API (Application Programming Interface) It is a set of protocols, routines, and tools for building software and applications. APIs specify how software components should interact, allowing them to communicate with each other. REST APIs are a type of API that uses RESTful principles. REST API (Representational State Transfer Application Programming […]
Devamını Oku
Cloudflare is a web performance and security company that provides a content delivery network (CDN), distributed domain name server (DNS) services, and various security solutions for protecting websites and web applications. The Cloudflare CDN helps to speed up websites and applications by caching their content on a global network of […]
Devamını Oku
Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core itself. Suhosin is implemented as a PHP extension and offers several security features that can be fine-tuned through configuration options. Suhosin’s […]
Devamını Oku
We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]
Devamını Oku
Modernize your data infrastructure with fully managed, purpose-built databases Choose the right purpose-built engine. Use case-driven, highly scalable, distributed applications suited to your specific needs. AWS offers 15+ purpose-built engines to support diverse data models, including relational, key-value, document, in-memory, graph, time series, wide column, and ledger databases. Achieve performance […]
Devamını Oku
SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]
Devamını Oku
Digitization of the city is heralded as the bottom-up empowerment of its citizens. But who defines citizenship as digital technology infiltrating everything from personalized experience to the unimagined potential of networked urban space? Mark Dean unpacks recent academic literature that questions citizens’ rights in the hyper-connected city. Improving the smart city for […]
Devamını Oku
OpenSSL is a software library that provides cryptographic functionality, including secure communications over computer networks. It is widely used to implement the secure sockets layer (SSL) and transport layer security (TLS) protocols, which are used to establish secure connections between networked computers. OpenSSL is used in many software applications and […]
Devamını Oku
Dominos Pizza’nın Kişisel Verileri Koruma Kuruluna ilettiğine göre, 3 müşteri ve 1 eski çalışanı verileri ele geçirildi. Veriler arasında müşterilerin doğum yılı, ad, soyad, cep numarası ve e-posta adresi yer alıyor. Kişisel Verileri Koruma Kurumu’nun yayınladığı bir duyuruya göre Domino’s Pizza’da yaşanan KVKK ihlali 180 bin kişiyi etkiledi. Kamuoyu Duyurusu (Veri İhlali […]
Devamını Oku
AWS Kinesis Amazon Kinesis is a fully managed service that Amazon Web Services (AWS) provides for real-time processing and analyzing streaming data. It enables you to collect, process, and analyze large volumes of streaming data in real-time from various sources such as social media, logs, IoT devices, and clickstreams. Amazon […]
Devamını Oku