Skip to content
No results
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Python
    • JavaScript
    • HTML & CSS
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other
TerminalNotes
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
      • Networking Hardware
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Python
    • JavaScript
    • HTML & CSS
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other

Sharing notes from my ongoing learning journey — what I build, break and understand along the way.

TerminalNotes
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A10: Server-Side Request Forgery (SSRF)

OWASP Top 10 – A10: Server-Side Request Forgery (SSRF) The final item in the OWASP Top 10 is A10: Server-Side Request Forgery (SSRF) — and it’s one of the most interesting (and dangerous) ones I’ve researched. At first, it sounds…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A09: Security Logging and Monitoring Failures

OWASP Top 10 – A09: Security Logging and Monitoring Failures Next up in the OWASP Top 10 series is a topic that’s less about preventing attacks and more about detecting and responding to them:A09: Security Logging and Monitoring Failures This…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A08: Software and Data Integrity Failures

OWASP Top 10 – A08: Software and Data Integrity Failures The eighth item in the OWASP Top 10 is Software and Data Integrity Failures. This category covers a wide range of issues related to trusting software, updates, configurations, or data…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A07: Identification and Authentication Failures

OWASP Top 10 – A07: Identification and Authentication Failures While exploring software security topics, I came across an area that directly affects the very foundation of any application: authentication and identification flaws. OWASP groups these issues under A07: Identification and…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A06: Vulnerable and Outdated Components

OWASP Top 10 – A06: Vulnerable and Outdated Components As I continued through the OWASP Top 10 series, the next topic brought me to an area that’s extremely common in software development, yet often underestimated in day-to-day security practices: Vulnerable…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A05: Security Misconfiguration

OWASP Top 10 – A05: Security Misconfiguration As I continue diving into software security, the next item in the OWASP Top 10 list caught my attention: A05 – Security Misconfiguration. At first glance, it seemed like a basic issue —…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A04: Insecure Design

OWASP Top 10 – A04: Insecure Design While diving into software security, I came across the OWASP Top 10 list. As I reviewed the categories, one entry stood out: A04 – Insecure Design. Honestly, I had no idea what it…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A03: Injection

OWASP Top 10 – A03: Injection What Is Injection? Injection is a broad class of attack where untrusted data is sent to an interpreter (such as a database, command line, or XML parser) as part of a command or query.…

  • >Ali Durmus
  • July 19, 2025
  • Security, Application Security, OWASP Top 10

OWASP Top 10 – A02: Cryptographic Failures

OWASP Top 10 – A02: Cryptographic Failures What Is Cryptographic Failure? Cryptographic Failures (formerly known as “Sensitive Data Exposure”) refer to the misuse, misconfiguration, or complete absence of encryption and cryptographic protocols in systems handling sensitive data. It means your…

  • >Ali Durmus
  • July 19, 2025
  • Application Security, OWASP Top 10, Security

OWASP Top 10 – A01: Broken Access Control

OWASP Top 10 – A01: Broken Access Control What Is Broken Access Control? Broken Access Control occurs when an application fails to enforce proper restrictions on what authenticated users are allowed to do. In other words, users can perform actions…

  • >Ali Durmus
  • July 19, 2025
Prev
1 … 3 4 5 6 7 8 9
Next

Copyright © 2025 -  TerminalNotes

Privacy Policy | Cookie Policy (EU) | Impressum

TerminalNotes
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}