melih.com Open in urlscan Pro
162.255.25.93  Public Scan

Submitted URL: http://www.melih.com/
Effective URL: https://melih.com/blog/
Submission: On September 27 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

     
 * home
 * about me
 * blog
 * about comodo
 * video blog


BLOG





3 STEPS TO SOFTWARE DEVELOPMENT

November 13, 2021 | Posted by Melih, under Uncategorized



read more
views: 3295, comments: 0


WHAT IS MALWARE/RANSOMWARE & WHAT IS MALWARE/RANSOMWARE PROBLEM?

July 3, 2021 | Posted by Melih, under Uncategorized

Malware/Ransomware is a legitimate code (within context of the CPU instructions)
doing illegitimate things.

So Code is legit because CPU understands and executes the code/instructions in
this executable file that we call malware/ransomware. However what this
code/instructions do is bad stuff for us… What is Malware/Ransomware Problem?

You executing/running this malware/ransomware!

If

read more
views: 4404, comments: 0


THREE CYBERSECURITY POSTURES – BUT ONLY ONE IS PRACTICAL!

July 3, 2021 | Posted by Melih, under Uncategorized

 

Today the vast majority of cybersecurity world works with: (1) Allow ALL, deny
BAD

They try to Deny BAD by trying to detect it by using AI,ML, Heuristic, Behavior
Analysis, EDR.  I must say, the results speak for itself! Breach after breach,
damage after damage! “The amount of money spent in cybersecurity”

read more
views: 4910, 1 year ago comments: 0


GUILTY UNTIL PROVEN INNOCENT – NEW STANDARD IN CYBERSECURITY POSTURE

January 10, 2021 | Posted by Melih, under Uncategorized

Its 10pm night time…..someone knocks on your door…you answer the door….a total
stranger……you invite this stranger in…….ask him to sit on your sofa……he is
sitting there……it now has been 24 hours….this stranger is still sitting on your
sofa… Can you say he is a good guy?

Of course not!

Absence of

read more
views: 16409, comments: 0


SOFTWARE CODE VS BUSINESS PROCESS – NO DIFFERENCE!

January 2, 2021 | Posted by Melih, under Blog

A Software is made up of instruction set, that we call a piece of “Code”. A
programmer writes this code and once compiled and packaged becomes, 
Software/Application.



 

When you launch this Application/Software, the code is sent to CPU for those
instructions to execute. For example this piece of Code

read more
views: 17360, comments: 0


POSTS NAVIGATION

1 2 … 18 Next
Comodo Products

Antivirus

Internet Security

Endpoint Protection

Best Free RMM Software

Antivirus for Windows 10

Antivirus for Windows 7

Antivirus for Windows 8

Videos
Hey retailers! That?s how to protect your customers? credit card data


More Videos...

  September 2022    1234 567891011 12131415161718 19202122232425 2627282930