MakeUseOf

Fatih Küçükkarakurt-Staff Writer for Security

Fatih Küçükkarakurt

Staff Writer for Security

About Fatih Küçükkarakurt

Fatih is a freelance security researcher, penetration tester, and malware analyst. Since 2017, he has been actively working with many different software languages and technologies, especially C, C++, Python, and x86 Assembly. He has reported vulnerabilities of more than 100 large companies. He continues his research as an engineer dealing with operating systems and cloud architecture.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
An Intel CPU with AMT support 1
Can Your Computer Be Accessed Remotely While It’s Off?

Can a hacker get into your PC when it's powered down? Yes, it's possible; fort instance, using Intel's Active Management Technology...

A black MacBook monitor showing CSS code 1
CSS
5 Ways to Learn HTML and CSS With Real UI Challenges

Follow these strategies to unlock your web development skills with interactive learning, creative challenges, and practical experience.

woman fixing cables in a data centre feature 1
What Is Half-Duplex and Full-Duplex and How Does It Affect Your Router?

Wi-Fi and communication are shaped by duplexing. But what is duplexing, and how does it affect your communication?

A child using safe internet with his parent 1
An Introduction for Parents Talking to Children About Online Safety

How do you keep kids safe online? It's a tricky thing to master, so here's a guide to approaching cybersecurity with your youngsters.

A woman stands next to a server rack holding a laptop. 1
VB.NET SQL Examples for Querying Databases Efficiently

Discover how to issue the most common SQL commands using VB.NET.

hackers targetting a docker container 1
An In-Depth Introduction to DDOS Defense Strategy: How to Protect Against Botnet Attacks

When many machines target your site or servers, your systems can all come crashing down. You need a plan.

ubuntu-static-ip-settings 1
How to Configure Static IP Address on Ubuntu 22.04 LTS and 22.10

Switching from dynamic IP allocation to static IP addresses is easy on Ubuntu 22.04 "Jammy Jellyfish" and 22.10.

A router 1
What Is Port Scanning and How Does It Work?

Is it safe to leave your ports open?

hacking into bluetooth laptop smartphone coding 1
Is Mobile Hacking Still a Big Threat in 2023?

We all try to protect our laptops and PCs from hackers, but are our smartphones also at risk?

HTML codes with ARIA attributes 1
How to Use ARIA (Accessible Rich Internet Applications) in HTML and CSS

Small tweaks to your HTML can bring large benefits to your readers.

A chip keychain representing digital keys 1
Why Digital Car Keys Are Not Safe and Secure

Some car manufacturers allow you to unlock and start your vehicle using your phone, but is that safe? Can digital car keys be hacked?

Screen of a tool used for SIEM 1
What Is SIEM and How Can You Use It to Optimize Your Security?

Keeping track of security threats and flaws is difficult. That's why you need Security Information and Event Management.

An attacker trying to gain access to a computer system 1
A Beginner's Guide to Supervising Access to Computer Systems

Computer systems store a lot of important data, so how is such information actually kept secure? It ultimately comes down to who you give access to...

A hacker using artificial intelligence to crack passwords 1
Yes, AI Can Crack Your Password, but Can You Prevent It?

Artificial intelligence can be used to crack your passwords: here's how it works and how you can protect yourself from the AI threat.

Penetration tester analyzes a bug bounty system 1
Ethical Hacking: What Are the Stages of Penetration Testing?

How do cybercriminals hack into systems? How can you protect against them? Ethical hackers can show you via pentests.

A sound designer who designs the sound on the Mini Piano 1
How to Become a Sound Designer: A Beginner's Guide

If you want to be a sound designer, we've written this guide to help you out.

Woman smiling at a smartphone 1
Threads vs. Mastodon: Which Is Best?

Between Threads and Mastodon, which seems to be the best Twitter alternative?

a developer using a state management control plugin 1
An Introduction to Pinia in Vue.js

Create simple, state-based apps with ease using this JavaScript library.

grub written on a black background 1
How to Fix Bootloader Problems Due to GRUB

Fixing bootloader problems caused by GRUB is easy on Linux. Here's how you can get started.

Man giving a daisy to a woman after online dating 1
Does ID Verification on Dating Apps Stop Scams?

Requiring an ID card to create an account can help reduce fraud, but it isn't a silver bullet.

1 2 3 4 5
Page 1 / 6