{"version":"1.0","provider_name":"Cesrey Web Hosting Blog","provider_url":"https:\/\/cesrey.com\/blog","author_name":"Kader Kele\u015f","author_url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/","title":"Linux SSH G\u00fcvenli\u011fi ve Y\u00f6netimi - Cesrey Web Hosting Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"02x58ZQBdW\"><a href=\"https:\/\/cesrey.com\/blog\/linux\/linux-ssh-guvenligi-ve-yonetimi\/\">Linux SSH G\u00fcvenli\u011fi ve Y\u00f6netimi<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cesrey.com\/blog\/linux\/linux-ssh-guvenligi-ve-yonetimi\/embed\/#?secret=02x58ZQBdW\" width=\"600\" height=\"338\" title=\"&#8220;Linux SSH G\u00fcvenli\u011fi ve Y\u00f6netimi&#8221; &#8212; Cesrey Web Hosting Blog\" data-secret=\"02x58ZQBdW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cesrey.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/1674678e8b51d708035a9bdad3bfc16dc9be9aa8.jpg","thumbnail_width":1280,"thumbnail_height":720,"description":"SSH (Secure Shell), a\u011f \u00fczerindeki ba\u011flant\u0131lar i\u00e7in g\u00fcvenli veri iletimi yapmak i\u00e7in kullan\u0131lan bir protokold\u00fcr. Linux i\u015fletim sistemleri, \u00f6zellikle sunucu uygulamalar\u0131 i\u00e7in s\u0131k\u00e7a kullan\u0131lmaktad\u0131r. Bu nedenle, Linux SSH g\u00fcvenli\u011fi ve y\u00f6netimi b\u00fcy\u00fck \u00f6nem ta\u015f\u0131r. SSH, veri g\u00fcvenli\u011fi ve b\u00fct\u00fcnl\u00fc\u011f\u00fc sa\u011flamak i\u00e7in en yayg\u0131n kullan\u0131lan protokollerden biridir. Ancak, SSH ba\u011flant\u0131lar\u0131 \u015fifrelenmedi\u011finde veya k\u00f6t\u00fcye kullan\u0131c\u0131lar taraf\u0131ndan ele [&hellip;]"}