{"version":"1.0","provider_name":"Cesrey Web Hosting Blog","provider_url":"https:\/\/cesrey.com\/blog","author_name":"Kader Kele\u015f","author_url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/","title":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"d7Nx5UG24T\"><a href=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\">Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/embed\/#?secret=d7Nx5UG24T\" width=\"600\" height=\"338\" title=\"&#8220;Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131&#8221; &#8212; Cesrey Web Hosting Blog\" data-secret=\"d7Nx5UG24T\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cesrey.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-nedir.jpg","thumbnail_width":800,"thumbnail_height":533,"description":"Linux i\u015fletim sistemi, a\u00e7\u0131k kaynak kodlu bir yaz\u0131l\u0131m olarak bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. G\u00fcvenlik a\u00e7\u0131s\u0131ndan da olduk\u00e7a g\u00fc\u00e7l\u00fcd\u00fcr. Ancak, her ne kadar g\u00fcvenlik konusunda bir\u00e7ok \u00f6zelli\u011fi olsa da, baz\u0131 durumlarda ek g\u00fcvenlik ara\u00e7lar\u0131 ve uygulamalar\u0131 kullanmak gerekebilir. G\u00fcvenlik Duvar\u0131 (Firewall) Bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131nda, g\u00fcvenlik duvar\u0131 (firewall) varsay\u0131lan olarak kuruludur. G\u00fcvenlik duvar\u0131, a\u011fa gelen [&hellip;]"}