M. Niyazi Alpay
M. Niyazi Alpay
M. Niyazi Alpay

I've been interested in computer systems since a very young age, and I've been programming since 2005. I have knowledge in PHP, MySQL, Python, MongoDB, and Linux.

 

about.me/Cryptograph

The Story of Kevin Mitnick, the Greatest Hacker of All Time

The Story of Kevin Mitnick, the Greatest Hacker of All Time

Kevin Mitnick, born on August 6, 1963, is considered one of the greatest hackers of all time. After spending five years in prison, he was released on parole in 2000. One of the conditions of his parol

Pulling Information by Associating Tables in Database (Inner Join)

Pulling Information by Associating Tables in Database (Inner Join)

To fetch data from the database, we use the SELECT command. With a command like SELECT * FROM table_name, we retrieve our data from the table_name table. If we need to fetch data based on a condition,

PHP - Connecting to MySQL Database and Reading Information (Illustrated Explanation)

PHP - Connecting to MySQL Database and Reading Information (Illustrated Explanation)

The database we will connect to: ornek_veritabani We have created our database and our table named isim_listesi. We defined the type of the column named id as int, which means integer, and defined

Preparing, Calling and Using Functions in PHP

Preparing, Calling and Using Functions in PHP

Functions provide us with processed information that is given, requested, or generated at that moment. For example, we can create a table with the properties we want using a function, or we can create

MongoDB Installation and Configuration (User Authorization and SSL Installation)

MongoDB Installation and Configuration (User Authorization and SSL Installation)

For installing MongoDB on a Linux operating system, you first need to add the MongoDB repositories to your system. Linux Redhat / CentOS Step 1: You need to add the following information into the fi

Listing Users by Number of Topics in Mysql

Listing Users by Number of Topics in Mysql

We have two different tables, one for topics opened and the other for users.In the system, the id information of the user who opens the topic is also kept in the table where the topics are found.In th

What is the Deep Web and How to Access It?

What is the Deep Web and How to Access It?

Recently, it's been a place I've researched, spent time on, and examined. The hidden websites that search engines cannot reach are called the Deep Web. Their addresses are very complex and hard to re

Linux Command Line - Common Linux Commands

Linux Command Line - Common Linux Commands

Today, Linux operating systems come with a beautiful interface designed for end-users, but the majority of tasks can still be done via the command line. The reason many computer users shy away from Li

PHP Object Oriented Programming

PHP Object Oriented Programming

Object-oriented programming (OOP) is a technology used for software development. OOP facilitates component programming with its standards. C# is a language based on OOP. There are many objects availab

What is Nmap - Using Nmap in General

What is Nmap - Using Nmap in General

Nmap is a security scanner software developed by computer networks expert Gordon Lyon (Fyodor) using C/C++ and Python languages. It can map the scanned network, observe the status of services running