Skip to content
Tuesday, July 15, 2025
  • Student Registration
  • All Courses
  • Library
  • Categories
    • News
    • AI
    • Blockchain
    • Dat Viz
    • Desain
    • Feature
    • Kuliner
    • My Fotografi
    • My Share
    • Photography Article
    • Landscape
    • Macro
    • People
    • C|EH & Penetration Testing
    • Experience & Opinion
    • Kalilinux
    • Metasploit
    • VMware

EDY SUSANTO

Berbagi Pengetahuan Adalah Dharma

  • Home
  • My Profile
  • Online Courses
  • Offline Courses
  • Udemy Online Courses
    • Fundamental Ethical Hacking
    • Tableau Fundamental
    • Smartphone Photography
    • Bitcoint For The World
    • Digital Evidence
    • Basic Pentesting
    • Shodan
    • Cloud Computing
    • Online Pentesting
    • Kali Linux 2024
  • Service Catalogue
  • Contact
  • Categories
    • AI
    • Blockchain
    • Dat Viz
    • Desain
    • Feature
    • Kuliner
    • My Fotografi
      • Landscape
      • Macro
      • People
      • Photography Article
    • My Share
      • Analyzer
      • C|EH & Penetration Testing
      • CISSP
      • CTFL
      • ECSA
    • Experience & Opinion
      • IT Audit
      • ITILV3
      • Kalilinux
      • Management
      • Metasploit
      • VMware
    • News
      • Security Article
    • Sajak
    • Travelling
site mode button

Tag: security article

Bagaimana anti virus bekerja ?

May 27, 2015Edy Susanto

Tentunya kita tidak asing lagi dengan yang namanya anti virus, aplikasi ini boleh dikatakan ada  di setiap computer yang kita […]

Continue Reading

Anggota Lizard Squad Beserta 56 Hacker Lain di Tangkap di Inggris

March 11, 2015March 11, 2015Edy Susanto

Tindakan keras yang dipimpin oleh NCA (Badan Kejahatan Nasional) Britania dalam seminggu terakhir telah menangkap sekitar 56 penjahat cyber. NCA […]

Continue Reading

The Onion explains how its Twitter account was hacked

May 10, 2013May 10, 2013Edy Susanto

IDG News Service – Hackers who commandeered The Onion’s Twitter account used simple but effective phishing attacks to obtain passwords, according […]

Continue Reading

Does Facebook hold the key to security and user experience?

April 2, 2013April 4, 2013Edy Susanto

The “I forgot my password” button is familiar to everyone, but a friend to no one. It’s annoying to have […]

Continue Reading

Windows Server 2012

March 14, 2013March 18, 2013Edy Susanto

Cloud computing in general, and private clouds in particular, have emerged as a response to the high cost and lack […]

Continue Reading

Updating Hash Security: NIST and SHA-3

March 14, 2013March 14, 2013Edy Susanto

The NIST (National Institute of Standards and Technology) is holding a competition aimed at finding the best possible replacement for […]

Continue Reading

Anonymous claims to expose bank executive details

February 12, 2013Edy Susanto

Hacktivist group Anonymous said it has posted the sensitive details of 4,000 bank executives on a government website. On Sunday night, an […]

Continue Reading
Ilustrasi Hack - Google

How to Avoid a Hacktivist Attack

January 14, 2013Edy Susanto

Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 […]

Continue Reading

Perhatian | Warning | Atención | Atenție | Attenzione

Segala Informasi yang tersedia didalam website ini digunakan untuk tujuan pembelajaran, jadi mohon digunakan sebijaksana mungkin. Saya tidak bertanggung jawab jika ada artikel yang telah saya tulis disalah gunakan untuk kepentingan diluar pembelajaran.

Konsultasi Proffesional

Categories

Donasi Project Sosial

Layanan Keamanan Siber

Layanan Digital Consulting

Online & Offline Course

| Theme: News Portal by Mystery Themes.
  • Home
  • My Profile
  • Online Courses
  • Offline Courses
  • Udemy Online Courses
    • Fundamental Ethical Hacking
    • Tableau Fundamental
    • Smartphone Photography
    • Bitcoint For The World
    • Digital Evidence
    • Basic Pentesting
    • Shodan
    • Cloud Computing
    • Online Pentesting
    • Kali Linux 2024
  • Service Catalogue
  • Contact
  • Categories
    • AI
    • Blockchain
    • Dat Viz
    • Desain
    • Feature
    • Kuliner
    • My Fotografi
      • Landscape
      • Macro
      • People
      • Photography Article
    • My Share
      • Analyzer
      • C|EH & Penetration Testing
      • CISSP
      • CTFL
      • ECSA
    • Experience & Opinion
      • IT Audit
      • ITILV3
      • Kalilinux
      • Management
      • Metasploit
      • VMware
    • News
      • Security Article
    • Sajak
    • Travelling