Yiğit OkurThe Phish Scale: Improve the Information Security AwarenessPhishing AttackAug 8, 2023Aug 8, 2023
Yiğit OkurVulnerability Assessment and Penetration to Linux OS with NessusNessus is a vulnerability scanning program that is widely used in the cybersecurity community. It is free for personal and non-commercial…Mar 8, 2022Mar 8, 2022
Yiğit OkurWhat is TCP/IP and how does it work?For two or more computers to interact with each other, certain protocols are required. TCP/IP is the most extensively used protocol suite…Dec 29, 2021Dec 29, 2021
Yiğit OkurIntrusion Detection SystemsAt the present time, corporations must now give true information to their clients and business partners in a timely manner. At the same…Jun 19, 2021Jun 19, 2021
Yiğit OkurChallenges of Modern DaysAs human beings, we have worked through the ages on how a more comfortable and more technological world could be possible. Every developing…Jun 15, 2021Jun 15, 2021
Yiğit OkurEnvironmental IssuesEnvironmental problems, defined as disrupting nature ‘s balance, are one of today’s world’s most significant problems. As social life…Oct 2, 2020Oct 2, 2020
Yiğit OkurEnvironmental Issues in SwedenOver the centuries, our world has faced some problems due to human factors. For instance, in these days, our Mother earth faces a lot of…Oct 2, 2020Oct 2, 2020
Yiğit OkurData StructuresToday’s programming languages have many different data structures. These data structures can speed up our applications.Oct 1, 2020Oct 1, 2020
Yiğit OkurSelecting the Right Data StructureToday’s programming languages have many different data structures. Using these data structures correctly instead of designing them from…Oct 1, 2020Oct 1, 2020
Yiğit OkurSearch AlgorithmsSearch algorithms are a set of algorithms used to search for a specific data on a data structure. This data structure can be different…Oct 1, 2020Oct 1, 2020