You should try giving explanations for dummies.
I'd say a lot of users here would've seen the first one and read "asdf herpa derpderp full access to victims computer."
And I doubt many know what nmapping is.
Anyway, I'd say the first one because more users would be interested in it
I want to learn how to use nmap and find vulns inside systems.
I was going to do this like last year but lost motivation as i found that you could pretty much only find vulns in older computers such as xp and below?