Faik SevimHow Forward Secrecy Protects Your Data Even in the FutureEver wondered how your private messages and online transactions stay protected, even if future hackers try to pry? 🤔💻 My latest piece…5 min read·Feb 13, 2024----
Faik SevimDetecting Wi-Fi de-authentication Attack With DakhundHave you ever had one of those moments where your WiFi suddenly drops, and you’re like, “Why, universe, why?!” 🤯 I did. But instead of…2 min read·Nov 1, 2023----
Faik SevimCloudflare’s LavaRand: A Confluence of True Randomness in CryptographyCloudflare’s LavaRand stands as a practical champion in this pursuit, striving to provide true randomness.2 min read·Aug 28, 2023----
Faik SevimDatabase Security: Data encryptionHi all, this is my second article on the database security series. I will share my knowledge about data encryption in databases, managing…7 min read·Jan 15, 2023----
Faik SevimDatabase Security: Separation of DutiesHi all, today I will share my DB security knowledge and one of the alternative ways to tighten your DB security.5 min read·Jan 14, 2023----
Faik SevimHow I created honey files with Go for ransomware activity detection and preventionIn this blog, I will share my experience making honey files with go to detect ransomware activity.2 min read·Aug 12, 2022----
Faik SevimWhat is Stack-based Buffer Overflow? How does it work?How does BOF occur?7 min read·Mar 7, 2022----
Faik SevimEconomic Denial of Sustainability (EDoS)EDoS is a type of DoS or DDoS attack that targets the vulnerabilities of cloud consumers’ utility pricing models such as pay as you go…3 min read·Oct 18, 2021----
Faik SevimQuantum Tech and CryptologyBilindiği üzere kuantum teknolojisi geleneksel işlemci performansının çok daha üzerinde bir performans sergiliyor. Kantum teknolojisinin…5 min read·Aug 24, 2021----