{"id":798,"date":"2023-05-01T22:01:42","date_gmt":"2023-05-01T19:01:42","guid":{"rendered":"https:\/\/cesrey.com\/blog\/?p=798"},"modified":"2023-05-01T22:02:40","modified_gmt":"2023-05-01T19:02:40","slug":"linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari","status":"publish","type":"post","link":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/","title":{"rendered":"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131"},"content":{"rendered":"<p>Linux i\u015fletim sistemi, g\u00fcn\u00fcm\u00fczde bir\u00e7ok kurum ve kurulu\u015f taraf\u0131ndan kullan\u0131lmaktad\u0131r. Bu nedenle, Linux i\u015fletim sistemi y\u00f6netimi ve g\u00fcvenli\u011fi b\u00fcy\u00fck \u00f6nem ta\u015f\u0131maktad\u0131r. Linux i\u015fletim sistemi y\u00f6netimi i\u00e7in bir\u00e7ok g\u00fcvenlik denetimi arac\u0131 bulunmaktad\u0131r. Bu ara\u00e7lar, sistem y\u00f6neticilerinin g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit etmelerine ve bunlar\u0131 gidermelerine yard\u0131mc\u0131 olur.<\/p>\n<h2>G\u00fcvenlik Denetimi Ara\u00e7lar\u0131<\/h2>\n<h3>1. Nessus<\/h3>\n<p>Nessus, en pop\u00fcler g\u00fcvenlik denetimi ara\u00e7lar\u0131ndan biridir. Bu ara\u00e7, a\u011fa ba\u011fl\u0131 cihazlar\u0131 tarar ve g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit eder. Ayr\u0131ca, bu a\u00e7\u0131klar\u0131n nas\u0131l giderilebilece\u011fi hakk\u0131nda \u00f6neriler sunar.<\/p>\n<h3>2. Nmap<\/h3>\n<p>Nmap, a\u011f tarama arac\u0131 olarak kullan\u0131l\u0131r. Bu ara\u00e7, a\u011fa ba\u011fl\u0131 cihazlar\u0131n IP adreslerini tespit eder ve bu cihazlar\u0131n a\u00e7\u0131k portlar\u0131n\u0131 tarar. Bu sayede, g\u00fcvenlik a\u00e7\u0131klar\u0131 daha kolay tespit edilebilir.<\/p>\n<h3>3. Wireshark<\/h3>\n<p>Wireshark, a\u011f trafi\u011fini analiz etmek i\u00e7in kullan\u0131l\u0131r. Bu ara\u00e7, a\u011fa ba\u011fl\u0131 cihazlar aras\u0131ndaki ileti\u015fimi izler ve bu ileti\u015fimdeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit eder. Ayr\u0131ca, bu ileti\u015fimin i\u00e7eri\u011fini de g\u00f6r\u00fcnt\u00fcleyebilir.<\/p>\n<h3>4. OpenVAS<\/h3>\n<p>OpenVAS, a\u011f g\u00fcvenli\u011fi denetleme arac\u0131d\u0131r. Bu ara\u00e7, a\u011fa ba\u011fl\u0131 cihazlarda bulunan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tarar ve bunlar\u0131 tespit eder. Ayr\u0131ca, bu a\u00e7\u0131klar\u0131n nas\u0131l giderilebilece\u011fi hakk\u0131nda \u00f6neriler sunar.<\/p>\n<h2>Sonu\u00e7<\/h2>\n<p>Linux i\u015fletim sistemi y\u00f6netimi i\u00e7in g\u00fcvenlik denetimi ara\u00e7lar\u0131, sistem y\u00f6neticilerinin i\u015flerini kolayla\u015ft\u0131ran ve g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n tespit edilmesine yard\u0131mc\u0131 olan ara\u00e7lard\u0131r. Bu ara\u00e7lar\u0131n kullan\u0131m\u0131, Linux i\u015fletim sistemi y\u00f6netimi ve g\u00fcvenli\u011fi a\u00e7\u0131s\u0131ndan olduk\u00e7a \u00f6nemlidir ve bu ara\u00e7lar d\u00fczenli olarak kullan\u0131lmal\u0131d\u0131r.<\/p>\n<div class=\"newspaper-x-tags\"><strong>TAGS: <\/strong><span><a href=\"https:\/\/cesrey.com\/blog\/tag\/araclari\/\" rel=\"tag\">ara\u00e7lar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/denetimi\/\" rel=\"tag\">denetimi<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/guvenlik\/\" rel=\"tag\">g\u00fcvenlik<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/icin\/\" rel=\"tag\">i\u00e7in<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/i%cc%87sletim\/\" rel=\"tag\">i\u0307\u015fletim<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/linux\/\" rel=\"tag\">linux<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/sistemi\/\" rel=\"tag\">sistemi<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/yonetimi\/\" rel=\"tag\">y\u00f6netimi<\/a> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux i\u015fletim sistemi, g\u00fcn\u00fcm\u00fczde bir\u00e7ok kurum ve kurulu\u015f taraf\u0131ndan kullan\u0131lmaktad\u0131r. Bu