ngeriiiiiii bero, ZenPad C7.0 with Intel Atom X3

Perkembangan teknologi komunikasi memang tidak bisa disandingkan dengan naiknya gaji pegawai. Haha, gaji pegawai yang sangat lambat merangkak, namun perkembangan teknologi super wuss wuss, barang sekarang baru bisa jadi besok lusa sudah menjadi barang kuno. Kemarin ane swempet ngiri sama beberapa smartphone yang menggunakan ram samapai dengan 4GB. Heh, gimana kagak, laptop yang ane pake […]

Ten Commandments of Computer Ethics

The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper “In Pursuit of a ‘Ten Commandments’ for Computer Ethics” by Ramon C. Barquin as a means to create “a set of standards to guide and instruct people in the ethical use of computers.” […]

NEWS: Ngabubur-IT 2015

Buat kamu-kamu mahasiswa, pelajar, atau aktivis yang berpolah dibidang IT dan domisili di Bantul dan sekitarnya mungkin lumayan nih kalau bisa join ke Ngabubur-IT 2015.  Ngabubur-IT 2015 ini diadakan oleh komunitas Ikatan Mahasiswa Bantul, dan yang akan menjadi topik adalah, “Ancaman Undang-undang  No.11 Tahun 2008”. Yaitu kurang lebih kita mengenalnya dengan UU ITE, Informasi dan […]

Tips Biar Bisa Cinta Sama Terminal Linux

Mungkin ketika pertama kali kita denger kata OS berbasis kernel linux, itu yang muncul di pikiran yaa mungkin ribet, susah, ngeri, apalah pokoknya. Banyak banget anggapan bagi mereka yang belum kenal betulan. Tapi ketika kita mau mengenal OS yang kemudian dikenal sebagai distro ini, yakin sumpah pasti, ente bakalan ketagihan buat ngoprek πŸ˜€ Distro Linux […]

Hiburanku sekedar 8 Ball Poll

BIsmillah….Assalamu’alaikum… hehe πŸ˜€ Gimana kabar kawan-kawan BL0Gnoters? sehat tho? semoga aja dah πŸ˜€ Kali ini ane sedikit cerita entang hiburan kalo lagi penat sama coding. Kalo ente mungkin lebih suka game-game berat, nah karena ane ngga bisa ngegame, alhasil game yang ane bisa mainkan cuma ini. 8 Ball Pool. 8 Pool Ball adalah game yang […]

10 Effective Ways to Become a Good Programmer

Working as a software programmer in IT industry, one thing that drives us daily to the work place; is that fun and passion lies in programming. But to make that programming a fun and to get an eternal elation out of it, one needs to learn and adhere to some basics which make you a […]

HACKING WIFI: BYPASS CAPTIVE PORTAL

Today is not so well, but also not a bad day. I’m so tired from doing my job last night(ind: tugas kampus, mana jarang tidur, hee ). OK, to refresh my mind, i’ll share about how to hacking wifi, if use the captive portal for the protection. Captive portal is router machine or gateway whos […]

CEHV7 : Download Certified Ethical Hacker Video (All Chapters)

  Are you confused to learning CEHV7 from the e-book? Looking for something defference?  There is the video of CEHV7. You can download all of them πŸ™‚ CEHV7- 01 -Certified Ethical Hacker Series Introduction.flvCEHV7- 02 -Introduction to Certified Ethical Hacking.flvCEHV7- 03 – VMWare and Linux .flvCEHV7- 04 – Footprinting and Reconnaissance Part 1.flvCEHV7- 05 – […]

Wireless Security (Hidden SSID, MAC filtering, firewall captive portall)

Mac Filtering MAC Address Filtering merupakan metode filtering untuk membatasi hak akses dari MAC Address yang bersangkutanHampir setiap wireless access point maupun router difasilitasi dengan keamanan MAC Filtering. MAC filters ini juga merupakan metode sistem keamanan yang baik dalam WLAN, karena peka terhadap jenis gangguan seperti:pencurian pc card dalam MAC filter dari suatu access pointsniffing […]

Elements of information system security: the CIA triad + Non Repudiation and Autentication

Confidentiality   When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties. Information has value, especially in today’s world. Bank account statements, personal information, credit card numbers, trade secrets, government documents. Every one has information they wish to keep a secret. Protecting such information is a […]