About Fatih Küçükkarakurt
Fatih is a freelance security researcher, penetration tester, and malware analyst. Since 2017, he has been actively working with many different software languages and technologies, especially C, C++, Python, and x86 Assembly. He has reported vulnerabilities of more than 100 large companies. He continues his research as an engineer dealing with operating systems and cloud architecture.
Can Your Computer Be Accessed Remotely While It’s Off?
Can a hacker get into your PC when it's powered down? Yes, it's possible; fort instance, using Intel's Active Management Technology...
5 Ways to Learn HTML and CSS With Real UI Challenges
Follow these strategies to unlock your web development skills with interactive learning, creative challenges, and practical experience.
What Is Half-Duplex and Full-Duplex and How Does It Affect Your Router?
Wi-Fi and communication are shaped by duplexing. But what is duplexing, and how does it affect your communication?
An Introduction for Parents Talking to Children About Online Safety
How do you keep kids safe online? It's a tricky thing to master, so here's a guide to approaching cybersecurity with your youngsters.
VB.NET SQL Examples for Querying Databases Efficiently
Discover how to issue the most common SQL commands using VB.NET.
An In-Depth Introduction to DDOS Defense Strategy: How to Protect Against Botnet Attacks
When many machines target your site or servers, your systems can all come crashing down. You need a plan.
How to Configure Static IP Address on Ubuntu 22.04 LTS and 22.10
Switching from dynamic IP allocation to static IP addresses is easy on Ubuntu 22.04 "Jammy Jellyfish" and 22.10.
Is Mobile Hacking Still a Big Threat in 2023?
We all try to protect our laptops and PCs from hackers, but are our smartphones also at risk?
How to Use ARIA (Accessible Rich Internet Applications) in HTML and CSS
Small tweaks to your HTML can bring large benefits to your readers.
Why Digital Car Keys Are Not Safe and Secure
Some car manufacturers allow you to unlock and start your vehicle using your phone, but is that safe? Can digital car keys be hacked?
What Is SIEM and How Can You Use It to Optimize Your Security?
Keeping track of security threats and flaws is difficult. That's why you need Security Information and Event Management.
A Beginner's Guide to Supervising Access to Computer Systems
Computer systems store a lot of important data, so how is such information actually kept secure? It ultimately comes down to who you give access to...
Yes, AI Can Crack Your Password, but Can You Prevent It?
Artificial intelligence can be used to crack your passwords: here's how it works and how you can protect yourself from the AI threat.
Ethical Hacking: What Are the Stages of Penetration Testing?
How do cybercriminals hack into systems? How can you protect against them? Ethical hackers can show you via pentests.
How to Become a Sound Designer: A Beginner's Guide
If you want to be a sound designer, we've written this guide to help you out.
Threads vs. Mastodon: Which Is Best?
Between Threads and Mastodon, which seems to be the best Twitter alternative?
An Introduction to Pinia in Vue.js
Create simple, state-based apps with ease using this JavaScript library.
How to Fix Bootloader Problems Due to GRUB
Fixing bootloader problems caused by GRUB is easy on Linux. Here's how you can get started.
Does ID Verification on Dating Apps Stop Scams?
Requiring an ID card to create an account can help reduce fraud, but it isn't a silver bullet.