Omer Faruk SanlialpEmail Gateway SecurityOne of the most popular attack type for cyber criminals are phishing attacks. In my previous articles, I mention that “What is Phishing…Sep 30, 2023Sep 30, 2023
Omer Faruk SanlialpExplain the threat landscape (Exercise)Threat landscape is comprised of three components:Sep 26, 2023Sep 26, 2023
Omer Faruk SanlialpHow To Manage File Permissions in Linux For Users, Groups, and OthersAs a Linux user, it is important to understand how to manage file permissions in order to secure your system and protect your data. File…Dec 28, 2022Dec 28, 2022
Omer Faruk SanlialpWhat is Malware and Malware Types?Malware, short for malicious software, is any software designed to harm or exploit computer systems. Malware can take many forms, including…Dec 27, 2022Dec 27, 2022
Omer Faruk SanlialpTOP 3 Phishing AttacksPhishing attacks are a type of cybercrime in which attackers use fake emails, text messages, or websites to trick people into giving them…Dec 27, 2022Dec 27, 2022
Omer Faruk SanlialpWhat is Phishing Attacks? How to Prevent PhishingPhishing attacks are a type of cyber-crime in which attackers send fake emails or text messages, or create fake websites, in an attempt to…Dec 27, 2022Dec 27, 2022
Omer Faruk SanlialpHow can you access your dynamic home IP with a domain name?Let’s say that, you have a home server or PC that has a VM, which is running your cyber security lab environment, and you want to access it…Feb 27, 2022Feb 27, 2022
Omer Faruk SanlialpSwitching IPv4 to IPv6 ImplementationToday, the internet is one of the most necessary product for communication, education, and health. To provide this service, internet…Jan 2, 2022Jan 2, 2022