Loading...

ARKA KAPI

BIMONTHLY CYBER SECURITY MAGAZINE

ABOUT US

Imagination is more important than knowledge. For knowledge is limited, whereas imagination embraces the entire world, stimulating progress, giving birth to evolution.

Albert Einstein
  • Editor in Chief: Ziyahan Albeniz – [email protected]
  • Editorial Operations Manager: Cansu Topukçu – [email protected]
  • Chief Business Officer: Oğuz Aydınyılmaz – [email protected]
  • Publishing Coordinator: Şahin Solmaz – [email protected]
  • Legal Advisor: Mehmet Pehlivan – [email protected]
  • Translators: Hakan Özer, Zekvan Arslan, Atalay Keleştemur, Nuri Çilengir, Enes Özen
  • Advertisement and Subscription: [email protected]
  • HQ: Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu – İstanbul/Turkey. Tel: +90 0212 514 68 61

ISSUES

  • Set up your VPN with My Connection
  • Introduction to Cryptology
  • Chain of Independence: Blockchain
  • Revolutionary Blockchain Technology: Is it safe?
  • Thoughts on Meltdown and Spectre Vulnerabilities
  • Vulnerabilities of Bluetooth: Past and Future
  • Why you shouldn’t store sensitive data in javascript files
  • The art of Data Hiding: STEGANOGRAPHY
  • Acting on the Sly: Overcome Obstacles with DNS Tunnelling
  • Possession is Nine-Tenths of the Law: User Agreements
  • The King’s Naked: Constraints of Blockchain
  • Signal Intelligence: Methods of Signal Listening and Analysis
  • How to be a shareholder of Google: Double your income with Google Adsense
  • Anonymizing Internet from the Router with OpenWrt and TOR
  • Cyber Security Conferences – Ayşenur Burak
  • WiPi Hunter Detecting – Besim Altınok
  • Web Application Firewall (WAF) Bypassing Methods – Ulaş Fırat Özdemir
  • Taking Control of Admin Account on Active Directory using the DCC – Girayhan Menekay
  • Dynamic Host Configuration to Root – Barkın Kılıç
  • Offensive Touch to Defensive World – Halil Dalabasmaz
  • Simone Margaritelli Interview – Utku Şen
  • Denial of Service – Bener Kaya
  • A Young Hacker in the Corridors of a Holding at Midnight – Yusuf Şahin
  • Revolutionary Blockchain Technology – Mustafa Yalçın
  • How I hacked into a college’s website! – Aditya Anand
  • Meltdown, Spectre and Foreshadow – Chris Stephenson
  • The Dangers of Wireless Networks – Besim Altınok
  • Cyber Security Conferences – Ayşenur Burak
  • Cryptology In Industrial Revolution – Bayram Gök
  • The 10 Biggest Hacks Of 2018 – Arka Kapi Magazine
  • Back To The Old Tech: Offline Communication Networks And Security – Utku Şen
  • Waf Bypassing Methods Part 2: Tricks And Indirect Access – Ulaş Firat Özdemir
  • Mini Threat Intelligence – Mert Sarica
  • Krack (Key Reinstallation Attack) – Ulaş Firat Özdemir
  • Daniel Bohannon Interview – Utku Şen
  • The Role And Comparison Of Operating Systems In Mass Surveillance (Qubes Os, Tails Os, Subgraph Os) – Furkan Senan
  • The Ss7 Protocol And Potential Dangers In Gsm Networks – Murat Şişman
  • Aprs: What Is It, What Does It Do And How To Use It – Murat Kaygisiz
  • Key Exchange Problem In Public Key Cryptography And Keybase – Recep Kizilarslan
  • Oldest Of The Hackers I – Bill Gosper – Cansu Topukçu
  • Technical Constraints Of The Blockchain Projects – Mert Susur
  • Cyber Security Conferences – Ayşenur Burak
  • The Future Of Security And Reliability – Chris Stephenson
  • Cryptology Front Of World War Ii The Enigma Encryption Machine – Bayram Gök
  • Secret Sharing Systems – Ceren İnce
  • Database Attacks And Protection Methods – Ömer Faruk Colakoğlu
  • Malware Programming And Lockdown Virus – Bener Kaya
  • Network Programming With Scapy – Güray Yıldırım
  • Siber Yildiz 2019 Writeup – Esra Nur Soylu
  • A Security Guide For Your Android Device – Arka Kapı
  • Signal Intelligence Signal Listening And Analysis Methods – Murat Şişman
  • Julian Assange – Cansu Topukçu
  • Cyber Security Conferences – Ayşenur Burak
  • Sigintos – Murat Şişman 8 Network Packet Programming Ii – The Python Scapy Library – Güray Yıldırım
  • Google Vs. Authy Security Wars In 2fa – Ulaş Fırat Özdemir
  • When “random” Numbers Aren’t Really Random – Chris Stephenson
  • Ipfs (Interplanetary File System) With Permanent Web – Mustafa Yalçın
  • No Room For Antiviruses In The Future – Utku Şen
  • Password Cracking Attacks In Wireless Networks – Besim Altınok
  • Blockchain Applications And Security Problems – Mert Susur
  • Birthday Attack To Hash Functions- Halit İnce
  • Cryptology In The 20th Century: The Electronic Age – Bayram Gök
  • Cryptocurrency Monero (Xmr) For Those Who Want True Privacy – Arka Kapı
  • Cyber Security Conferences – Ayşenur Burak
  • Copyright Projects Based On Blockchain Technology – Mihraç Cerrahoğlu
  • Make Your Own Messaging Application With Signal – Murat Şişman
  • Great Threat In Eduroam Academic Networks – Besim Altinok
  • The Ship That Got Hacked Ashore – Esref Erol
  • Client-Side Static Analysis In Web Applications – Mithat Gogebakan
  • Encrypt Your Disks With Bitlocker – Arka Kapı
  • Oldest Of The Hackers Ii – Richard Greenblatt – Cansu Topukçu
  • Our Fellow Confidant, RSA – Bayram Gök
  • Prophecies For The Next 30 Years Of Cybersecurity – Utku Şen
  • Cyber Security Conferences – Ayşenur Burak
  • Out-Of-Band Attacks – Ömer Çıtak
  • Leave No Trace Behind – Tails (The Amnesic Incognito Live System) – Ziyahan Albeniz
  • Source Code Review For Python – Caner Özden
  • Stay Hidden On The Internet: The Onion Router – M. Enes Özen
  • Manage Your Passwords In One Place: Keepassxc Key To The Empire Passwords! – Arka Kapı
  • Balance Of Good And Bad In Cybersecurity – Utku Şen
  • Being Free In The Open World – Nuri Çilengir

SUBSCRIPTION


CONTACT

TELEPHONE
+90 212 514 68 61
ADDRESS
Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu Istanbul/Turkey

SPONSORS