{"id":861,"date":"2023-05-04T23:08:33","date_gmt":"2023-05-04T20:08:33","guid":{"rendered":"https:\/\/cesrey.com\/blog\/?p=861"},"modified":"2023-05-04T23:13:11","modified_gmt":"2023-05-04T20:13:11","slug":"linux-sunucu-yonetimi-icin-ssh-yapilandirmasi","status":"publish","type":"post","link":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/","title":{"rendered":"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131"},"content":{"rendered":"<p>Linux sunucular\u0131, i\u015fletmelerde kullan\u0131lan en yayg\u0131n sunucu sistemlerinden biridir. Bu sunucular\u0131n y\u00f6netimi, g\u00fcvenli\u011fi ve eri\u015fimi i\u00e7in SSH, yani Secure Shell kullan\u0131lmas\u0131 \u00f6nerilir. SSH, a\u011fda g\u00fcvenli bir \u015fekilde ileti\u015fim kurmak i\u00e7in kullan\u0131lan bir protokold\u00fcr ve bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131 taraf\u0131ndan varsay\u0131lan olarak sunulur.<\/p>\n<p>SSH yap\u0131land\u0131rmas\u0131, sunucunun g\u00fcvenlik seviyesini art\u0131rmaya yard\u0131mc\u0131 olur. \u0130\u015fte, Linux sunucu y\u00f6netimi i\u00e7in SSH yap\u0131land\u0131rmas\u0131 ad\u0131mlar\u0131:<\/p>\n<h2>1. SSH Ba\u011flant\u0131s\u0131 i\u00e7in Root Giri\u015fi Kapat\u0131lmal\u0131d\u0131r<\/h2>\n<p>SSH ba\u011flant\u0131lar\u0131n\u0131n root kullan\u0131c\u0131s\u0131 ile yap\u0131lmas\u0131, sunucunun g\u00fcvenli\u011fi i\u00e7in b\u00fcy\u00fck bir risk olu\u015fturabilir. Bu nedenle, SSH ba\u011flant\u0131lar\u0131 i\u00e7in root giri\u015fi kapat\u0131lmal\u0131d\u0131r. Root giri\u015finin kapat\u0131lmas\u0131, yetkisiz eri\u015fimleri engelleyerek sunucunun daha g\u00fcvenli hale gelmesini sa\u011flar.<\/p>\n<h2>2. SSH Anahtar Tabanl\u0131 Kimlik Do\u011frulamas\u0131 Kullan\u0131lmal\u0131d\u0131r<\/h2>\n<p>SSH anahtar tabanl\u0131 kimlik do\u011frulamas\u0131, kullan\u0131c\u0131 ad\u0131 ve \u015fifre yerine anahtarlar kullanarak kimlik do\u011frulama yapar. Bu y\u00f6ntem, g\u00fcvenli\u011fi art\u0131rmaya yard\u0131mc\u0131 olur. Anahtar tabanl\u0131 kimlik do\u011frulamas\u0131 i\u00e7in, \u00f6ncelikle bir anahtar \u00e7ifti olu\u015fturulmas\u0131 gerekir. Anahtar \u00e7ifti olu\u015fturulduktan sonra, anahtar\u0131n sunucuya y\u00fcklenmesi gerekir. Bu y\u00f6ntem, \u015fifrelerin k\u0131r\u0131lmas\u0131n\u0131 \u00f6nleyerek sunucunun g\u00fcvenli\u011fini art\u0131r\u0131r.<\/p>\n<h2>3. SSH Portu De\u011fi\u015ftirilmelidir<\/h2>\n<p>SSH ba\u011flant\u0131lar\u0131 i\u00e7in varsay\u0131lan port numaras\u0131 22&#8217;dir. Bu nedenle, sald\u0131rganlar taraf\u0131ndan hedef al\u0131nma riski y\u00fcksektir. Port numaras\u0131n\u0131n de\u011fi\u015ftirilmesi, sald\u0131r\u0131 riskini azalt\u0131r. Ancak, yap\u0131lacak de\u011fi\u015fikliklerin kaydedilmesi gerekir. Bunun yan\u0131 s\u0131ra, ba\u015fka bir portun kullan\u0131lmas\u0131, a\u011fdaki di\u011fer cihazlarla \u00e7ak\u0131\u015fma riskini de azalt\u0131r.<\/p>\n<h2>4. SSH G\u00fcnl\u00fckleri Kontrol Edilmelidir<\/h2>\n<p>SSH g\u00fcnl\u00fckleri, kimin ba\u011fland\u0131\u011f\u0131n\u0131, hangi IP adresinin kullan\u0131ld\u0131\u011f\u0131n\u0131 ve ne zaman ba\u011fland\u0131\u011f\u0131n\u0131 kaydeder. Bu bilgiler, g\u00fcvenlik sorunlar\u0131n\u0131 tespit etmek i\u00e7in kullan\u0131labilir. SSH g\u00fcnl\u00fckleri, d\u00fczenli olarak kontrol edilmelidir. G\u00fcnl\u00fcklerin d\u00fczenli kontrol edilmesi, sald\u0131r\u0131lar\u0131n erken tespit edilmesine yard\u0131mc\u0131 olabilir.<\/p>\n<h2>5. Ge\u00e7ersiz Oturumlar\u0131n Otomatik Olarak Kapat\u0131lmas\u0131 Ayarlanmal\u0131d\u0131r<\/h2>\n<p>SSH oturumlar\u0131, belirli bir s\u00fcre sonra otomatik olarak kapat\u0131lmal\u0131d\u0131r. Bu, otomatik \u00e7\u0131k\u0131\u015f yapmay\u0131 unutan kullan\u0131c\u0131lar\u0131n hesaplar\u0131n\u0131n g\u00fcvende kalmas\u0131na yard\u0131mc\u0131 olur. Bunun i\u00e7in, SSH yap\u0131land\u0131rma dosyas\u0131na birka\u00e7 sat\u0131r kod eklemek gerekiyor. Bu ad\u0131m, sunucunun g\u00fcvenli\u011fi i\u00e7in olduk\u00e7a \u00f6nemlidir.