CEHV7 : Download Certified Ethical Hacker Video (All Chapters)

July 2, 2015, 1 min read

  Are you confused to learning CEHV7 from the e-book? Looking for something defference?  There is the video of CEHV7. You can download all of them 🙂 CEHV7- 01 -Certified Ethical Hacker Series Introduction.flvCEHV7- 02 -Introduction to Certified Ethical Hacking.flvCEHV7- 03 – VMWare and Linux .flvCEHV7- 04 – Footprinting and Reconnaissance Part 1.flvCEHV7- 05 – […]

Wireless Security (Hidden SSID, MAC filtering, firewall captive portall)

July 1, 2015, 4 min read

Mac Filtering MAC Address Filtering merupakan metode filtering untuk membatasi hak akses dari MAC Address yang bersangkutanHampir setiap wireless access point maupun router difasilitasi dengan keamanan MAC Filtering. MAC filters ini juga merupakan metode sistem keamanan yang baik dalam WLAN, karena peka terhadap jenis gangguan seperti:pencurian pc card dalam MAC filter dari suatu access pointsniffing […]

Elements of information system security: the CIA triad + Non Repudiation and Autentication

, 3 min read

Confidentiality   When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties. Information has value, especially in today’s world. Bank account statements, personal information, credit card numbers, trade secrets, government documents. Every one has information they wish to keep a secret. Protecting such information is a […]

WHAT IS A SECURE SYSTEM?

, 1 min read

   NO SYSTEM IS SAFE. The sentence was to convince us that all systems can be attacked and can be penetrated. HHAAHH ?? So, what‘s a safe system? all the system is impenetrable?    Secure system is a system that can gain time for attackers to attack. In other words, the attacker takes a long […]

LINUX: Mengubah Ijin Akses Dengan Metode UGO dan Oktal

June 30, 2015, 1 min read

Ijin akses adalah sebuah aturan yang memberikan hak akses kepada user-user tertentu. Bisa kepada sistem atau pun kepada komputer. Di dalam sistem unix, ada dua metode untuk merubah ijin akses, yaitu metode UGO dan metode Oktal. Metode UGO U-user G-group O-owner.  U ntuk melihat ijin akses, bisa menggunaka perintah #ls -l Untuk menentukan mana user, […]

LINUX: HOW TO INSTALL SOFTWARE CENTER ON KALI LINUX

, 1 min read

You need to add the repositories first.     Edit /etc/apt/sources.list and add these two lines     deb http://http.kali.org/ /kali main contrib non-free    deb http://http.kali.org/ /wheezy main contrib non-free     In terminal type apt-get update     then try    #apt-get install software-center It should work. Watch the video and subscribe on youtube 😀  

BOOK: Download The Hacker Playbook 2: Practical Guide To Penetration Testing

, 1 min read

    ” Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbookprovides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration […]

LINUX: edit panel kali linux

, 0 min read

LINUX: install offline virtualbox

, 1 min read

>for online install#apt-get install virtualbox >for offline install>>Download the deb package>>and open your terminal, move to your directory where you save the package. and type #dpkg -i packagename.deb More about install offline virtualbox, view on my videos 😀

LINUX: install libreoffice offline on kali linux

, 0 min read