PinnedBurak BozacıMigration to CloudIn today’s world, many organizations, communities, or individuals are inclined towards transitioning to the cloud with the aim of creating…5 min read·Dec 15, 2023--1--1
PinnedBurak BozacıinInfoSec Write-upsOlympus Walkthrough [THM]-DetailedSUMMARY10 min read·Feb 21, 2023----
Burak BozacıUUID SpecificationsImagine you are writing a license validation software. Or you want to take action against end-users being enumerated. We may need UUID…5 min read·Jul 2, 2023----
Burak BozacıinCoding WizardsLinux Black Screen On BootBeing a Linux lover comes with some responsibilities. One of these responsibilities is to catch and resolve bugs. In this post, I will…2 min read·Nov 19, 2022----
Burak BozacıinCoding WizardsSystem Architecture For Cyber SecurityIn order to determine efficient attack vectors, we should have deep good understanding about System Architecture. With this we will be able…3 min read·Oct 9, 2022--4--4
Burak BozacıinCoding WizardsOSI Model For Cyber SecurityTo be able to attack and defend effectively, we need to have deeply understanding osı model. Open Systems Interconnection model (OSI…3 min read·Jun 27, 2022----