<\/p>\n<p>Yukar\u0131daki ad\u0131mlar, Linux sunucu y\u00f6netimi i\u00e7in SSH yap\u0131land\u0131rmas\u0131nda dikkate al\u0131nmas\u0131 gereken en \u00f6nemli ad\u0131mlard\u0131r. Bu ad\u0131mlar, sunucunun g\u00fcvenli\u011fini art\u0131rmaya yard\u0131mc\u0131 olacakt\u0131r. Linux sunucular\u0131n\u0131n g\u00fcvenli\u011fi, y\u00f6netimi ve eri\u015fimi i\u00e7in SSH yap\u0131land\u0131rmas\u0131 \u00f6nemlidir ve bu ad\u0131mlar\u0131n\u0131n uygulanmas\u0131, sunucunun daha g\u00fcvenli bir hale gelmesini sa\u011flayacakt\u0131r.<\/p>\n<div class=\"newspaper-x-tags\"><strong>TAGS: <\/strong><span><a href=\"https:\/\/cesrey.com\/blog\/tag\/icin\/\" rel=\"tag\">i\u00e7in<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/linux\/\" rel=\"tag\">linux<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/ssh\/\" rel=\"tag\">ssh<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/sunucu\/\" rel=\"tag\">sunucu<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/yapilandirmasi\/\" rel=\"tag\">yap\u0131land\u0131rmas\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/yonetimi\/\" rel=\"tag\">y\u00f6netimi<\/a> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux sunucular\u0131, i\u015fletmelerde kullan\u0131lan en yayg\u0131n sunucu sistemlerinden biridir. Bu sunucular\u0131n y\u00f6netimi, g\u00fcvenli\u011fi ve eri\u015fimi i\u00e7in SSH, yani Secure Shell kullan\u0131lmas\u0131 \u00f6nerilir. SSH, a\u011fda g\u00fcvenli bir \u015fekilde ileti\u015fim kurmak i\u00e7in kullan\u0131lan bir protokold\u00fcr ve bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131 taraf\u0131ndan varsay\u0131lan olarak sunulur. SSH yap\u0131land\u0131rmas\u0131, sunucunun g\u00fcvenlik seviyesini art\u0131rmaya yard\u0131mc\u0131 olur. \u0130\u015fte, Linux sunucu y\u00f6netimi i\u00e7in SSH [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":544,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[182,292,228,132,220,59],"class_list":["post-861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-icin","tag-linux","tag-ssh","tag-sunucu","tag-yapilandirmasi","tag-yonetimi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog\" \/>\n<meta property=\"og:description\" content=\"Linux sunucular\u0131, i\u015fletmelerde kullan\u0131lan en yayg\u0131n sunucu sistemlerinden biridir. Bu sunucular\u0131n y\u00f6netimi, g\u00fcvenli\u011fi ve eri\u015fimi i\u00e7in SSH, yani Secure Shell kullan\u0131lmas\u0131 \u00f6nerilir. SSH, a\u011fda g\u00fcvenli bir \u015fekilde ileti\u015fim kurmak i\u00e7in kullan\u0131lan bir protokold\u00fcr ve bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131 taraf\u0131ndan varsay\u0131lan olarak sunulur. SSH yap\u0131land\u0131rmas\u0131, sunucunun g\u00fcvenlik seviyesini art\u0131rmaya yard\u0131mc\u0131 olur. \u0130\u015fte, Linux sunucu y\u00f6netimi i\u00e7in SSH [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\" \/>\n<meta property=\"og:site_name\" content=\"Cesrey Web Hosting Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-04T20:08:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-04T20:13:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/1674678e8b51d708035a9bdad3bfc16dc9be9aa8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kader Kele\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kader Kele\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\"},\"author\":{\"name\":\"Kader Kele\u015f\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\"},\"headline\":\"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131\",\"datePublished\":\"2023-05-04T20:08:33+00:00\",\"dateModified\":\"2023-05-04T20:13:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\"},\"wordCount\":526,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"keywords\":[\"i\u00e7in\",\"linux\",\"ssh\",\"sunucu\",\"yap\u0131land\u0131rmas\u0131\",\"y\u00f6netimi\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\",\"url\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\",\"name\":\"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#website\"},\"datePublished\":\"2023-05-04T20:08:33+00:00\",\"dateModified\":\"2023-05-04T20:13:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/cesrey.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cesrey.com\/blog\/#website\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"name\":\"Cesrey Web Hosting Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cesrey.