Skip to content
No results
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Network Fundamentals
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Programming Basics
    • Python
    • JavaScript
    • HTML & CSS
    • Databases
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other
TerminalNotes
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Network Fundamentals
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Programming Basics
    • Python
    • JavaScript
    • HTML & CSS
    • Databases
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other

Sharing notes from my ongoing learning journey — what I build, break and understand along the way.

TerminalNotes
  • Projects, Mini Projects

IIoT Project Part 3: Remote Control & Automation

Industrial IoT Part 3: Event-Driven Architecture, Remote Shutdown via Telegram, and Automated Reporting In Part 2, we established the core of our data pipeline: secure ingestion, persistence with InfluxDB, and real-time visualization with Grafana. The system could “see” and “record,”…

  • >Ali Durmus
  • February 1, 2026
  • Projects, Mini Projects

IIoT Project Part 2: Grafana, InfluxDB & Anomaly Detection

Industrial IoT (IIoT) Project Part 2: Data Analytics, Visualization, and Dynamic Anomaly Detection In the first phase of our project, we ensured that data was securely transported via the MQTT protocol over a WireGuard VPN tunnel. However, in industrial automation,…

  • >Ali Durmus
  • February 1, 2026
  • Projects, Mini Projects

Secure IIoT Data Pipeline: WireGuard VPN & MQTT Hardening Guide

Implementation of a Secure Industrial Data Pipeline: VPN Tunneling and MQTT Broker Hardening 1. Introduction and Project Scope In modern industrial environments, the secure transmission of telemetry data from field devices to central management systems is a critical requirement. This…

  • >Ali Durmus
  • January 31, 2026
  • Security, Common Tools, Threats, Attacks & Pentesting

Seeing the Invisible: Wireshark Network Analysis & Data Privacy

Network Traffic and Data Privacy Analysis with Wireshark The phrase “Data is vulnerable while traveling on the network,” often heard in the cybersecurity world—what does it mean in practice? Theoretically, we know that the HTTP protocol is insecure and transmits…

  • >Ali Durmus
  • January 27, 2026
  • Projects, Mini Projects

Implementing High Availability: Docker & Nginx Load Balancer

Implementing High Availability: A Load Balancer Architecture with Docker and Nginx In modern IT infrastructures, a Single Point of Failure (SPOF) is an unacceptable risk. Enterprise system sustainability relies heavily on distributing traffic across multiple servers (Load Balancing) and ensuring…

  • >Ali Durmus
  • January 27, 2026
  • Core IT, Monitoring Tools, System Monitoring & Troubleshooting

Building Scalable Infrastructure Monitoring with Docker, Prometheus & Grafana

Enterprise Infrastructure Monitoring: Scalable Architecture Design with Docker, Prometheus, and Grafana In modern Information Technology (IT) operations, ensuring system uptime and performance stability requires a shift from reactive to proactive approaches. While traditional system management often detects issues only after…

  • >Ali Durmus
  • January 26, 2026
  • Core IT, DevOps, IaC

Automating Server Monitoring: A Guide to Htop and Ansible Standardization

Server Management Standardization: Automating Htop Configuration with Ansible For a system administrator or DevOps engineer, the biggest waste of time is repetitive tasks. When managing a single server, manually updating packages or installing and configuring htop might not be an…

  • >Ali Durmus
  • January 25, 2026
  • Projects, Mini Projects

Digital CV Management: Secure, Fast, and Portable

How I Engineered a Secure and Self-Hosted CV Management System As a Student (Systems Integration Specialist), I made it a principle throughout my education not only to manage ready-made systems, but also to understand how those systems work “under the…

  • >Ali Durmus
  • January 24, 2026
  • Mini Projects, Projects

Hyper-V Kubernetes Lab on Ubuntu 24.04: 2-Node Cluster with kubeadm, containerd & Flannel

Build a 2-Node Kubernetes Cluster on Hyper-V with Ubuntu 24.04 (kubeadm + containerd + Flannel) In this article, I explain how to set up a Kubernetes cluster on Hyper-V using two virtual machines (1 Control Plane + 1 Worker). In…

  • >Ali Durmus
  • January 20, 2026
  • Core IT, Containers, Virtualization

Kubernetes Explained: From Monolith to Microservices, Docker Containers, and Kubernetes Architecture

The Evolution of Software Architecture: Monolith → Microservices → Docker → Kubernetes CHAPTER 1: THE EVOLUTION OF SOFTWARE ARCHITECTURE AND THE MICROSERVICES REVOLUTION To understand Kubernetes, you first have to understand the world it was designed to manage—namely, the Microservices…

  • >Ali Durmus
  • January 19, 2026
1 2 3 4 … 14
Next

Copyright © 2026 -  TerminalNotes

Privacy Policy | Cookie Policy (EU) | Impressum

TerminalNotes
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}