Skip to content

Asad Ijaz

Hey there, I'm Asad Ijaz Khattak, and I'm not your typical writer and blogger – I'm the voice behind the scenes at the renowned website, "networkustad.com." When it comes to the digital realm, I'm all about technology, networking, and cybersecurity. Picture this: I'm not just someone who writes about tech; I'm a certified expert in the field. I proudly hold the titles of Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). So, when I talk about networking, I'm not just whistling in the dark; I know my stuff! My website is like a treasure trove of knowledge. You'll find a plethora of articles and tutorials covering a wide range of topics related to networking and cybersecurity. It's not just a website; it's a learning hub for anyone who's eager to dive into the world of bits, bytes, and secure connections. And here's a fun fact: I'm not a lone wolf in this journey. I'm a proud member and Editor of Team NetworkUstad. Together, we're on a mission to empower people with the knowledge they need to navigate the digital landscape safely and effectively. So, if you're ready to embark on a tech-savvy adventure, stick around with me, Asad Ijaz Khattak. We're going to unravel the mysteries of technology, one article at a time!"

4 Comments

  1. Spyware, Adware, and Scareware » Networkustad
    September 13, 2019 @ 4:08 pm

    […] the previous article, I discussed malware, including its type virus, worm, ransomware, trojan horses, logic bomb, back door, and rootkits. In […]

    Reply

  2. Vishing, Smishing, Pharming, and Whaling » Networkustad
    September 14, 2019 @ 5:17 pm

    […] The whaling attack is trick personal or corporate information through social engineering, email engineering, and content spoofing. The attackers may send an email from trusted sources and some attackers may create a malicious website especially. The attackers also the target’s name; their job titles etc. Whaling attacks usually depend on social engineering. The attackers may send hyperlinks or attachment to infect victims with malware. […]

    Reply

  3. 10 Things You Probably Didn't Know About Android System Webview
    January 21, 2021 @ 3:41 am

    […] to eliminate an Android System WebView from their devices or not? Although, the app itself is not a malware or suspicious program its existence in the app-list can be befuddling. Android System WebView is a program; designed to […]

    Reply

  4. Ways To Improve Email Security » NetworkUstad
    May 30, 2021 @ 11:51 pm

    […] you know that more than 90 per cent of cyber attacks on businesses and organizations start with a malicious or phishing email? As a result, businesses relying only on built-in security measures are at a […]

    Reply

Leave a Reply