Kayıtlar

Ethical Hacking “Offensive & Defensive” by Ömer Çıtak (BOOK REVIEW)

Resim
 Ethical Hacking “Offensive & Defensive” About the Author: He is the founder of StrixEye (  It's journey was initiated by three entrepreneurs to provide a proactive solution in web-app security domain.)  He lives living in Istanbul and is involved in Computer Science since 2010. Since then, he has been working in the area of Software Development (usually web) and Cyber Security. He is a free software partisan and made a lot of  contributions to the community. About The Book: The book starts by explaining basic principles like the goals and orientation of hackers,  basically dividing them into 2 as Black Hat and White Hat. Black hats can use the techniques and methods they learn for their own benefit as well as to harm other people. White hats learn the same techniques and methods as black hats. black hats try to protect systems so they don't harm anyone. This book covers the basics of hacking from both black hat and white hat perspectives. It explains how a technique used b

IT and Ethics (Week 15)

Resim
 ETHICAL EGOISM Ethical Egoism or Egoism in Ethics is a philosophical theory, according to which, a moral decision made by an individual should be only considerable if its self-beneficiary. To put it simply it is a way of thinking that considers a decision viable only if the decision maker is benefited (the decision itself is in their interest). Although, like other philosophical terms, it can be difficult to grasp at first, we can break it down to two parts to understand it better. Individual Ethical Egoism: The position of the  individual   ethical   egoist  may be  expressed  as: “All  individuals   should  do what is in my interests.”  This is   in fact   ethical   egoism , but it is  impossible  to universalize ( since  it makes  fundamental  reference to a  specific   person ).  Hence , it is  arguably  not an  moral   guideline  at all. Universal Ethical Egoism: Universal ethical egoism is expressed in this principle: “All people should do what is in their own interests.” Unlike

A Different Kind of IT: Accessibility and Assistive Technology (Week 14)

Resim
  GENIUSES DONT HAVE LIMITATIONS People are different and some have physical limitations. The technology today, however, is advance to the extent that even people with serious physical disabilities can use computers without needing the help of anyone. In fact, many people with disabilities actually are really good at doing so and did many contributions that many can only dream of. One example of them is famous scientist and cosmologist Stephen Hawking. A Slight Background: Stephen William Hawking (8 January 1942 – 14 March 2018) was an English theoretical physicist, cosmologist, and author who, at the time of his death, was director of research at the Centre for Theoretical Cosmology at the University of Cambridge. Between 1979 and 2009, he was the Lucasian Professor of Mathematics at the University of Cambridge. Intel and the Genius: Stephen  Hawking  and Gordon Moore, the cofounder of Intel , First  met   at a conference in 1997. Moore  noticed  that Hawking's computer, which he 

A Practical Example: the Story of Linux (Week 13)

Resim
  "LINUX AND HIS FRIENDS" As I am utilizing Windows as my "daily driver" I might not be as experienced in Linux as many other IT specialists, but in this week's blog we will cover two major distributions of Linux and the differences between them in my humble opinion. Desktop Environments: Both Ubuntu and Fedora utilize GNOME desktop environments by default, there is only a slight difference Fedora:  Fedora uses the stock GNOME interface Ubuntu:  Ubuntu has customized its GNOME interface to look more like the old "Unity Desktop"  Hardware Support: Linux as a whole has its fair share of driver issues and incompatibilities and both Ubuntu and Fedora suffer from that. However, Ubuntu: Provides an easier way to install necessary proprietary drivers which results in a more user friendly interface and better hardware support Fedora: Fedora on the other hand chooses to stick to open source software, thus making it challenging to update/install drivers Windows

The Historical Hackerdom (Week 12)

Resim
 NOT ALL HACKERS ARE THE SAME In key terms, a hacker is defined as  a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. But hackers are more than that, they have a cute personality. All jokes aside, hackers are usually defined by their "hats" which either is a representation of their goals or how experienced they are. Whether it is considered ethical or not, every hacker has their own purpose thereby making it difficult for us to define them under one simple term. So lets look at the "Hats" and give brief explanations on what they mean. Black Hat: Black hat hackers are the criminals of the cyber world, they use their knowledge of computing in a bad way whether it is breaking into a system unauthorized, stealing or leaking data, scamming or phishing people or demanding ransoms for the data they collected White Hat: Then there is White hat hackers w

Censorship, Privacy and the Internet (Week 11)

Resim
  In this week's blog I am going to talk about the role of censorship and privacy in our lives and will try to give examples from different perspectives. Act 1 (cen***ship) : You can find a lot of examples of censorship from all around the world and from all aspects of life. Although to some degree censorship can be useful and can prevent harmful activity from spreading, overusing it for propaganda and subjective morals is unacceptable. In this example I am going to talk about the censorship system in Turkmenistan and how it is used to oppress freedom of speech and ruins many social aspects of life in a whole country. Some people may think that their country is the harshest in terms of censorship and limitations, Your view can change if you explore more about what happens in Turkmenistan since 2006, when the current president Gurbanguly Berdymukhamedov rose to power. Today we are going to take a look at the censorship of media in Turkmenistan. The government agencies ruled by the c