How to make Toast message?
Monday, February 28, 2022 in Android
Categories:
less than a minute
You can find a code sample to make a Toast message in Android Studio Example-1 val text = "Hello toast!" val duration = Toast.LENGTH_SHORT val toast = Toast.makeText(applicationContext, text, duration) toast.show() or you can call directly …
Markdown Syntax Guide
Wednesday, January 01, 2020 in Posts
2 minute read
This article offers a sample of basic Markdown syntax that can be used in Hugo content files. Basic Syntax Headings # Heading 1 ## Heading 2 ### Heading 3 #### Heading 4 ##### Heading 5 ###### Heading 6 Heading 2 Heading 3 Heading 4 Heading 5 Heading …
Text Filters with Linux (head tail sort nl wc uniq sed tac cut)
Sunday, May 08, 2016 in Linux
Categories:
9 minute read
Filter means an input for the Linux command line. It can be generated by a program, read from a file, or entered by the user. After this filter entry, the necessary actions are taken and the main document is processed according to the filter. The …
Kali Linux General Introduction
Tuesday, April 26, 2016 in Linux
Categories:
2 minute read
As activities in the field of information systems security, testing and examination become more widespread, the number of Operating Systems developed according to emerging needs also increases. Some Linux distributions are available on CD/DVD etc. …
Fish – A Different Approach to the Command Line
Tuesday, April 26, 2016 in Linux
Categories:
2 minute read
When it comes to Linux, one of the first things that comes to mind is probably the command line and terminal. The shell that processes the statements you write on the command line is offered to users in different versions. Bash, Dash, Zsh, Csh can be …
Learning our IP Address from the terminal
Monday, April 25, 2016 in Linux
Categories:
less than a minute
Sometimes, when working in the terminal (bash, SSH etc.) you may need to learn the public IP address assigned to your modem by your ISP. You may need this IP address to use it in a program or to make adjustments. In our article, we will see how we …
Information Gathering Procedures -2- Target Selection
Sunday, April 24, 2016 in Cybersecurity
Categories:
4 minute read
We have started the Information Gathering process, which is the 2nd Phase of Penetration Testing, with our article found at this link. We will try to explain the Target Selection title, which is one of the main topics we mentioned in that article. …
Linux RAM SWAP Balance
Saturday, April 23, 2016 in Linux
Categories:
3 minute read
RAM SWAP Balance How effectively do you use your computer’s RAM (Random Access Memory) power? You heard from your friend how fast and much more stable computers with Linux operating systems are and you installed them. However, you could not …
Send Process to Background in Linux Terminal (Ctrl+Z and fg)
Saturday, April 23, 2016 in Linux
Categories:
3 minute read
If there is Shell, there is definitely a solution, you just may not know it yet. If you have a problem or a process that you find difficult, rest assured that others have also experienced it. Some of them have found the job easy. Some of them did not …
Deleting with Linux Shred Command
Friday, April 22, 2016 in Linux
Categories:
4 minute read
Did you know that the deletion process used in Linux and other operating systems does not actually delete your files? This article, in which we try to explain the subject a little, may be of interest to you. If you use visual interface, you surely …
13 Tips for Your Linux System
Thursday, April 21, 2016 in Linux
Categories:
4 minute read
We would like to point out that if you have a Linux system to take care of and want to rest your head comfortably, you should at least take the precautions we recommend below. 1-Have a general security policy You should create a security policy, even …
Ubuntu Alias Abbreviation Definition
Thursday, April 21, 2016 in Linux
Categories:
less than a minute
In this article, we showed how to shorten long commands that we constantly use on the Linux command line, using aliases. Although we demonstrated it using Ubuntu Operating system, it can also be used in other Linux distributions. Using Alias helps …
Cyberspace Definition and Actors
Wednesday, April 20, 2016 in Cybersecurity
Categories:
7 minute read
Technology and interconnected systems, which continue to become indispensable in every area of our lives, have caused a new concept to emerge in human history. Concepts that are used with the prefix cyber are used to express the technological …
Penetration Test Phases (Coordination -3)
Wednesday, April 20, 2016 in Cybersecurity
Categories:
3 minute read
Our articles explaining Penetration Testing processes continue. In this study, we will explain the targets** to be discussed in the Coordination article, which is the 1st Phase of the Penetration Testing Phases . As you know, the first part of the …
Penetration Testing Phases (Coordination – 2)
Monday, April 18, 2016 in Cybersecurity
Categories:
3 minute read
We have examined the general structure of the coordination processes, which is the 1st Phase during the Penetration Test preparations, in our article in this link. Now, we will examine in detail one of the issues that will be discussed during the …
Penetration Test Phases (Coordination -1)
Sunday, April 17, 2016 in Cybersecurity
Categories:
8 minute read
What are the Penetration Testing Phases? In our article titled ( see ), we examined the general definition and content of the phases. In this article, we will look at Phase 1, Coordination, in detail. In these articles we have prepared, we intend to …
Information Gathering Procedures -1- Basic Approach
Saturday, April 16, 2016 in Cybersecurity
Categories:
4 minute read
From this article, we are starting the 2nd Phase of Penetration Testing, Information Gathering processes and their details. We will follow the path of explaining the topics listed below in separate articles. You can review the general stages in this …
What are the Penetration Testing Phases?
Saturday, April 16, 2016 in Cybersecurity
Categories:
6 minute read
Tests performed to determine the current status of the information system used and the precautions to be taken are called Penetration Tests. The process referred to as Penetration Testing consists of 7 stages. Although Penetration Test Phases are …
Some Terms Used in the Field of Cyber Security
Wednesday, April 13, 2016 in Cybersecurity
Categories:
6 minute read
In this article, we want to briefly explain some expressions and terms used in the field of Cyber Security. The expressions and explanations here can be expanded. We prepared this article to summarize briefly. What is Information as Asset? …
Roadmap for Cyber Security Expert Candidates
Sunday, April 10, 2016 in Cybersecurity
Categories:
7 minute read
At the point technology has reached today, cyber security issues have begun to increase their importance. Trending news and issues now concern individual users as well as service providers. Secure service level and quality are at the top of the …