{"id":750,"date":"2023-04-29T17:36:15","date_gmt":"2023-04-29T14:36:15","guid":{"rendered":"https:\/\/cesrey.com\/blog\/?p=750"},"modified":"2023-04-29T17:37:46","modified_gmt":"2023-04-29T14:37:46","slug":"linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar","status":"publish","type":"post","link":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/","title":{"rendered":"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar"},"content":{"rendered":"<p>Linux sistemi, a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemidir ve bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. Ancak, Linux gibi a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemi kullanmak, bilgisayar\u0131n\u0131z\u0131 \u00e7e\u015fitli siber sald\u0131r\u0131lara kar\u015f\u0131 daha savunmas\u0131z hale getirebilir. Bu nedenle, Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sisteminiz i\u00e7in en iyi uygulamalardan biridir.<\/p>\n<p>Linux g\u00fcvenlik duvar\u0131, a\u011f trafi\u011fini izler ve gelen veya giden trafi\u011fi filtreler. Bu sayede, bilgisayar\u0131n\u0131za zararl\u0131 yaz\u0131l\u0131mlar\u0131n girmesi engellenir ve veri g\u00fcvenli\u011fi sa\u011flan\u0131r. A\u015fa\u011f\u0131daki Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 i\u00e7in en iyi uygulamalar\u0131 inceleyebilirsiniz:<\/p>\n<h2>1. iptables<\/h2>\n<p>Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 i\u00e7in en pop\u00fcler uygulamalardan biri iptables&#8217;tir. Bu uygulama, gelen ve giden trafi\u011fi kontrol etmek i\u00e7in kullan\u0131l\u0131r. \u0130ptables, Linux \u00e7ekirde\u011fi ile birlikte gelir ve bir\u00e7ok da\u011f\u0131t\u0131m taraf\u0131ndan varsay\u0131lan olarak kuruludur.<\/p>\n<h2>2. UFW (Uncomplicated Firewall)<\/h2>\n<p>UFW, kullan\u0131m\u0131 kolay bir aray\u00fcze sahip olan bir Linux g\u00fcvenlik duvar\u0131d\u0131r. Bu uygulama, iptables ile birlikte kullan\u0131l\u0131r ve daha az tecr\u00fcbeli kullan\u0131c\u0131lar i\u00e7in kolay bir se\u00e7enektir.<\/p>\n<h2>3. FirewallD<\/h2>\n<p>FirewallD, CentOS ve Fedora gibi baz\u0131 Linux da\u011f\u0131t\u0131mlar\u0131n\u0131n varsay\u0131lan g\u00fcvenlik duvar\u0131d\u0131r. Bu uygulama, \u00e7e\u015fitli a\u011f profilleri olu\u015fturma se\u00e7ene\u011fi sunar ve a\u011f\u0131n\u0131z i\u00e7in en uygun g\u00fcvenlik seviyesini se\u00e7menizi sa\u011flar.<\/p>\n<h2>4. Shorewall<\/h2>\n<p>Shorewall, g\u00fc\u00e7l\u00fc bir Linux g\u00fcvenlik duvar\u0131d\u0131r ve \u00f6zellikle b\u00fcy\u00fck a\u011flar i\u00e7in uygundur. Shorewall, karma\u015f\u0131k a\u011f yap\u0131lar\u0131 olu\u015fturma se\u00e7ene\u011fi sunar ve ayr\u0131ca IPv6 deste\u011fi de sa\u011flar.<\/p>\n<h2>5. CSF (ConfigServer Security &amp; Firewall)<\/h2>\n<p>CSF, cPanel ve WHM gibi web bar\u0131nd\u0131rma panelleri i\u00e7in uygun bir Linux g\u00fcvenlik duvar\u0131d\u0131r. Bu uygulama, web sunucular\u0131n\u0131z i\u00e7in ek g\u00fcvenlik seviyesi sa\u011flar ve zararl\u0131 sald\u0131r\u0131lar\u0131 engeller.<\/p>\n<p>Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sisteminizin g\u00fcvende kalmas\u0131n\u0131 sa\u011flamak i\u00e7in \u00f6nemlidir. Yukar\u0131da belirtilen uygulamalar\u0131n her biri, a\u011f\u0131n\u0131z i\u00e7in en uygun g\u00fcvenlik seviyesini sunar ve size \u00e7e\u015fitli yap\u0131land\u0131rma se\u00e7enekleri sunar.<\/p>\n<div class=\"newspaper-x-tags\"><strong>TAGS: <\/strong><span><a href=\"https:\/\/cesrey.com\/blog\/tag\/duvari\/\" rel=\"tag\">duvar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/en\/\" rel=\"tag\">en<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/guvenlik\/\" rel=\"tag\">g\u00fcvenlik<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/icin\/\" rel=\"tag\">i\u00e7in<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/iyi\/\" rel=\"tag\">iyi<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/linux\/\" rel=\"tag\">linux<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/uygulamalar\/\" rel=\"tag\">uygulamalar<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/yapilandirmasi\/\" rel=\"tag\">yap\u0131land\u0131rmas\u0131<\/a> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux sistemi, a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemidir ve bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. Ancak, Linux gibi a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemi kullanmak, bilgisayar\u0131n\u0131z\u0131 \u00e7e\u015fitli siber sald\u0131r\u0131lara kar\u015f\u0131 daha savunmas\u0131z hale getirebilir. Bu nedenle, Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sisteminiz i\u00e7in en iyi uygulamalardan biridir. Linux g\u00fcvenlik duvar\u0131, a\u011f trafi\u011fini izler ve gelen veya [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":546,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[273,183,91,182,184,292,185,220],"class_list":["post-750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-duvari","tag-en","tag-guvenlik","tag-icin","tag-iyi","tag-linux","tag-uygulamalar","tag-yapilandirmasi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar - Cesrey Web Hosting Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar - Cesrey Web Hosting Blog\" \/>\n<meta property=\"og:description\" content=\"Linux sistemi, a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemidir ve bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. Ancak, Linux gibi a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemi kullanmak, bilgisayar\u0131n\u0131z\u0131 \u00e7e\u015fitli siber sald\u0131r\u0131lara kar\u015f\u0131 daha savunmas\u0131z hale getirebilir. Bu nedenle, Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sisteminiz i\u00e7in en iyi uygulamalardan biridir. Linux g\u00fcvenlik duvar\u0131, a\u011f trafi\u011fini izler ve gelen veya [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\" \/>\n<meta property=\"og:site_name\" content=\"Cesrey Web