Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a...
Fady S. Ghatas Articles
Everything is vulnerable : Introduction
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to...
White Hat Hacking : Microsoft XSS & malicious payloads
This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of...
White Hat Hacking : AT&T solr admin panel bypassing.
I can't upload this vulnerability video as It contains sensitive data about AT&T server. ( Local paths, Linux usernames, etc )...
Sorting Algorithms Comparison : Selection Sort Vs Insertion Sort Vs Merge Sort.
UPDATE : Check this more general comparison ( Bubble Sort Vs Selection sort Vs Insertion Sort Vs Merge Sort Vs Merge Sort Vs Quick Sort )...