23 Tips for Digital Spring Cleaning
Friday, April 08, 2016 in Cybersecurity
Categories:
9 minute read
We would like to remind you that we need to do digital spring cleaning by taking as an example the spring cleaning we do in our homes with the arrival of spring. The suggestions we have expressed in this article are prepared to increase the level of …
Which Linux Distribution is Right for You?
Sunday, April 03, 2016 in Linux
Categories:
2 minute read
If we were to group computer users according to the operating systems they use, I think there would be many groups and the intersection of these groups. After separating Windows and Mac OS X users, you can also divide Linux users into subgroups …
What is systemd? What is its general structure?
Sunday, April 03, 2016 in Linux
Categories:
5 minute read
If you are using Linux Operating System, you must have come across the term “systemd”. At least you must have come across systemd news. In our search on this subject, we had difficulty finding a detailed Turkish source. For this reason, we did a …
systemd Tools – General Usage Areas
Sunday, April 03, 2016 in Linux
Categories:
4 minute read
Nowadays, Debian, Fedora, Red Hat, Ubuntu and ArchLinux etc. Linux operating systems, which are considered the main distribution , have started to use systemd. Developments show that its use will become widespread. Linux users will need to improve …
systemd – Getting started with systemctl
Sunday, April 03, 2016 in Linux
Categories:
3 minute read
Let’s start examining the systemctl tool, one of the tools mentioned in the previous introduction and general usage articles on systemd . As you know, the systemctl tool is used to control systemd itself and its service manager. It is the …
Brief History of Linux
Saturday, April 02, 2016 in Linux
Categories:
3 minute read
An article for those who want to read a brief historical development of Linux Operating Systems. 1969 The beginnings of all modern operating systems used today date back to 1969, when Dennis Ritchie and Ken Thompson developed the C programming …
Password policies for Linux
Saturday, April 02, 2016 in Linux
Categories:
3 minute read
The majority of Linux users regularly install security updates and use the latest version. As far as we know, they are sensitive and careful. But this sensitivity and attention alone may not be enough. If you do not have a secure password policy that …
What is the difference between apt-get update / upgrade / dist-upgrade?
Friday, April 01, 2016 in Linux
Categories:
4 minute read
If you have Ubuntu oran operating system that uses the apt package manager, you must have used apt-get update and similar commands. We will show that although the apt-get update, apt-get upgrade and apt-get dist-upgrade commands are similar to each …
What is Public Key Cryptography?
Thursday, March 31, 2016 in Cybersecurity
Categories:
3 minute read
In this article, we tried to explain the public/closed key encryption method that many of us have heard of but have not used. Let us state from the beginning that it is not a how-to document. We are just trying to explain the working logic. ENTRANCE: …
5 Important Determinations for Personal Information Security
Saturday, January 16, 2016 in Cybersecurity
Categories:
4 minute read
We are no longer surprised when we come across news about cyber attacks and personal information security violations. They’re becoming so commonplace you might not even be reading them. Don’t forget that one day you, too, may take part in …