Confidentiality When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized […]
Sutriman
WHAT IS A SECURE SYSTEM?
NO SYSTEM IS SAFE. The sentence was to convince us that all systems can be attacked and can be […]
LINUX: Mengubah Ijin Akses Dengan Metode UGO dan Oktal
Ijin akses adalah sebuah aturan yang memberikan hak akses kepada user-user tertentu. Bisa kepada sistem atau pun kepada komputer. Di […]
LINUX: HOW TO INSTALL SOFTWARE CENTER ON KALI LINUX
You need to add the repositories first. Edit /etc/apt/sources.list and add these two lines deb http://http.kali.org/ /kali main […]
BOOK: Download The Hacker Playbook 2: Practical Guide To Penetration Testing
” Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, […]
LINUX: install offline virtualbox
>for online install#apt-get install virtualbox >for offline install>>Download the deb package>>and open your terminal, move to your directory where you […]
BERBAGAI METODE HACKING WEBSITE
Berbagai macam cara untuk menyerang web application web application merupakan berbagai macam aplikasi yang dijalankan di web, dengan kata lain […]
ARSIP TUGAS | BASIS DATA| 4NF
TUGAS PENGGANTI KULIAH 27/5/2015 – 4NF NAMA : ——– NIM : 1315016058 The relation shown in Figure 14.11 lists members […]