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\",\"name\":\"Cesrey Web Hosting Blog\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"contentUrl\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"width\":1470,\"height\":391,\"caption\":\"Cesrey Web Hosting Blog\"},\"image\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\",\"name\":\"Kader Kele\u015f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"caption\":\"Kader Kele\u015f\"},\"url\":\"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/","og_locale":"tr_TR","og_type":"article","og_title":"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog","og_description":"Linux sunucular\u0131, i\u015fletmelerde kullan\u0131lan en yayg\u0131n sunucu sistemlerinden biridir. Bu sunucular\u0131n y\u00f6netimi, g\u00fcvenli\u011fi ve eri\u015fimi i\u00e7in SSH, yani Secure Shell kullan\u0131lmas\u0131 \u00f6nerilir. SSH, a\u011fda g\u00fcvenli bir \u015fekilde ileti\u015fim kurmak i\u00e7in kullan\u0131lan bir protokold\u00fcr ve bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131 taraf\u0131ndan varsay\u0131lan olarak sunulur. SSH yap\u0131land\u0131rmas\u0131, sunucunun g\u00fcvenlik seviyesini art\u0131rmaya yard\u0131mc\u0131 olur. \u0130\u015fte, Linux sunucu y\u00f6netimi i\u00e7in SSH [&hellip;]","og_url":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/","og_site_name":"Cesrey Web Hosting Blog","article_published_time":"2023-05-04T20:08:33+00:00","article_modified_time":"2023-05-04T20:13:11+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/1674678e8b51d708035a9bdad3bfc16dc9be9aa8.jpg","type":"image\/jpeg"}],"author":"Kader Kele\u015f","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Kader Kele\u015f","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#article","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/"},"author":{"name":"Kader Kele\u015f","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a"},"headline":"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131","datePublished":"2023-05-04T20:08:33+00:00","dateModified":"2023-05-04T20:13:11+00:00","mainEntityOfPage":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/"},"wordCount":526,"commentCount":0,"publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"keywords":["i\u00e7in","linux","ssh","sunucu","yap\u0131land\u0131rmas\u0131","y\u00f6netimi"],"articleSection":["Linux"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/","url":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/","name":"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/#website"},"datePublished":"2023-05-04T20:08:33+00:00","dateModified":"2023-05-04T20:13:11+00:00","breadcrumb":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-ssh-yapilandirmasi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/cesrey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux Sunucu Y\u00f6netimi i\u00e7in SSH Yap\u0131land\u0131rmas\u0131"}]},{"@type":"WebSite","@id":"https:\/\/cesrey.com\/blog\/#website","url":"https:\/\/cesrey.com\/blog\/","name":"Cesrey Web Hosting Blog","description":"","publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cesrey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/cesrey.com\/blog\/#organization","name":"Cesrey Web Hosting Blog","url":"https:\/\/cesrey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","contentUrl":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","width":1470,"height":391,"caption":"Cesrey Web Hosting Blog"},"image":{"@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a","name":"Kader Kele\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","caption":"Kader Kele\u015f"},"url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/"}]}},"_links":{"self":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/comments?post=861"}],"version-history":[{"count":1,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/861\/revisions"}],"predecessor-version":[{"id":871,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/861\/revisions\/871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media\/544"}],"wp:attachment":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media?parent=861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/categories?post=861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/tags?post=861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}