Skip to content
No results
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Windows Server & AD
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Network Fundamentals
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
    • Enterprise Systems & Databases
  • Programming
    • Programming Basics
    • Python
    • JavaScript
    • HTML & CSS
    • Databases
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other
TerminalNotes
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Windows Server & AD
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Network Fundamentals
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
    • Enterprise Systems & Databases
  • Programming
    • Programming Basics
    • Python
    • JavaScript
    • HTML & CSS
    • Databases
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other

Sharing notes from my ongoing learning journey — what I build, break and understand along the way.

TerminalNotes
  • Web, Fundamentals of Web

How Browsers Work: Understanding Rendering, Parsing, and Repainting

How Browsers Work: Render, Parse, and Repaint Explained Every webpage we see is the result of a complex process happening behind the scenes inside our browser. Clicking a link and seeing a page appear looks simple — but under the…

  • >Ali Durmus
  • November 23, 2025
  • Projects, Mini Projects

TerminalNotes Reminder — A Local, Multi-Language Desktop Reminder App with Images, Holidays, and Autostart for Windows

TerminalNotes Reminder: A Smart, Local Reminder Manager for Windows I basically built a little “desktop reminder center” called TerminalNotes Reminder. It’s a fully local, SQLite-backed, multi-language, holiday-aware, image-enabled reminder app for Windows. 1. What is this app? This app is:…

  • >Ali Durmus
  • November 23, 2025
  • Projects, Mini Projects

My SSH Launcher – Python & Qt Based GUI for Server Management and Automation

SSH Launcher: My Python + Qt Project for Managing and Automating Linux Servers I’ve developed my own SSH connection manager and remote server control tool called SSH Launcher.It’s written in Python, and the interface is built with PySide6 (Qt).The main…

  • >Ali Durmus
  • November 23, 2025
  • Programming, Python

Python Practice Exercises – Part 4: Ulam Sequence, Dice Poker, and Unique Elements

Python Practice Exercises – Part 4 This week’s focus is on algorithmic thinking and pattern recognition — tackling famous problems like the Ulam sequence, simulating a poker dice game, mastering string slicing, and detecting unique values in lists. Try to…

  • >Ali Durmus
  • November 22, 2025
  • Programming, Python

Python Practice Exercises – Part 3: Fibonacci, Domino, and Random Code Generator

Python Practice Exercises – Part 3 In this week’s exercises, we explore pattern generation, recursion-like sequences, mathematical simulations, and random code generation.These tasks will help you apply logic, iteration, and randomization — essential skills for real-world Python problem-solving. Try solving…

  • >Ali Durmus
  • November 22, 2025
  • Programming, Python

Python Practice Exercises – Part 2: Logic, Validation, and Number Systems

Python Practice Exercises – Part 2 In this week’s exercises, we focus on logical problem-solving with loops, conditionals, mathematical operations, and input validation.Each task builds your understanding of how to combine basic programming concepts to solve real-world problems efficiently. Try…

  • >Ali Durmus
  • November 22, 2025
  • Python, Programming

Python Practice Exercises – Part 1: Loops, Conditionals, and Algorithms

Python Practice Exercises – Part 1 In this week’s set of Python exercises, we practiced everything we’ve learned so far — from loops and conditionals to random number generation and string formatting.The tasks below are sorted by difficulty, starting from…

  • >Ali Durmus
  • November 22, 2025
  • Programming, Python

Python Basics Part 7: Keywords, Strings, Debugging, and Package Installation

Python Basics – Part 7: Keywords, Strings, Debugging, and Packages In this week’s Python training notes, we’ll cover several essential yet often overlooked topics — Python’s reserved keywords, powerful string operations, debugging techniques, and how to install and use external…

  • >Ali Durmus
  • November 22, 2025
  • Programming, Python

Python Basics Part 6: Type Conversion and Lists Explained for Beginners

Python Basics – Part 6: Type Conversion and Lists In this part of my 5-week Python training series, we’ll cover two key concepts that appear everywhere in Python:type conversion (casting) and lists, one of the most important data structures. Type…

  • >Ali Durmus
  • November 22, 2025
  • Programming, Python

Python Basics Part 5: Random Numbers, f-Strings, and Input/Output Explained

Python Basics – Part 5: Random Numbers, String Formatting, and Input/Output In this lesson from my 5-week Python training series, we’ll explore three practical topics that bring programs to life:random number generation, formatted strings (f-strings), and user input’ll also end…

  • >Ali Durmus
  • November 22, 2025
Prev
1 2 3 4 5 6 7 8 … 15
Next

Copyright © 2026 -  TerminalNotes

Privacy Policy | Cookie Policy (EU) | Impressum

TerminalNotes
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}