Today is not so well, but also not a bad day. I’m so tired from doing my job last night(ind: […]
Category: Security and Hacking
CEHV7 : Download Certified Ethical Hacker Video (All Chapters)
Are you confused to learning CEHV7 from the e-book? Looking for something defference? There is the video of CEHV7. […]
Wireless Security (Hidden SSID, MAC filtering, firewall captive portall)
Mac Filtering MAC Address Filtering merupakan metode filtering untuk membatasi hak akses dari MAC Address yang bersangkutanHampir setiap wireless access […]
Elements of information system security: the CIA triad + Non Repudiation and Autentication
Confidentiality When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized […]
WHAT IS A SECURE SYSTEM?
NO SYSTEM IS SAFE. The sentence was to convince us that all systems can be attacked and can be […]
BOOK: Download The Hacker Playbook 2: Practical Guide To Penetration Testing
” Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, […]
BERBAGAI METODE HACKING WEBSITE
Berbagai macam cara untuk menyerang web application web application merupakan berbagai macam aplikasi yang dijalankan di web, dengan kata lain […]
Pentingnya Keamanan Sistem Informasi
Kata ‘aman’ merupakan sebuah kata yang sangat penting bagi sebagian besar orang. Baik itu perseorangan maupun kelompok. Karena sebagian orang […]
Resume Chapter 19: Keamanan | BASIS DATA
KEAMANAN KEAMANAN BASIS DATA Data merupakan salah satu aspek penting yang harus diatur dan di kontrol seperti halnya kebutuhan lain […]
Security Basic
from: http://kpvz7kpmcmne52qf.onion/wiki/index.php/Security_Basics What is encryption? Encryption is a method of encoding information in such a way that it is computationally […]