ibrahim atasoyHow To Protect Yourself From Malware?You may be exposed to malware while browsing the Internet for fun or playing games, or simply transferring a small photo from another…Apr 7, 2023Apr 7, 2023
ibrahim atasoyGod of War: RagnarökGod of War: Ragnarok is an action adventure game developed by Santa Monica Studio. It will be published by Sony Interactive Entertainment…Apr 5, 2023Apr 5, 2023
ibrahim atasoyHow to throw DDoS? The 9 Best DDoS programsWhen working on a computer system, there are several vulnerabilities, such as intrusion into your system by others. These activities are…Apr 1, 2023Apr 1, 2023
ibrahim atasoyBuilding a Strong Start-Up“You can go surprisingly far just by not giving up. ‘ Famous entrepreneur Paul Graham (Lisp, Viaweb, Y Combinator) is one of the first…Mar 28, 2023Mar 28, 2023
ibrahim atasoyMAN IN THE MIDDLE ATTACKAttack methods such as MITM (MAN IN THE MIDDLE attack) can be done without the need for very serious network knowledge and we come across…Mar 27, 2023Mar 27, 2023
ibrahim atasoyLian-Yu TryHackMeMy name is Oliver Queen. For five years I was “stranded” on an island with only one goal… survive. Now I will fulfill my father’s dying…Mar 27, 2023Mar 27, 2023
ibrahim atasoyREST API FUZZINGWith the developing technology, applications are moving from platform to independent structure. In order to achieve this independence…Mar 25, 2023Mar 25, 2023
ibrahim atasoySSRF (Server Side Request Forgery)What is SSRF? SSRF (Server side request Forgery), which is “server-side request forgery” in Turkish, is the ability of attackers to send…Mar 25, 2023Mar 25, 2023
ibrahim atasoyCyber Intelligence and Cyber threat IntelligenceAbstract The word “intelligence” can be used in different languages in terms of “intelligence, information, information, news, newly…Mar 25, 2023Mar 25, 2023