Tuesday , September 25 2018
Home / Jahanzaib Khan (page 30)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

Types of Cloud Solutions

Cloud Solution Security

Types of Cloud Solutions: Calling the Cloud “the cloud” simply isn’t accurate because it doesn’t fully describe the scope of cloud services. While cloud services all share the ability to provide shared resources, shared software, and shared information to reduce an organization’s information technology (IT) costs, they also provide the …

Read More »

Penetration Testing Mobile Devices Using Android

Penetration Testing Mobile Devices Using Android

Penetration Testing Mobile Devices: So how do we pen test mobile devices? In many ways the process is similar to what we are already using in a traditional setting but with some minor difference along the way.   NOTE: Remember that in regard to security, mobiles are so diverse that …

Read More »

Apple iOS – Security

Apple iOS – Security

Apple iOS: The second most popular mobile operating system in the market is Apple’s iOS, which is present on multiple devices including the iPod, iPad, and iPhone. Much as Android is based on the linux Kernel, iOS is a slimmed-down version of OS X for the Mac. However, while it …

Read More »

The Python Programming Language – Download Complete Course Free

The Python Programming Language - Download Complete Course Free

The Python Programming Language – Download Complete Course Free Python Overview Scripting Language bject-Oriented Portable Powerful Easy to Learn and Use Mixes good features from Java, Perl and Scheme   Major Uses of Python System Utilities GUIs (Tkinter, gtk, Qt, Windows) Internet Scripting Embedded Scripting Database Programming Artificial Intelligence Image …

Read More »

Design of Android – Security

Design of Android – Security

Design of Android: Android, under the hood, is a series of components working together to make the system work. Each component in the system is self-contained and focuses on performing whatever task it was designed to do. Each component focuses on security measures for itself and assumes that every other …

Read More »

Google Android OS – Security

Google Android OS – Security

Google Android OS: First, let’s look at the market leader, Android, in our exploration of mobile operating systems. Android took shape way back in 2003 at the hands of Android Inc., which was acquired by Google in 2005. From the beginning, the OS was designed to be mobile platform that …

Read More »

Mobile Security Models and Architectures

Mobile Security Models and Architectures

Mobile OS Models and Architecture: The rapid adoption of the mobile device in the workplace has had two obvious consequences: an increase in productivity and capability as well as a corresponding rise in the number of security risks. The designers of devices have frequently made a tradeoff between security and …

Read More »