Back Door Magazine Issue 6
Back Door Magazine Issue 6
Arka Kapı is 1 Year Old! Arka Kapı Magazine, which has completed its first year with the 6th issue in your hands, is once again here with interesting topics. News prepared in collaboration with UzmanCoin continues to keep the pulse of the cryptocurrency world. "My mother thinks I'm a cybersecurity expert, don't tell them I'm a commando." Cyber Struggle, a program that trains cybersecurity experts with a multidisciplinary approach, is on Arka Kapı with all the details you're curious about. Şahin Solmaz asked, Kubilay Onur Güngör answered. A different perspective from Utku Şen on the future world where artificial intelligence will make decisions on our behalf and humanoid robots will do everything we do. Utku Şen opens up discussion on the claim that there will be no place for antivirus products in the future world. With his article on cryptology in the 20th century, Bayram Gök reports from behind the scenes of World War II, from the cryptology front. Can computers keep a number in their minds? How random is a random number that a computer chooses? You've never looked at the soft underbelly of encryption systems, random number generation, from this perspective. Chris Stephenson is here with his article "When random numbers aren't random". If you have a secret and want to share it, you don't have to shout it into the wells like the barber who learned that the Phrygian King Midas had donkey ears. The solution is to use the secret sharing system and share it with the right people. Ceren İnce wrote Secret Sharing Systems for you. The biggest problem of today is the web. The central structure of the web paralyzes access to information in case of a possible access blocking decision. Have you ever imagined a distributed web? Mustafa Yalçın shows us that a permanent web is possible with IPFS. Do you want financial freedom and true privacy, but feel that the current options do not meet your needs? Monero is here for these days! The unofficial currency of the Dark Web, Monero, which promises true privacy and security, is available in Backdoor Magazine with all the details. In addition to a strong password, two-step verification is also essential for the security of your online accounts. So, SMS or an OTP device? Google Authenticator and Authy are two common verification applications that attract great attention. So which one is more secure? Ulaş Fırat Özdemir answers for you. Are you saying "In front of me, behind me, to my right, to my left, is there Wifi?" But are these public networks safe? Besim Altınok wrote "Password Cracking Attacks on Wireless Networks" for you. Not to say that one day I read a PDF and my whole life changed, and to be alert against similar attack vectors, Ferdi Gül published his experimental study "PowerSpy, the Agent on Your Computer" in Arka Kapı Magazine. Güray Yıldırım continues his series on Network Packet Programming in Scapy with Python where he left off. You can find the second article of the series in our magazine. Is a healthy mind found in a healthy body, or is it the job of healthy minds to establish the health of the body? Huriye Özdemir focuses on the mental health of cybersecurity workers with her article "New Focus in Cybersecurity: Mental Health". Muhammed Hilmi Koca shares with us the articles he has collected in his bag with "Reading List for Software Developers". Would you like to read about the Linux distribution SigintOS, specially designed by Murat Şişman for signal intelligence studies, from the pen of the project leader Şişman? If so, here you go. What are the necessary infrastructure information for radio communication in the amateur radio adventure, what should you know, in which subjects should you improve yourself? Murat Kaygısız wrote the article titled "Wireless Communication Infrastructure Information" for you. CONTENTS February '19 Cyber Security & IT Events Cryptocurrency News Kubilay Onur Güngör Interview: Cyber Struggle There is No Room for Antivirus Products in the Future Cryptology in the Electronic Age of the 20th Century When Random Numbers Aren't Random... Secret Sharing Systems Persistent Web with IPFS (InterPlanetary File System) Monero (XMR) Cryptocurrency for Those Who Want True Privacy Google vs. Authy 2FA Security Wars Password Spoofing Attacks on Wireless Networks Agent on Computer PyShellSpy Network Packet Programming II with Python Scapy Library Mental Health: The New Focus in Cybersecurity Reading List for Programmers SignitOS Radio Communication Infrastructure Information
Be the first to review this product!