Skip to content
No results
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Network Fundamentals
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Programming Basics
    • Python
    • JavaScript
    • HTML & CSS
    • Databases
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other
TerminalNotes
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Network Fundamentals
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Programming Basics
    • Python
    • JavaScript
    • HTML & CSS
    • Databases
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other

Sharing notes from my ongoing learning journey — what I build, break and understand along the way.

TerminalNotes
  • Security, Pentesting Concepts & Methodology, Threats, Attacks & Pentesting

Why Kali Linux? Building a Safe Cybersecurity Lab in VirtualBox (Oracle VM)

Kali Linux on VirtualBox: Key Advantages, Features, and a Practical Workflow When the name Kali Linux comes up, a large part of the internet quickly steers the topic toward “hacking.” But what truly makes Kali valuable isn’t individual tools or…

  • >Ali Durmus
  • January 11, 2026
  • Network Fundamentals, Networking

Network Troubleshooting for Beginners: Step-by-Step Workflow, OSI Method, Ping/Traceroute, DNS Checks and Common Scenarios

Network Troubleshooting: A Structured Method to Find and Fix Connectivity Issues Network troubleshooting can look a bit intimidating at first, because problems rarely come with a clear error message. A user says “the internet is down,” but the internet is…

  • >Ali Durmus
  • January 11, 2026
  • Networking, Network Fundamentals

Network Planning and Infrastructure: Structured Cabling, Rack Design, Patch Panels and Deployment Checklist

Network Planning and Infrastructure: How to Design, Cable and Document a Reliable Network From the outside, network planning can look like “run cables, place a switch, get the internet working.” But once you look a bit deeper, you realize this:…

  • >Ali Durmus
  • January 11, 2026
  • Networking, Network Fundamentals

WLAN (Wi-Fi) Basics for Beginners: 2.4 vs 5 GHz, 802.11 Standards, Roaming and WPA2/WPA3 Security

WLAN Explained: How Wi-Fi Works, Which Band to Use, and How to Secure It Wi-Fi is often seen as “set up the modem, type the password, done.” At home, for most people, it really is like that. But once you…

  • >Ali Durmus
  • January 11, 2026
  • Networking, Network Fundamentals

Firewall, NAT and DMZ Explained for Beginners: ACLs, PAT and Core Network Security Concepts

Firewall, NAT and DMZ: How Network Security Really Works in Practical Setups When you’re just starting to build a network, the goal is usually simple: devices should get internet access, servers should run, and everyone should be able to do…

  • >Ali Durmus
  • January 11, 2026
  • Networking, Network Fundamentals

DHCP and DNS Explained for Beginners: DORA, Scopes, DHCP Relay and How Name Resolution Works

DHCP and DNS Basics: How Devices Get IP Addresses and Resolve Names in Real Networks When we first check whether a network is working, we usually measure it by the cable, Wi-Fi, and the question “Is it getting an IP?”…

  • >Ali Durmus
  • January 11, 2026
  • Networking, Network Fundamentals

Routing and WAN Basics for Beginners: Static vs Dynamic Routing, IGP vs EGP, and How Networks Choose Paths

Routing and WAN: How Routers Choose the Best Path Across Networks Once you’ve somewhat internalized IP and subnetting, the next question naturally appears: “Okay, devices in the same subnet can find each other. But how does traffic travel between different…

  • >Ali Durmus
  • January 10, 2026
  • Networking, Network Fundamentals

IP Addressing and Subnetting for Beginners: IPv4, IPv6, CIDR and Dual Stack Explained

IP Addressing and Subnetting: How IPv4/IPv6 and CIDR Define Network Boundaries As someone new to networking, IP addresses can initially feel like something you just memorize: numbers starting with 192.168… and then expressions like /24, /26 on top of that.…

  • >Ali Durmus
  • January 10, 2026
  • Networking, Network Fundamentals

Switching to VLANs: Trunking, 802.1Q Tagging and STP Explained for Beginners

From Switching to VLANs: How Trunks, Tagging and STP Keep Networks Organized As someone new to switching, the confusion usually starts at this point: “I plugged in the cable, the devices can see each other… so is the job done?”…

  • >Ali Durmus
  • January 10, 2026
  • Networking, Network Fundamentals

Understanding Network Fundamentals: MAC, ARP, Broadcast Domains and Packet Flow

How Data Really Moves in a Network: MAC Addresses, ARP, Broadcast Domains and the Logic Behind It When you start building or managing a network, everything looks simple at first: there is a cable, a switch, an IP address –…

  • >Ali Durmus
  • January 10, 2026
1 2 3 4 … 13
Next

Copyright © 2026 -  TerminalNotes

Privacy Policy | Cookie Policy (EU) | Impressum

TerminalNotes
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}