We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]
Devamını Oku
Modernize your data infrastructure with fully managed, purpose-built databases Choose the right purpose-built engine. Use case-driven, highly scalable, distributed applications suited to your specific needs. AWS offers 15+ purpose-built engines to support diverse data models, including relational, key-value, document, in-memory, graph, time series, wide column, and ledger databases. Achieve performance […]
Devamını Oku
SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]
Devamını Oku
Digitization of the city is heralded as the bottom-up empowerment of its citizens. But who defines citizenship as digital technology infiltrating everything from personalized experience to the unimagined potential of networked urban space? Mark Dean unpacks recent academic literature that questions citizens’ rights in the hyper-connected city. Improving the smart city for […]
Devamını Oku
OpenSSL is a software library that provides cryptographic functionality, including secure communications over computer networks. It is widely used to implement the secure sockets layer (SSL) and transport layer security (TLS) protocols, which are used to establish secure connections between networked computers. OpenSSL is used in many software applications and […]
Devamını Oku
Dominos Pizza’nın Kişisel Verileri Koruma Kuruluna ilettiğine göre, 3 müşteri ve 1 eski çalışanı verileri ele geçirildi. Veriler arasında müşterilerin doğum yılı, ad, soyad, cep numarası ve e-posta adresi yer alıyor. Kişisel Verileri Koruma Kurumu’nun yayınladığı bir duyuruya göre Domino’s Pizza’da yaşanan KVKK ihlali 180 bin kişiyi etkiledi. Kamuoyu Duyurusu (Veri İhlali […]
Devamını Oku
AWS Kinesis Amazon Kinesis is a fully managed service that Amazon Web Services (AWS) provides for real-time processing and analyzing streaming data. It enables you to collect, process, and analyze large volumes of streaming data in real-time from various sources such as social media, logs, IoT devices, and clickstreams. Amazon […]
Devamını Oku
AWS Elastic File System (EFS) is a fully managed, scalable, and highly available file storage service that Amazon Web Services (AWS) provides. EFS allows you to create and manage file systems that can be accessed by multiple Amazon Elastic Compute Cloud (EC2) instances simultaneously, providing shared file storage for your […]
Devamını Oku
When it comes to securing your AWS environment, there are several options available to you. One such option is AWS Shield, a managed Distributed Denial of Service (DDoS) protection service offered by Amazon Web Services (AWS). We will explore what AWS Shield is, why it is used, and the competitors […]
Devamını Oku
Amazon GuardDuty is a threat detection service offered by Amazon Web Services (AWS) that continuously monitors your AWS accounts and workloads for malicious or unauthorized activity. GuardDuty is a managed service that analyzes billions of events across multiple AWS data sources, including VPC flow logs, CloudTrail logs, and DNS logs, […]
Devamını Oku