top of page
Ali Tuna

Ali Tuna

Admin
More actions

Profile

Join date: Aug 14, 2025

Posts (13)

Nov 2, 20252 min
My Very First Simple Smart Contract
// SPDX-License-Identifier: MIT pragma solidity ^0.8.1; contract SimpleContract { event TransferMoney(address from, address to, uint amount); event WithdrawMoney(address from, uint amount); event Deposit(address from, uint amount); mapping(address => uint) public balances; // 🔹 Deposit Ether into the contract function deposit() external payable { require(msg.value > 0, "Send some Ether"); balances[msg.sender] += msg.value; emit Deposit(msg.sender, msg.value); } // 🔹 Transfer balance...

11
0
Nov 1, 20254 min
5 Ethical Hacking Tools That Every Developer Should Use
Introduction Understanding how attackers reconnoiter, probe, and test systems is invaluable for defenders. This article explains five essential security tools — Nmap, Burp Suite, Metasploit, Wireshark (tshark) and Hydra — focusing on why each tool is used, safe lab-ready command snippets you can copy/paste on localhost , minimal Python helpers that parse their output, and exactly what actions defenders should take when findings appear. All examples are intentionally non-destructive  and use...

4
0
Nov 1, 20254 min
7 Things About CyberSecurity Every Developer Should Know.
Before we dive in — if you haven’t checked my previous posts on [Cybersecurity Roadmap]  and [Essential Linux Commands for Security Professionals] , the links are down below. This post builds on those foundations, connecting real-world developer practices with cybersecurity awareness. Why Is Important Protection Awareness? Cybersecurity protection awareness is crucial because it reduces human error, which is the root cause of many cyber incidents. By learning to identify phishing emails,...

8
0
bottom of page