To keep readers updated

LATEST POSTS

Celal Erdik Celal Erdik

Passive Information Gathering in Network

As a result of the widespread use of internet technology, technology constantly renews itself and new systems emerge. The most common regulations of these technologies are devices such as uninterrupted web servers, firewalls, web application firewalls, IPS devices and Load Balancer.

Read More
Celal Erdik Celal Erdik

DOS Attacks on SSL Service

Important information (such as e-mail address, credit card information, ID number, username and password) must be transmitted encrypted during transmission. HTTP is a clear-text protocol and can be configured as HTTPS, protected by SSL/TLS. Cryptography algorithms can provide a certain level of protection depending on the strength of the algorithm.

Read More
Celal Erdik Celal Erdik

Blocking Malware with DNS Sinkhole

The DNS sinkhole method can be used to prevent malicious software from communicating with the command center or to detect infected systems. The sinkhole method can also be used to detect or neutralize the impact of botnets. In this article, the use of the DNS sinkhole method to prevent malware in corporate networks is discussed.

Read More