Posts By / contactwahyu
SUDAH TERBIT! Buku Perdana: Membuat Sistem Monitoring Pelanggaran Siswa Berbasis Web dan Android
Setelah cukup panjang perjalanan menulis sebuah buku, akhirnya obsesi untuk menerbitkan buku tercapai juga. Terima kasih yang tak terhingga kepada teman2 redaksi Lokomedia yang bersedia menerbitkan tulisan saya dan semoga dapat diterima di kalangan pembaca khususnya di bidang pendidikan. Sistem yang dikupas di dalam buku ini sebenarnya sampai saat ini pun masih berjalan dan diberlakukan
Computer Science: Semester Exam
Another Semester Exam Session for Computer Science students SECTION A Outline how backups can prevent data loss If we create backup regularly or periodically, any damaged data that occurred will be no problem. Because, once the data is damaged, we still have a copy of it and simply restore it. However, for large amount of
Computer Security: Social Engineering (Daryan)
The subject inserted the flash drive containing the program. The program is masked as IB Physics Past Paper May 2015.doc. The subject deliberately ran the program. When the program ran, the antivirus rejected the program to work but then the antivirus was disabled manually and then the program ran. The program made a copy of
Computer Security: Social Engineering (ChinHeng)
My victim is Ansell. At first, I lied to him about a “new game database,” that the program could search for the first until the last game, for free. Not only games, it can search for cheats, mods, maps, and any other properties that the game must have. He looks so happy that he received
Computer Security: Social Engineering (Kevin)
Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it
Computer Security: Social Engineering (Daniel)
First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer
Computer Security: Social Engineering (Clark)
On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The
Computer Security: Social Engineering (Grace)
Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my
Computer Security: Social Engineering (Bian)
On 8th of May, I tried my program on my friend computer. His name is Richard Angga Pranata, he is in the same class with me 11IB2. My program will start when he clicks on it and then it will run the program. By using flash drive I able to copy the program into his
Computer Security: Social Engineering (Albert)
Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then
Computer Science: Exam Preparation
Several issues that need to be discuss: Data loss its integrity; How it can happen? How we can avoid it? If it’s already happened, what’s the best way to restore it? RAM – Random Access Memory ROM – Read Only Memory Distinguish the differences! Why RAM is considered as a storage? Why RAM is primary
Computer Security Issues
Worms: fast spreading using wide network (internet), sometimes uncontrollable Trojan Horse: a software that hides inside another software, need user interaction to make it active. mostly give destructive impact! Places that usually used by virus to defend itself: Registry Task Manager Configuration Files (WIN.INI, SYSTEM.INI, MSConfig etc) System Directories Social Engineering: Send a copy of “important”
Kuesioner
Christian School * As far as I know, Christian values has implemented in teaching process. Student’s devotion has also run well throughout the academic year, which is good. PC teachers * The role of PC Teachers is really important for building a better communication between schools and parents. Reacter teachers also support christian sharing articles
CentOS: Backup Database MySQL
Kalau kita memiliki akses console, kita dapat melakukan backup terhadap database MySQL dengan cara sebagai berikut: # mysqldump -u user -p database | bzip2 -c > /home/user/public_html/data/nama_database$(date +%Y-%m-%d-%H.%M.%S).sql.bz2 Enter password: ******** Perintah diatas akan mengekspor database dalam format sql yang dikompresi dalam bentuk bz2 yang disimpan di folder data, dan dapat didownload dari FTP. Format
CentOS: Beberapa perintah sederhana
# cat /etc/redhat-release melihat versi CentOS # whereis my.cnf mencari file #nano /var/log/messages melihat server log
CentOS: Menghapus file log
Umumnya file2 log di Linux disimpan di beberapa folder berikut: /var/log /var/log/httpd /var/lib/mysql /usr/local/apache/logs /usr/local/cpanel/logs untuk menghapus file log, disarankan untuk tidak menghapusnya langsung dengan perintah RM, namun sebaiknya di TRUNCATE saja, sehingga selesai operasi, akan ditemukan file kosong yang tidak ada isinya. Untuk proses truncate, digunakan tanda > Untuk log MySQL, kita dapat mengikuti
CentOS: Mengubah NS Record
Dapat dilakukan dengan urutan perintah berikut: # cd /var/cpanel # cp nameserverips.yaml nameserverips.bak # nano nameserverips.yml sampai pada langkah ini, kita bisa mengedit langsung filenya, yaitu mengubah datanya selanjutnya kita harus merestart servicenya # /etc/init-d/named start | stop | restart
CentOS: Melihat status disk
Berikut adalah beberapa perintah yang umum dilakukan saat kita ingin melihat status disk di CentOS # df -h perintah ini digunakan untuk melihat status disk dan available spacenya # ls -l melihat isi directory yang aktif beserta ukuran file2nya # du –max-depth=1 -h /folder # du –max-depth=1 -m -x /folder melihat isi dari /folder berikut
MySQL Backup Solutions for Windows
Masalah Backup Data adalah hal yang sangat penting untuk menjamin aplikasi web kita tetap berjalan dengan lancar. Waktu browsing di internet, saya melihat ada satu tool yang bisa kita manfaatkan untuk membackup data MySQL kita, langsung dari web server ke local. Adapun software tersebut adalah MySQL Backup Solutions for Windows. Perintah CLI nya adalah sebagai