nedenle, Linux i\u015fletim sistemi y\u00f6netimi ve g\u00fcvenli\u011fi b\u00fcy\u00fck \u00f6nem ta\u015f\u0131maktad\u0131r. Linux i\u015fletim sistemi y\u00f6netimi i\u00e7in bir\u00e7ok g\u00fcvenlik denetimi arac\u0131 bulunmaktad\u0131r. Bu ara\u00e7lar, sistem y\u00f6neticilerinin g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit etmelerine ve bunlar\u0131 gidermelerine yard\u0131mc\u0131 olur. G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 1. Nessus Nessus, en pop\u00fcler g\u00fcvenlik denetimi ara\u00e7lar\u0131ndan [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[333,387,91,182,316,292,317,59],"class_list":["post-798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-araclari","tag-denetimi","tag-guvenlik","tag-icin","tag-isletim","tag-linux","tag-sistemi","tag-yonetimi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 - Cesrey Web Hosting Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 - Cesrey Web Hosting Blog\" \/>\n<meta property=\"og:description\" content=\"Linux i\u015fletim sistemi, g\u00fcn\u00fcm\u00fczde bir\u00e7ok kurum ve kurulu\u015f taraf\u0131ndan kullan\u0131lmaktad\u0131r. Bu nedenle, Linux i\u015fletim sistemi y\u00f6netimi ve g\u00fcvenli\u011fi b\u00fcy\u00fck \u00f6nem ta\u015f\u0131maktad\u0131r. Linux i\u015fletim sistemi y\u00f6netimi i\u00e7in bir\u00e7ok g\u00fcvenlik denetimi arac\u0131 bulunmaktad\u0131r. Bu ara\u00e7lar, sistem y\u00f6neticilerinin g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit etmelerine ve bunlar\u0131 gidermelerine yard\u0131mc\u0131 olur. G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 1. Nessus Nessus, en pop\u00fcler g\u00fcvenlik denetimi ara\u00e7lar\u0131ndan [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\" \/>\n<meta property=\"og:site_name\" content=\"Cesrey Web Hosting Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-01T19:01:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-01T19:02:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-nedir.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kader Kele\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kader Kele\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\"},\"author\":{\"name\":\"Kader Kele\u015f\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\"},\"headline\":\"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131\",\"datePublished\":\"2023-05-01T19:01:42+00:00\",\"dateModified\":\"2023-05-01T19:02:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\"},\"wordCount\":331,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"keywords\":[\"ara\u00e7lar\u0131\",\"denetimi\",\"g\u00fcvenlik\",\"i\u00e7in\",\"i\u0307\u015fletim\",\"linux\",\"sistemi\",\"y\u00f6netimi\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\",\"url\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\",\"name\":\"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 - Cesrey Web Hosting Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#website\"},\"datePublished\":\"2023-05-01T19:01:42+00:00\",\"dateModified\":\"2023-05-01T19:02:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/cesrey.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cesrey.com\/blog\/#website\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"name\":\"Cesrey Web Hosting Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cesrey.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\",\"name\":\"Cesrey Web Hosting Blog\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"contentUrl\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"width\":1470,\"height\":391,\"caption\":\"Cesrey Web Hosting Blog\"},\"image\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\",\"name\":\"Kader Kele\u015f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"caption\":\"Kader Kele\u015f\"},\"url\":\"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 - Cesrey Web