I am Social Engineer and Cyber Researcher.
My Hobby is to find flaws in a system. So, if I am in your system don't be worry I just helping people to build more safer network.
- Networking
- Penetration Testing
- PCI-DSS
- Intrusion detection/prevention systems
- Play with Firewalls
- Operating System Security
- Web Technologies
- Security Audits
In Parallel, I am working on quantum computing and exploring the new space of cyber-world and how to implement quantum cryptography protocols into the system.
In a democracy, power is given, not taken. But it is still power. Love, compassion, caring have no use for it. But it is fuel for greed, hostility, jealousy... All power corrupts. Take care which powers you allow democracy to wield.
-
🔠I’m currently working on Python for Networking and Security
-
🌱 I’m currently learning Make my self expert in Python and C++ for Cyber Security and Ethical Hacking
-
👯 I’m looking to collaborate on LinkedIn
-
🤝 I’m looking for help with Cyber Security, Embedded Programming and Penetration Testing
-
👨‍💻 All of my projects are available at https://github.com/users/aw-junaid/projects/
-
đź“ť I regularly write articles on https://awjunaid.com/
-
đź’¬ Ask me about Penetration Testing, Networking, Cyber Security, Cloud Security, Azure, AWS, Firebase, Apache
-
đź“« How to reach me [email protected]
-
đź“„ Know about my experiences https://cv.awjunaid.com
-
⚡ Facts Lazy, Insane Curiosity, Peace, Negative, Silence, Overthinking
- How does the parent process handle the exit status of a child process in UNIX
- Explain the circumstances under which a process becomes a zombie in UNIX
- Define zombie and orphan processes in the UNIX operating system
- Describe the role of the Chrome Task Manager in monitoring and managing processes
- How does the multiprocess model in Chrome improve security compared to single-process browsers