gulreen zakaTerrorists Entered APS Peshawar and murdered students: A story shared by APS files (Part 1)Introduction2d ago10
NajahHacking or Spoofing Attack MethodsYou’re probably using the word hacked wrong. Hacking and spoofing are two common cybersecurity threats that are often conflated, although…Sep 2313
gulreen zakaAPS Peshawar should have proper security to avoid Attack:Story being told (Part 2)The Journey of an Unstoppable Receiver2d ago82d ago8
gulreen zakaOsama Bin Laden (Part 2)He was the first to find solid evidence linking 911 to Al Qaeda. This is a brick from Usama bin Latin’s Kabul hideout. I have kept this as…6d ago156d ago15
gulreen zakaTerrorists Entered APS Peshawar and murdered students: A story shared by APS files (Part 2)Challenges Faced by the Emergency Responders2d ago102d ago10
gulreen zakaTerrorists Entered APS Peshawar and murdered students: A story shared by APS files (Part 1)Introduction2d ago10
NajahHacking or Spoofing Attack MethodsYou’re probably using the word hacked wrong. Hacking and spoofing are two common cybersecurity threats that are often conflated, although…Sep 2313
gulreen zakaAPS Peshawar should have proper security to avoid Attack:Story being told (Part 2)The Journey of an Unstoppable Receiver2d ago8
gulreen zakaOsama Bin Laden (Part 2)He was the first to find solid evidence linking 911 to Al Qaeda. This is a brick from Usama bin Latin’s Kabul hideout. I have kept this as…6d ago15
gulreen zakaTerrorists Entered APS Peshawar and murdered students: A story shared by APS files (Part 2)Challenges Faced by the Emergency Responders2d ago10
Criminal MattersHero Christopher Fletcher Saves Woman as She Was S*xually AssaultedThe victim had a drink with her attacker at a bar moments before the attackJun 161
Vera-Marie LandiinA Haven for New StoriesHide In The Closet — We May Be in Mortal Danger!A memory from the past must have come into play that day4d ago2