Guven BoyrazApplication Security in Modern Software DevelopmentMore than year ago, I tweeted: “Consider that there may be electric engineers who have graduated from university without receiving any…Jul 28Jul 28
Guven BoyrazEndpoint Detection And Response EssentialsExplore the landscape of hacking, defense, and deployment in EDR with my book from Packt Publishing.May 21May 21
Guven BoyrazGDPR: 7 Game-Changing Concepts for Data Privacy by EU.In this article, I will provide you with a comprehensive understanding of the European Union Data Privacy Regulation. By the end of this…Apr 26Apr 26
Guven BoyrazAntivirus vs. EDR — Most Comprehensive Differences Guide on the InternetIn this article, I will unveil the fascinating timeline of the inception of antivirus solutions, exploring the intricate cat-and-mouse…Jan 61Jan 61
Guven BoyrazPASSWORD HACKINGIn this article, I will show you the ways that hackers get passwords and what can be done to keep your passwords safe.Mar 22, 20231Mar 22, 20231
Guven Boyraz18 Steps for Endpoint HardeningWhat is Endpoint Hardening, and which rules should be applied to mid or enterprise-level companies for healthy and secure operations?Jan 20, 20232Jan 20, 20232
Guven BoyrazWhat is Cyber Security?In this article, you will understand the definition of the cybersecurity, why is it important and what is some cybersecurity measurements?Jan 6, 2023Jan 6, 2023
Guven BoyrazPenetration Testing with MetasploitMetasploit is one of the most used penetration test tools for security professionals and hackers. In this article, I will explain the…Sep 28, 2022Sep 28, 2022
Guven BoyrazReverse Shell Attack with NetcatNetcat is a tool to get remote access from your target. In this article, I will show you how to use it and what you can do to prevent them.Sep 22, 20221Sep 22, 20221
Guven BoyrazHow to Access the Dark Web Safely?Do you worried about your privacy? This is the ultimate tutorial to access the dark web safely.Aug 31, 2022Aug 31, 2022