Hosting Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/","og_locale":"tr_TR","og_type":"article","og_title":"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 - Cesrey Web Hosting Blog","og_description":"Linux i\u015fletim sistemi, g\u00fcn\u00fcm\u00fczde bir\u00e7ok kurum ve kurulu\u015f taraf\u0131ndan kullan\u0131lmaktad\u0131r. Bu nedenle, Linux i\u015fletim sistemi y\u00f6netimi ve g\u00fcvenli\u011fi b\u00fcy\u00fck \u00f6nem ta\u015f\u0131maktad\u0131r. Linux i\u015fletim sistemi y\u00f6netimi i\u00e7in bir\u00e7ok g\u00fcvenlik denetimi arac\u0131 bulunmaktad\u0131r. Bu ara\u00e7lar, sistem y\u00f6neticilerinin g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit etmelerine ve bunlar\u0131 gidermelerine yard\u0131mc\u0131 olur. G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 1. Nessus Nessus, en pop\u00fcler g\u00fcvenlik denetimi ara\u00e7lar\u0131ndan [&hellip;]","og_url":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/","og_site_name":"Cesrey Web Hosting Blog","article_published_time":"2023-05-01T19:01:42+00:00","article_modified_time":"2023-05-01T19:02:40+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-nedir.jpg","type":"image\/jpeg"}],"author":"Kader Kele\u015f","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Kader Kele\u015f","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#article","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/"},"author":{"name":"Kader Kele\u015f","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a"},"headline":"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131","datePublished":"2023-05-01T19:01:42+00:00","dateModified":"2023-05-01T19:02:40+00:00","mainEntityOfPage":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/"},"wordCount":331,"commentCount":0,"publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"keywords":["ara\u00e7lar\u0131","denetimi","g\u00fcvenlik","i\u00e7in","i\u0307\u015fletim","linux","sistemi","y\u00f6netimi"],"articleSection":["Linux"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/","url":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/","name":"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131 - Cesrey Web Hosting Blog","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/#website"},"datePublished":"2023-05-01T19:01:42+00:00","dateModified":"2023-05-01T19:02:40+00:00","breadcrumb":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-isletim-sistemi-yonetimi-icin-guvenlik-denetimi-araclari\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/cesrey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux \u0130\u015fletim Sistemi Y\u00f6netimi i\u00e7in G\u00fcvenlik Denetimi Ara\u00e7lar\u0131"}]},{"@type":"WebSite","@id":"https:\/\/cesrey.com\/blog\/#website","url":"https:\/\/cesrey.com\/blog\/","name":"Cesrey Web Hosting Blog","description":"","publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cesrey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/cesrey.com\/blog\/#organization","name":"Cesrey Web Hosting Blog","url":"https:\/\/cesrey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","contentUrl":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","width":1470,"height":391,"caption":"Cesrey Web Hosting Blog"},"image":{"@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a","name":"Kader Kele\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","caption":"Kader Kele\u015f"},"url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/"}]}},"_links":{"self":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/comments?post=798"}],"version-history":[{"count":1,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/798\/revisions"}],"predecessor-version":[{"id":808,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/798\/revisions\/808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media?parent=798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/categories?post=798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/tags?post=798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}