Skip to content

Ismaïl ALTAS

Portfolio & Blog

  • CategoriesExpand
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • LanguagesExpand
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Ismaïl ALTAS
Portfolio & Blog
  • Web

    CSS ile ilk renkler

    emel seviye HTML öğrendiğimize göre artık CSS derslerinin kapılarını arayalabiliriz. CSS nedir? Gaz ve Toz Bulutları ve Her şeye genel bir bakış Yazilim teknolojisi iki ana ayak üzerinde ilerlemektedir “Yazılım” ve “Donanım” (Software & Hardware) Yazılım ayağındaki parmaklardan önemli iki tanesi “Front end” diğeri de “Back end” dir. Yani bilgisayarımızda çalıştırdığımız her programın yada gezindiğimiz…

    Read More CSS ile ilk renklerContinue

  • Cyber Security

    Vue Js Music Player App

    Here a small vue app to play music online, the list is manuelly arranged. TO DO for this app can be creating a search bar and making the music list dynamic. View the end product : LInk : https://thirsty-meitner-361acf.netlify.app/ GitHub : https://github.com/altasismail/Mars-Attack_MusicPlayer To download the project : https://github.com/altasismail/Mars-Attack_MusicPlayer.git Live App view :

    Read More Vue Js Music Player AppContinue

  • Cyber Security

    Wireshark and tcpdump

    Wireshark and tcpdump are powerful tools used for network analysis and troubleshooting. To understand it better and visualise these tools, let’s dive into the details of Wireshark and compare it with tcpdump through a relatable story. The Tale of Two Network Detectives Imagine two detectives, Wanda (Wireshark) and Tom (tcpdump), who specialize in solving network…

    Read More Wireshark and tcpdumpContinue

  • Cyber Security

    Proxy vs Reverse Proxy vs Load Balancer from TechWorld with Nana

    Thank you Nana for clearly explaining the concepts and practices for Proxy, Reverse Proxy and Load Balancer. I wish you all the best. You add a great value to the community. Whether you are an engineer or just curious about how the internet works behind the scenes, in this video we will break down this…

    Read More Proxy vs Reverse Proxy vs Load Balancer from TechWorld with NanaContinue

  • Cyber Security

    A Simple Cyber Security Framework by Loi Liang Yang

    Uncover the essentials of cybersecurity architecture in this tutorial. Learn how to design robust architectures that align with the NIST Cybersecurity Framework of Identify, Protect, Detect, Respond and Recover. Whether you’re building from scratch or strengthening your existing IT architecture, this video provides practical insights to enhance your cybersecurity posture. Mr. Loi Liang Yang is…

    Read More A Simple Cyber Security Framework by Loi Liang YangContinue

  • Cyber Security

    in need of a VPN Service?

    Imagine a bustling city called Internetopolis, where information flows freely through the streets. In this city, everyone’s conversations and activities are visible to anyone who cares to look. This is how the regular internet works – open and potentially vulnerable. Now, picture a system of underground tunnels running beneath Internetopolis. These tunnels are the VPNs….

    Read More in need of a VPN Service?Continue

  • Cyber Security

    Network Communication Types

    Categorization of network types can be vary. In a detailed look, there may be 11 different types of network types: In an overal look, we can reduce this number upon functional and more practical characteristics. In this sense, what are the generally accepted types of communications on a network? Let’s explore the protocols used for…

    Read More Network Communication TypesContinue

  • Cyber Security

    Network; OSI model layers and comparision to TCP IP model

    TCP/IP model: A framework used to visualize how data is organized and transmitted across a network Transmission Control Protocol (TCP): An internet communication protocol that allows two devices to form a connection and stream data Open systems interconnection (OSI) model: A standardized concept that describes the seven layers computers use to communicate and send data…

    Read More Network; OSI model layers and comparision to TCP IP modelContinue

  • Cyber Security

    The TCP/IP model; key takeaways

    The TCP/IP model is a framework that describes how data is transmitted over networks, including the internet. Let me explain it through a story that anyone can understand, along with details about each layer. Imagine you’re sending a package to a friend in another country. The TCP/IP model is like the postal system that ensures…

    Read More The TCP/IP model; key takeawaysContinue

  • Cyber Security

    Incident and Vulnerability PlayBooks

    Incident and vulnerability playbooks are detailed guides that outline specific steps and procedures for responding to security incidents or addressing vulnerabilities. Let’s explore each type of playbook through an example fictional story: Incident Response Playbook: The DataGuard Breach DataGuard, a mid-sized financial services company, experiences a data breach. Their incident response team activates their playbook:…

    Read More Incident and Vulnerability PlayBooksContinue

Page navigation

Previous PagePrevious 1 … 4 5 6 7 8 Next PageNext

© 2026  | Ismaïl ALTAS

  • Categories
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • Languages
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Search