample Data InsightsIn order to have your own Splunk environment, this Amazon Web Service link will provide the details on how to have your own EC2 instance…Jul 29, 2022Jul 29, 2022
Mahbuba ShahrinTop Regulatory Compliance Frameworks for Digital Asset Financial MarketsSecurity frameworks and Information Security standards are crucial tools in assisting to safeguard organizations’ data. Information…Jun 16, 2022Jun 16, 2022
Mahbuba ShahrininTowards DevPython Request LibraryThe Python Request Library makes it very easy to write programs that send and receive HTTP (HyperText Transfer Protocol). HTTP is the…Jun 15, 2022Jun 15, 2022
Mahbuba ShahrininPython in Plain EnglishPython Imaging Library (PIL)Everything you need to know about Python Imaging Library.Jun 15, 2022Jun 15, 2022