emel seviye HTML öğrendiğimize göre artık CSS derslerinin kapılarını arayalabiliriz. CSS nedir? Gaz ve Toz Bulutları ve Her şeye genel bir bakış Yazilim teknolojisi iki ana ayak üzerinde ilerlemektedir “Yazılım” ve “Donanım” (Software & Hardware) Yazılım ayağındaki parmaklardan önemli iki tanesi “Front end” diğeri de “Back end” dir. Yani bilgisayarımızda çalıştırdığımız her programın yada gezindiğimiz […]
Author: Ismail Altas
Vue Js Music Player App
Here a small vue app to play music online, the list is manuelly arranged. TO DO for this app can be creating a search bar and making the music list dynamic. View the end product : LInk : https://thirsty-meitner-361acf.netlify.app/ GitHub : https://github.com/altasismail/Mars-Attack_MusicPlayer To download the project : https://github.com/altasismail/Mars-Attack_MusicPlayer.git Live App view :
Wireshark and tcpdump
Wireshark and tcpdump are powerful tools used for network analysis and troubleshooting. To understand it better and visualise these tools, let’s dive into the details of Wireshark and compare it with tcpdump through a relatable story. The Tale of Two Network Detectives Imagine two detectives, Wanda (Wireshark) and Tom (tcpdump), who specialize in solving network […]
Proxy vs Reverse Proxy vs Load Balancer from TechWorld with Nana
Thank you Nana for clearly explaining the concepts and practices for Proxy, Reverse Proxy and Load Balancer. I wish you all the best. You add a great value to the community. Whether you are an engineer or just curious about how the internet works behind the scenes, in this video we will break down this […]
A Simple Cyber Security Framework by Loi Liang Yang
Uncover the essentials of cybersecurity architecture in this tutorial. Learn how to design robust architectures that align with the NIST Cybersecurity Framework of Identify, Protect, Detect, Respond and Recover. Whether you’re building from scratch or strengthening your existing IT architecture, this video provides practical insights to enhance your cybersecurity posture. Mr. Loi Liang Yang is […]
in need of a VPN Service?
Imagine a bustling city called Internetopolis, where information flows freely through the streets. In this city, everyone’s conversations and activities are visible to anyone who cares to look. This is how the regular internet works – open and potentially vulnerable. Now, picture a system of underground tunnels running beneath Internetopolis. These tunnels are the VPNs. […]
Network Communication Types
Categorization of network types can be vary. In a detailed look, there may be 11 different types of network types: In an overal look, we can reduce this number upon functional and more practical characteristics. In this sense, what are the generally accepted types of communications on a network? Let’s explore the protocols used for […]
Network; OSI model layers and comparision to TCP IP model
TCP/IP model: A framework used to visualize how data is organized and transmitted across a network Transmission Control Protocol (TCP): An internet communication protocol that allows two devices to form a connection and stream data Open systems interconnection (OSI) model: A standardized concept that describes the seven layers computers use to communicate and send data […]
The TCP/IP model; key takeaways
The TCP/IP model is a framework that describes how data is transmitted over networks, including the internet. Let me explain it through a story that anyone can understand, along with details about each layer. Imagine you’re sending a package to a friend in another country. The TCP/IP model is like the postal system that ensures […]
Incident and Vulnerability PlayBooks
Incident and vulnerability playbooks are detailed guides that outline specific steps and procedures for responding to security incidents or addressing vulnerabilities. Let’s explore each type of playbook through an example fictional story: Incident Response Playbook: The DataGuard Breach DataGuard, a mid-sized financial services company, experiences a data breach. Their incident response team activates their playbook: […]