Quantcast
Channel: Take It To The Limit » security
Browsing all 8 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Words of Keamanan Informasi

[S]ebagai salah satu pekerja di bidang kemanan informasi, sepertinya perlu juga bagi diri penulis untuk memahami mengenai ranah lingkup dunia kerja yang digeluti oleh penulis, yaitu Keamanan Informasi...

View Article



Image may be NSFW.
Clik here to view.

Routed Firewall vs Transparent Firewall

Secara tradisional, Layer-3 firewalls dipasang dan digunakan untuk melakuka filter trafik yang melalui mereka. Firewalls jenis ini umumnya memeriksa header dari paket data mulai dari layer 3 keatas dan...

View Article

Image may be NSFW.
Clik here to view.

BackTrack 5 R3 Released!

The third release of version 5 of the BackTrack Linux security distribution fixes several bugs discovered since the R2 release in March and adds over 60 new tools. Several of the new tools were...

View Article

Image may be NSFW.
Clik here to view.

Network Security Basic (1) Knowing Resources

When talking about security, one of domain is network security. This domain also have something that can lead security incidents which always raising every day. As the complexcity of the threat...

View Article

Image may be NSFW.
Clik here to view.

Network Security Basic (2) Knowing Threats

the next step after you know your resources, now is the time to understand different threats of each resources that you have. Threat itself is a possible danger that might exploit a vulnerability to...

View Article


Image may be NSFW.
Clik here to view.

Basic of RESTful Web Service

REST (Representational State Transfer) first introduced in 2000 by Roy Fielding at the University of California. Now, years after its introduction, major frameworks for REST have started to appear and...

View Article

Image may be NSFW.
Clik here to view.

Kali Linux … a Backtrack Reborn

After several years I use Backtrack Linux as my digital forensics and penetration testing tools, now it’s time to move to this new re-build of Backtrack Linux. Kali Linux maintained and funded by...

View Article

Image may be NSFW.
Clik here to view.

Two-Factor Authentication

Discussing about authentication, We should remember about the approaches to authentication factor. In many security discussions, we always hear about that, they are something you have (possession...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images