Hosting Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-29T14:36:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-29T14:37:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-cekirdegi-5-6-sona-erdi-linux-cekirdegi-5-7-icin-yukseltme-zamani-geldi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kader Kele\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kader Kele\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\"},\"author\":{\"name\":\"Kader Kele\u015f\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\"},\"headline\":\"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar\",\"datePublished\":\"2023-04-29T14:36:15+00:00\",\"dateModified\":\"2023-04-29T14:37:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\"},\"wordCount\":397,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"keywords\":[\"duvar\u0131\",\"en\",\"g\u00fcvenlik\",\"i\u00e7in\",\"iyi\",\"linux\",\"uygulamalar\",\"yap\u0131land\u0131rmas\u0131\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\",\"url\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\",\"name\":\"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar - Cesrey Web Hosting Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#website\"},\"datePublished\":\"2023-04-29T14:36:15+00:00\",\"dateModified\":\"2023-04-29T14:37:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/cesrey.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cesrey.com\/blog\/#website\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"name\":\"Cesrey Web Hosting Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cesrey.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\",\"name\":\"Cesrey Web Hosting Blog\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"contentUrl\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"width\":1470,\"height\":391,\"caption\":\"Cesrey Web Hosting Blog\"},\"image\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\",\"name\":\"Kader Kele\u015f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"caption\":\"Kader Kele\u015f\"},\"url\":\"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar - Cesrey Web Hosting Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/","og_locale":"tr_TR","og_type":"article","og_title":"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar - Cesrey Web Hosting Blog","og_description":"Linux sistemi, a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemidir ve bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. Ancak, Linux gibi a\u00e7\u0131k kaynak kodlu bir i\u015fletim sistemi kullanmak, bilgisayar\u0131n\u0131z\u0131 \u00e7e\u015fitli siber sald\u0131r\u0131lara kar\u015f\u0131 daha savunmas\u0131z hale getirebilir. Bu nedenle, Linux g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sisteminiz i\u00e7in en iyi uygulamalardan biridir. Linux g\u00fcvenlik duvar\u0131, a\u011f trafi\u011fini izler ve gelen veya [&hellip;]","og_url":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/","og_site_name":"Cesrey Web Hosting Blog","article_published_time":"2023-04-29T14:36:15+00:00","article_modified_time":"2023-04-29T14:37:46+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-cekirdegi-5-6-sona-erdi-linux-cekirdegi-5-7-icin-yukseltme-zamani-geldi.jpg","type":"image\/jpeg"}],"author":"Kader Kele\u015f","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Kader Kele\u015f","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#article","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/"},"author":{"name":"Kader Kele\u015f","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a"},"headline":"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar","datePublished":"2023-04-29T14:36:15+00:00","dateModified":"2023-04-29T14:37:46+00:00","mainEntityOfPage":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/"},"wordCount":397,"commentCount":0,"publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"keywords":["duvar\u0131","en","g\u00fcvenlik","i\u00e7in","iyi","linux","uygulamalar","yap\u0131land\u0131rmas\u0131"],"articleSection":["Linux"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/","url":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/","name":"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar - Cesrey Web Hosting Blog","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/#website"},"datePublished":"2023-04-29T14:36:15+00:00","dateModified":"2023-04-29T14:37:46+00:00","breadcrumb":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-duvari-yapilandirmasi-icin-en-iyi-uygulamalar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/cesrey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar"}]},{"@type":"WebSite","@id":"https:\/\/cesrey.com\/blog\/#website","url":"https:\/\/cesrey.com\/blog\/","name":"Cesrey Web Hosting Blog","description":"","publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cesrey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/cesrey.com\/blog\/#organization","name":"Cesrey Web Hosting Blog","url":"https:\/\/cesrey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","contentUrl":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","width":1470,"height":391,"caption":"Cesrey Web Hosting Blog"},"image":{"@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a","name":"Kader Kele\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","caption":"Kader Kele\u015f"},"url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/"}]}},"_links":{"self":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/comments?post=750"}],"version-history":[{"count":1,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/750\/revisions"}],"predecessor-version":[{"id":760,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/750\/revisions\/760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media\/546"}],"wp:attachment":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media?parent=750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/categories?post=750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/tags?post=750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}