Yiğit OkurThe Phish Scale: Improve the Information Security AwarenessPhishing Attack3 min read·Aug 8, 2023----
Yiğit OkurVulnerability Assessment and Penetration to Linux OS with NessusNessus is a vulnerability scanning program that is widely used in the cybersecurity community. It is free for personal and non-commercial…4 min read·Mar 8, 2022----
Yiğit OkurWhat is TCP/IP and how does it work?For two or more computers to interact with each other, certain protocols are required. TCP/IP is the most extensively used protocol suite…3 min read·Dec 29, 2021----
Yiğit OkurIntrusion Detection SystemsAt the present time, corporations must now give true information to their clients and business partners in a timely manner. At the same…7 min read·Jun 19, 2021----
Yiğit OkurChallenges of Modern DaysAs human beings, we have worked through the ages on how a more comfortable and more technological world could be possible. Every developing…5 min read·Jun 15, 2021----
Yiğit OkurEnvironmental IssuesEnvironmental problems, defined as disrupting nature ‘s balance, are one of today’s world’s most significant problems. As social life…4 min read·Oct 2, 2020----
Yiğit OkurEnvironmental Issues in SwedenOver the centuries, our world has faced some problems due to human factors. For instance, in these days, our Mother earth faces a lot of…4 min read·Oct 2, 2020----
Yiğit OkurData StructuresToday’s programming languages have many different data structures. These data structures can speed up our applications.9 min read·Oct 1, 2020----
Yiğit OkurSelecting the Right Data StructureToday’s programming languages have many different data structures. Using these data structures correctly instead of designing them from…1 min read·Oct 1, 2020----
Yiğit OkurSearch AlgorithmsSearch algorithms are a set of algorithms used to search for a specific data on a data structure. This data structure can be different…6 min read·Oct 1, 2020----