{"id":611,"date":"2014-11-13T10:18:57","date_gmt":"2014-11-13T15:18:57","guid":{"rendered":"http:\/\/www.kaspersky.com.tr\/blog\/?p=611"},"modified":"2019-11-15T15:06:22","modified_gmt":"2019-11-15T12:06:22","slug":"hacker-ne-demektir","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/hacker-ne-demektir\/611\/","title":{"rendered":"Hacker ne demektir?"},"content":{"rendered":"<p>Hacker ne demektir?<\/p>\n<p>Hacker ibaresi ilk ba\u015flarda \u00e7ok iyi programc\u0131lar i\u00e7in kullan\u0131l\u0131rd\u0131. Bug\u00fcn ise bir bilgisayardaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak o bilgisayara izinsiz giri\u015f yapan ki\u015filer i\u00e7in bu terim kullan\u0131l\u0131yor. Bunu asl\u0131nda elektronik h\u0131rs\u0131z olarak da d\u00fc\u015f\u00fcnebilirsiniz. Hacker&#8217;lar s\u00fcrekli ki\u015fisel bilgisayarlara ve b\u00fcy\u00fck a\u011flara sald\u0131r\u0131lar d\u00fczenlerler. Bu \u015fekilde ula\u015fabildikleri bilgisayarlara zararl\u0131 programlar y\u00fckleyip, gizli bilgileri \u00e7alarlar. Bazen de ele ge\u00e7irdikleri bu bilgisayarlar\u0131 spam eposta g\u00f6ndermek i\u00e7in kullan\u0131rlar.<\/p>\n<p>Hackerler programlar\u0131n\u0131zdaki anahtar deliklerini (g\u00fcvenlik a\u00e7\u0131klar\u0131) kullanarak bilgisayar\u0131n\u0131za giren elektronik h\u0131rs\u0131zlar gibidir. G\u00fcvenlik duvar\u0131 yaz\u0131l\u0131mlar\u0131 kullanarak kendinizi hacker sald\u0131r\u0131lar\u0131ndan koruyabilirsiniz. G\u00fcvenlik duvar\u0131 programlar\u0131 genellikle anti-vir\u00fcs yaz\u0131l\u0131m paketlerinin bir par\u00e7as\u0131 olarak gelmektedir. Bu programlar\u0131 potansiyel izinsiz giri\u015fleri tespit eder ve ki\u015fisel bilgisayar\u0131n\u0131z\u0131 hacker sald\u0131r\u0131lar\u0131na kar\u015f\u0131 g\u00f6r\u00fcnmez hale getirirler.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacker ne demektir? Hacker ibaresi ilk ba\u015flarda \u00e7ok iyi programc\u0131lar i\u00e7in kullan\u0131l\u0131rd\u0131. Bug\u00fcn ise bir bilgisayardaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak o bilgisayara izinsiz giri\u015f yapan ki\u015filer i\u00e7in bu terim kullan\u0131l\u0131yor. Bunu<\/p>\n","protected":false},"author":32,"featured_media":612,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[],"class_list":{"0":"post-611","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hacker-ne-demektir\/611\/"}],"acf":[],"banners":"","maintag":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"predecessor-version":[{"id":7277,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/611\/revisions\/7277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/612"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}