Fish – A Different Approach to the Command Line
Tuesday, April 26, 2016 in Linux
Categories:
2 minute read
When it comes to Linux, one of the first things that comes to mind is probably the command line and terminal. The shell that processes the statements you write on the command line is offered to users in different versions. Bash, Dash, Zsh, Csh can be …
Learning our IP Address from the terminal
Monday, April 25, 2016 in Linux
Categories:
less than a minute
Sometimes, when working in the terminal (bash, SSH etc.) you may need to learn the public IP address assigned to your modem by your ISP. You may need this IP address to use it in a program or to make adjustments. In our article, we will see how we …
Information Gathering Procedures -2- Target Selection
Sunday, April 24, 2016 in Penetration Testing
Categories:
4 minute read
We have started the Information Gathering process, which is the 2nd Phase of Penetration Testing, with our article found at this link. We will try to explain the Target Selection title, which is one of the main topics we mentioned in that article. …
Linux RAM SWAP Balance
Saturday, April 23, 2016 in Linux
Categories:
3 minute read
RAM SWAP Balance How effectively do you use your computer’s RAM (Random Access Memory) power? You heard from your friend how fast and much more stable computers with Linux operating systems are and you installed them. However, you could not …
Send Process to Background in Linux Terminal (Ctrl+Z and fg)
Saturday, April 23, 2016 in Linux
Categories:
3 minute read
If there is Shell, there is definitely a solution, you just may not know it yet. If you have a problem or a process that you find difficult, rest assured that others have also experienced it. Some of them have found the job easy. Some of them did not …
Deleting with Linux Shred Command
Friday, April 22, 2016 in Linux
Categories:
4 minute read
Did you know that the deletion process used in Linux and other operating systems does not actually delete your files? This article, in which we try to explain the subject a little, may be of interest to you. If you use visual interface, you surely …
13 Tips for Your Linux System
Thursday, April 21, 2016 in Linux
Categories:
4 minute read
We would like to point out that if you have a Linux system to take care of and want to rest your head comfortably, you should at least take the precautions we recommend below. 1-Have a general security policy You should create a security policy, even …
Ubuntu Alias Abbreviation Definition
Thursday, April 21, 2016 in Linux
Categories:
less than a minute
In this article, we showed how to shorten long commands that we constantly use on the Linux command line, using aliases. Although we demonstrated it using Ubuntu Operating system, it can also be used in other Linux distributions. Using Alias helps …
Cyberspace Definition and Actors
Wednesday, April 20, 2016 in Cybersecurity
Categories:
7 minute read
Technology and interconnected systems, which continue to become indispensable in every area of our lives, have caused a new concept to emerge in human history. Concepts that are used with the prefix cyber are used to express the technological …
Penetration Test Phases (Coordination -3)
Wednesday, April 20, 2016 in Penetration Testing
Categories:
3 minute read
Our articles explaining Penetration Testing processes continue. In this study, we will explain the targets** to be discussed in the Coordination article, which is the 1st Phase of the Penetration Testing Phases . As you know, the first part of the …
Penetration Testing Phases (Coordination – 2)
Monday, April 18, 2016 in Penetration Testing
Categories:
3 minute read
We have examined the general structure of the coordination processes, which is the 1st Phase during the Penetration Test preparations, in our article in this link. Now, we will examine in detail one of the issues that will be discussed during the …
Penetration Test Phases (Coordination -1)
Sunday, April 17, 2016 in Penetration Testing
Categories:
8 minute read
What are the Penetration Testing Phases? In our article titled ( see ), we examined the general definition and content of the phases. In this article, we will look at Phase 1, Coordination, in detail. In these articles we have prepared, we intend to …
Information Gathering Procedures -1- Basic Approach
Saturday, April 16, 2016 in Penetration Testing
Categories:
4 minute read
From this article, we are starting the 2nd Phase of Penetration Testing, Information Gathering processes and their details. We will follow the path of explaining the topics listed below in separate articles. You can review the general stages in this …
What are the Penetration Testing Phases?
Saturday, April 16, 2016 in Penetration Testing
Categories:
6 minute read
Tests performed to determine the current status of the information system used and the precautions to be taken are called Penetration Tests. The process referred to as Penetration Testing consists of 7 stages. Although Penetration Test Phases are …
Some Terms Used in the Field of Cyber Security
Wednesday, April 13, 2016 in Cybersecurity
Categories:
6 minute read
In this article, we want to briefly explain some expressions and terms used in the field of Cyber Security. The expressions and explanations here can be expanded. We prepared this article to summarize briefly. What is Information as Asset? …
Roadmap for Cyber Security Expert Candidates
Sunday, April 10, 2016 in Cybersecurity
Categories:
7 minute read
At the point technology has reached today, cyber security issues have begun to increase their importance. Trending news and issues now concern individual users as well as service providers. Secure service level and quality are at the top of the …
23 Tips for Digital Spring Cleaning
Friday, April 08, 2016 in Cybersecurity
Categories:
9 minute read
We would like to remind you that we need to do digital spring cleaning by taking as an example the spring cleaning we do in our homes with the arrival of spring. The suggestions we have expressed in this article are prepared to increase the level of …
Which Linux Distribution is Right for You?
Sunday, April 03, 2016 in Linux
Categories:
2 minute read
If we were to group computer users according to the operating systems they use, I think there would be many groups and the intersection of these groups. After separating Windows and Mac OS X users, you can also divide Linux users into subgroups …
What is systemd? What is its general structure?
Sunday, April 03, 2016 in Linux
Categories:
5 minute read
If you are using Linux Operating System, you must have come across the term “systemd”. At least you must have come across systemd news. In our search on this subject, we had difficulty finding a detailed Turkish source. For this reason, we did a …
systemd Tools – General Usage Areas
Sunday, April 03, 2016 in Linux
Categories:
4 minute read
Nowadays, Debian, Fedora, Red Hat, Ubuntu and ArchLinux etc. Linux operating systems, which are considered the main distribution , have started to use systemd. Developments show that its use will become widespread. Linux users will need to improve …