Loading...

ARKA KAPI

BIMONTHLY CYBER SECURITY MAGAZINE

ABOUT US

Imagination is more important than knowledge. For knowledge is limited, whereas imagination embraces the entire world, stimulating progress, giving birth to evolution.

Albert Einstein
  • Editor in Chief: Ziyahan Albeniz – [email protected]
  • Editorial Operations Manager: Cansu Topukçu – [email protected]
  • Chief Business Officer: Oğuz Aydınyılmaz – [email protected]
  • Publishing Coordinator: Şahin Solmaz – [email protected]
  • Legal Advisor: Mehmet Pehlivan – [email protected]
  • Translators: Hakan Özer, Zekvan Arslan, Atalay Keleştemur, Nuri Çilengir, Enes Özen
  • Advertisement and Subscription: [email protected]
  • HQ: Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu – İstanbul/Turkey. Tel: +90 0212 514 68 61

ISSUES

  • Set up your VPN with My Connection
  • Introduction to Cryptology
  • Chain of Independence: Blockchain
  • Revolutionary Blockchain Technology: Is it safe?
  • Thoughts on Meltdown and Spectre Vulnerabilities
  • Vulnerabilities of Bluetooth: Past and Future
  • Why you shouldn’t store sensitive data in javascript files
  • The art of Data Hiding: STEGANOGRAPHY
  • Acting on the Sly: Overcome Obstacles with DNS Tunnelling
  • Possession is Nine-Tenths of the Law: User Agreements
  • The King’s Naked: Constraints of Blockchain
  • Signal Intelligence: Methods of Signal Listening and Analysis
  • How to be a shareholder of Google: Double your income with Google Adsense
  • Anonymizing Internet from the Router with OpenWrt and TOR
  • Cyber Security Conferences – Ayşenur Burak
  • WiPi Hunter Detecting – Besim Altınok
  • Web Application Firewall (WAF) Bypassing Methods – Ulaş Fırat Özdemir
  • Taking Control of Admin Account on Active Directory using the DCC – Girayhan Menekay
  • Dynamic Host Configuration to Root – Barkın Kılıç
  • Offensive Touch to Defensive World – Halil Dalabasmaz
  • Simone Margaritelli Interview – Utku Şen
  • Denial of Service – Bener Kaya
  • A Young Hacker in the Corridors of a Holding at Midnight – Yusuf Şahin
  • Revolutionary Blockchain Technology – Mustafa Yalçın
  • How I hacked into a college’s website! – Aditya Anand
  • Meltdown, Spectre and Foreshadow – Chris Stephenson
  • The Dangers of Wireless Networks – Besim Altınok
  • Cyber Security Conferences – Ayşenur Burak
  • Cryptology In Industrial Revolution – Bayram Gök
  • The 10 Biggest Hacks Of 2018 – Arka Kapi Magazine
  • Back To The Old Tech: Offline Communication Networks And Security – Utku Şen
  • Waf Bypassing Methods Part 2: Tricks And Indirect Access – Ulaş Firat Özdemir
  • Mini Threat Intelligence – Mert Sarica
  • Krack (Key Reinstallation Attack) – Ulaş Firat Özdemir
  • Daniel Bohannon Interview – Utku Şen
  • The Role And Comparison Of Operating Systems In Mass Surveillance (Qubes Os, Tails Os, Subgraph Os) – Furkan Senan
  • The Ss7 Protocol And Potential Dangers In Gsm Networks – Murat Şişman
  • Aprs: What Is It, What Does It Do And How To Use It – Murat Kaygisiz
  • Key Exchange Problem In Public Key Cryptography And Keybase – Recep Kizilarslan
  • Oldest Of The Hackers I – Bill Gosper – Cansu Topukçu
  • Technical Constraints Of The Blockchain Projects – Mert Susur
  • Cyber Security Conferences – Ayşenur Burak
  • The Future Of Security And Reliability – Chris Stephenson
  • Cryptology Front Of World War Ii The Enigma Encryption Machine – Bayram Gök
  • Secret Sharing Systems – Ceren İnce
  • Database Attacks And Protection Methods – Ömer Faruk Colakoğlu
  • Malware Programming And Lockdown Virus – Bener Kaya
  • Network Programming With Scapy – Güray Yıldırım
  • Siber Yildiz 2019 Writeup – Esra Nur Soylu
  • A Security Guide For Your Android Device – Arka Kapı
  • Signal Intelligence Signal Listening And Analysis Methods – Murat Şişman

SUBSCRIPTION


CONTACT

TELEPHONE
+90 212 514 68 61
ADDRESS
Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu Istanbul/Turkey

SPONSORS