Skip to content
No results
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Python
    • JavaScript
    • HTML & CSS
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other
  • Login
  • Register
TerminalNotes
  • Core IT
    • Computer Fundamentals
      • Instruction Cycle
      • Number Systems & Encoding
      • Boolean Logic & Bitwise Operations
      • Digital Systems Basics
    • Computer Architecture
      • CPU / ALU / Registers
      • Memory Hierarchy
      • System Buses
      • Storage Devices
    • Operating Systems
      • Process Management
      • Memory Management
      • File Systems
      • System Calls & Kernel Basics
    • Networking
      • Networking Models
      • IP Addressing & Subnetting
      • Network Services
      • Protocols
    • Cloud Computing
      • Cloud Computing
      • Major Providers
      • Cloud Tools & IaC
      • Cloud Networking
      • Deployment Models
    • DevOps
      • Version Control
      • CI/CD Pipelines
      • IaC
      • Automation & Scripting
    • Virtualization
      • Containers
      • Virtual Networking & Storage
      • Virtual Networking & Storage
    • System Monitoring & Troubleshooting
      • Monitoring Tools
      • Logs & Journals
      • Troubleshooting Techniques
    • Miscellaneous / Other
      • Terminal Commands, Cheatsheets
      • Short Note / Reference Articles
      • CLI Tools & Mini Utilities
  • Programming
    • Python
    • JavaScript
    • HTML & CSS
    • Java
    • TypeScript
    • C / C++
    • Go
    • Rust
    • Shell Scripting
    • Functional Programming
    • Other
  • Web
    • Fundamentals of Web
    • Frontend Basics
    • Backend Foundations
    • CMS & Site Builders
    • API Interactions
    • SEO & Performance
    • Other
  • Security
    • Infrastructure Security
      • Network Architecture & Segmentation
      • Firewalls / IDS / IPS
      • VPN & Zero Trust
      • System Security
        • OS Hardening
        • Secure Boot & BIOS Protection
        • Patch & Configuration Management
        • Endpoint Hardening
      • Cloud Security
    • Application Security
      • OWASP Top 10
      • Input Validation & Sanitization
      • Secure Code Practices
      • SAST / DAST / IAST
      • API Security
      • DevSecOps & CI/CD Pipelines
    • Identity & Access Management
      • Authentication
      • Authorization
      • Identity Federation
      • SSO & Session Management
      • IAM Solutions
    • Cryptography & Data Protection
      • Symmetric vs. Asymmetric Encryption
      • TLS / SSL
      • Hashing
      • Digital Signatures & Certificates
      • Digital Signatures & Certificates
      • Public Key Infrastructure (PKI)
      • Data-at-Rest & In-Transit Encryption
    • Threats, Attacks & Pentesting
      • Pentesting Concepts & Methodology
      • Red Team / Blue Team / Purple Team
      • Vulnerability Scanning
      • Common Tools
      • Common Tools
      • Bug Bounty
      • Social Engineering & Phishing
    • Monitoring & Detection
      • SIEM
      • Log Analysis & Correlation
      • Endpoint Detection & Response (EDR)
      • XDR & Behavioral Analytics
      • Alerting & False Positive Management
    • Governance, Risk & Compliance (GRC)
      • Risk Assessment & Threat Modeling
      • ISO 27001 / NIST / SOC 2 / CIS Controls
      • Privacy Regulations (GDPR, HIPAA, PCI-DSS)
      • Security Policies & Documentation
      • Incident Response Plans
      • Awareness Training & Simulations
    • Security Fundamentals
    • Other
  • AI
    • AI Fundamentals
    • Machine Learning
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Model Evaluation
      • Feature Engineering
    • Deep Learning
      • CNN
      • RNN
      • Transformers
    • NLP
      • Tokenization
      • Sentiment Analysis
      • Language Models
    • Computer Vision
    • Prompt Engineering
      • Zero-shot / Few-shot
      • Prompt Injection
    • Tools – Platforms
      • TensorFlow
      • PyTorch
      • Hugging Face
      • OpenAI API
    • Ethics & Security
      • AI Bias
      • Adversarial Attacks
      • AI Governance
    • AI Projects
    • Other
  • Tools & Platforms
    • Git
    • Docker
    • VS Code
    • CLI Tools
    • Postman / API Tools
    • Other
  • Projects
    • Mini Projects
    • Fullstack Projects
    • Portfolio
    • Freelance
    • UI/UX Projects
  • Learning
    • Roadmaps
    • Bootcamps
    • Books & Articles
    • Practice & Challenges
    • Exams & Certifications
    • Other
  • Login
  • Register

Sharing notes from my ongoing learning journey — what I build, break and understand along the way.

TerminalNotes
  • Programming, Python

Learning Python – Post 5: Converting Between Numbers and Strings

Learning Python – Post 5: Converting Between Numbers and Strings One of the first things I wanted to get comfortable with in Python was how to convert between numbers and strings — especially when dealing with user input or formatting…

  • >Ali Durmus
  • July 10, 2025
  • Programming, Python

Learning Python – Post 4: Useful String Methods

Learning Python – Post 4: Useful String Methods I’m not trying to learn every Python string method — just the ones that are actually useful when working with text.Here are a few I’ve been practicing, with examples that helped me…

  • >Ali Durmus
  • July 10, 2025
  • Programming, Python

Learning Python – Post 3: Doing Math with Python – Basic Operators and Calculations

Learning Python – Post 3: Doing Math with Python – Basic Operators and Calculations Today I practiced how to do basic math with Python — and to be honest, it felt really satisfying to see Python acting like a calculator,…

  • >Ali Durmus
  • July 8, 2025
  • Programming, Python

Learning Python – Post 2: Using print(), Formatting Output, and Understanding Data Types

Learning Python – Post 2: Using print(), Formatting Output, and Understanding Data Types How to Open Jupyter Notebook (Quick Start) Before we begin writing any Python code, make sure you can open Jupyter Notebook. Here’s how I do it step-by-step…

  • >Ali Durmus
  • July 8, 2025
  • Programming, Python

Learning Python – Post 1: Installing Anaconda and Launching Jupyter Notebook

Learning Python – Post 1: Installing Anaconda and Launching Jupyter Notebook This is the first post in my Learning Python series — a personal journey where I’m learning Python from scratch and sharing everything I pick up along the way.…

  • >Ali Durmus
  • July 8, 2025
  • Core IT, Virtualization

What Is a Virtual Machine? A Beginner’s Guide to Virtualization

Understanding Virtual Machines and How to Set Up VirtualBox What Is a Virtual Machine? A Virtual Machine (VM) is exactly what it sounds like — a simulated computer that runs inside your actual computer. It behaves like a real machine,…

  • >Ali Durmus
  • July 6, 2025
  • Tools & Platforms, VS Code

What Is Visual Studio Code? A Clear and Practical Introduction

What Is Visual Studio Code? A Clear Introduction for Developers In the world of software development, there are tools that come and go — and then there are tools that quietly become essential. Visual Studio Code, or simply VS Code,…

  • >Ali Durmus
  • July 5, 2025
  • Tools & Platforms, Docker

Introduction to Docker: How It Works and Why You Should Use It

Getting Started with Docker: What It Is and How It Works If you’ve been anywhere near modern software development, chances are you’ve heard the name Docker. But what exactly is it, and why do so many developers swear by it?…

  • >Ali Durmus
  • July 5, 2025
Prev
1 … 4 5 6 7

Copyright © 2025 -  TerminalNotes

Privacy Policy | Cookie Policy (EU) | Impressum

TerminalNotes
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}