Unlocking the Future of Secure Communication Protocols: A Comparative Overview of TLS 1.2,Introduction:Oct 19, 2023Oct 19, 2023
Comparing 3 Ensemble Learning Algorithms (Machine Learning)This blog is dedicated to comparing the results of using 3 classification algorithms in machine learning, which was done as a credit to our…Oct 18, 2023Oct 18, 2023
Bypassing authentication through phishingThe blog focuses on exploiting a vulnerability in web security and discussing how IAM could provide a solution to solve this vulnerability…Oct 17, 2023Oct 17, 2023
Malware analysis on Ardamax (Dynamic and Static)In this blog post, I’d like to take you on my journey of malware analysis performed on Ardamax. I thank Mr. Uriel Kosayev, as I followed…Sep 7, 2023Sep 7, 2023