Skip to content

Ismaïl ALTAS

Portfolio & Blog

  • CategoriesExpand
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • LanguagesExpand
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Ismaïl ALTAS
Portfolio & Blog
  • Cyber Security

    Statefull and Stateless Firewalls in a nutshell

    Here for you, a breef explanation of network firewalls, focusing on stateful and stateless firewalls, and a small discussion on the role of intrusion detection and prevention systems. Network Firewalls A network firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier…

    Read More Statefull and Stateless Firewalls in a nutshellContinue

  • Software Testing

    Importance of Software Testing

    Here is a very beautiful neatly prepared youtube video from fireship channel.

    Read More Importance of Software TestingContinue

  • Cyber Security

    Lessons To Take From Thousands Years Old Wisdom?

    Around 544 BC, a child named Sun Wu was born into a world of constant conflict and political turmoil. Little did anyone know that this boy would grow to become one of history’s most renowned military strategists, known to the world as Sun Tzu. Sun Wu’s early life was steeped in the art of warfare. Born…

    Read More Lessons To Take From Thousands Years Old Wisdom?Continue

  • Cyber Security

    IP Spoofing Attack Types

    I’ll explain some common IP spoofing attacks using stories and examples that are easy to understand. 1. Man-in-the-Middle (MitM) Attack Imagine you’re passing notes to your friend in class, but the class bully intercepts them and pretends to be both you and your friend. Story: Sarah and Tom were chatting online about planning a surprise party…

    Read More IP Spoofing Attack TypesContinue

  • Cyber Security

    Common Types of Denial of Service (DoS) Attacks

    1. Volume-Based Attacks Imagine you’re trying to enter your favorite toy store, but suddenly a huge crowd of people rushes in, blocking the entrance. You can’t get in because there are too many people. That’s what a volume-based attack does to a website. Story: Little Timmy’s school website crashed on the day report cards were posted….

    Read More Common Types of Denial of Service (DoS) AttacksContinue

  • Cyber Security

    Major Cyber Attack Types Explained

    Here I will explain 20 major network attack types using analogies and stories. I will also provide simple ways to protect against each one. 1. Phishing Attack Imagine you’re fishing, but instead of catching fish, you’re trying to catch people’s secrets. That’s what phishing is like in the computer world. A Real Story: Little Timmy got…

    Read More Major Cyber Attack Types ExplainedContinue

  • Software Testing

    ISTQB Foundation study content for a Tester

    ISTQB Contents Software Testing is a systematic method that controls whether a software product matches expected requirements and that ultimate goal is to ensure that the final product is Defect free. Though thinking that a software is free of defects principaly considered as deceiving. And “Absence of defect through a testing process does not mean no defects are present.”…

    Read More ISTQB Foundation study content for a TesterContinue

  • Software Testing

    Test Tools

    “A test tool is a software product that supports one or more test activities, such as planning and control, specification, building initial files and data, test execution and test analysis.” Definition above is provided in the ISTQB foundation level dictionary. In phylosophy I feel it shoul be more than a software in the mind of…

    Read More Test ToolsContinue

  • Software Testing

    Use Case Testing

    Use Case Testing is a functional black box testing technique. It helps testers to identify test scenarios to exercise the whole system on each transaction basis from start to finish (“End to end testing“). It makes sure that the user performs its function successfully, without any interruption or error. Use case testing is not performed to determine the quality…

    Read More Use Case TestingContinue

  • Software Testing

    Possible Stansart Tasks For a Software Tester

    A software tester plays a crucial role in the software development lifecycle, focusing on evaluating and verifying the quality, functionality, and performance of software applications. Let’s explore the role of a software tester and their typical tasks in detail: What is a Software Tester? A software tester is a professional responsible for ensuring that software…

    Read More Possible Stansart Tasks For a Software TesterContinue

Page navigation

Previous PagePrevious 1 2 3 4 5 … 8 Next PageNext

© 2025  | Ismaïl ALTAS

  • Categories
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • Languages
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Search