Words of Keamanan Informasi
[S]ebagai salah satu pekerja di bidang kemanan informasi, sepertinya perlu juga bagi diri penulis untuk memahami mengenai ranah lingkup dunia kerja yang digeluti oleh penulis, yaitu Keamanan Informasi...
View ArticleRouted Firewall vs Transparent Firewall
Secara tradisional, Layer-3 firewalls dipasang dan digunakan untuk melakuka filter trafik yang melalui mereka. Firewalls jenis ini umumnya memeriksa header dari paket data mulai dari layer 3 keatas dan...
View ArticleBackTrack 5 R3 Released!
The third release of version 5 of the BackTrack Linux security distribution fixes several bugs discovered since the R2 release in March and adds over 60 new tools. Several of the new tools were...
View ArticleNetwork Security Basic (1) Knowing Resources
When talking about security, one of domain is network security. This domain also have something that can lead security incidents which always raising every day. As the complexcity of the threat...
View ArticleNetwork Security Basic (2) Knowing Threats
the next step after you know your resources, now is the time to understand different threats of each resources that you have. Threat itself is a possible danger that might exploit a vulnerability to...
View ArticleBasic of RESTful Web Service
REST (Representational State Transfer) first introduced in 2000 by Roy Fielding at the University of California. Now, years after its introduction, major frameworks for REST have started to appear and...
View ArticleKali Linux … a Backtrack Reborn
After several years I use Backtrack Linux as my digital forensics and penetration testing tools, now it’s time to move to this new re-build of Backtrack Linux. Kali Linux maintained and funded by...
View ArticleTwo-Factor Authentication
Discussing about authentication, We should remember about the approaches to authentication factor. In many security discussions, we always hear about that, they are something you have (possession...
View Article
More Pages to Explore .....