SUDAH TERBIT! Buku Perdana: Membuat Sistem Monitoring Pelanggaran Siswa Berbasis Web dan Android

BY IN Karya Buku Comments Off on SUDAH TERBIT! Buku Perdana: Membuat Sistem Monitoring Pelanggaran Siswa Berbasis Web dan Android ,

Setelah cukup panjang perjalanan menulis sebuah buku, akhirnya obsesi untuk menerbitkan buku tercapai juga. Terima kasih yang tak terhingga kepada teman2 redaksi Lokomedia yang bersedia menerbitkan tulisan saya dan semoga dapat diterima di kalangan pembaca khususnya di bidang pendidikan. Sistem yang dikupas di dalam buku ini sebenarnya sampai saat ini pun masih berjalan dan diberlakukan

CONTINUE READING …

Computer Security: Social Engineering (Daryan)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daryan) , ,

The subject inserted the flash drive containing the program. The program is masked as IB Physics Past Paper May 2015.doc. The subject deliberately ran the program. When the program ran, the antivirus rejected the program to work but then the antivirus was disabled manually and then the program ran. The program made a copy of

CONTINUE READING …

Computer Security: Social Engineering (ChinHeng)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (ChinHeng) , ,

My victim is Ansell. At first, I lied to him about a “new game database,” that the program could search for the first until the last game, for free. Not only games, it can search for cheats, mods, maps, and any other properties that the game must have. He looks so happy that he received

CONTINUE READING …

Computer Security: Social Engineering (Kevin)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Kevin) , ,

Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it

CONTINUE READING …

Computer Security: Social Engineering (Daniel)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daniel) , ,

First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer

CONTINUE READING …

Computer Security: Social Engineering (Clark)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Clark) , ,

On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The

CONTINUE READING …

Computer Security: Social Engineering (Grace)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Grace) , ,

Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my

CONTINUE READING …

Computer Security: Social Engineering (Albert)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Albert) , ,

Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then

CONTINUE READING …

Computer Security Issues

BY IN CS - Computer Security Comments Off on Computer Security Issues

Worms: fast spreading using wide network (internet), sometimes uncontrollable Trojan Horse: a software that hides inside another software, need user interaction to make it active. mostly give destructive impact! Places that usually used by virus to defend itself: Registry Task Manager Configuration Files (WIN.INI, SYSTEM.INI, MSConfig etc) System Directories Social Engineering: Send a copy of “important”

CONTINUE READING …

Kuesioner

BY IN CH - Meeting Comments Off on Kuesioner ,

Christian School * As far as I know, Christian values has implemented in teaching process. Student’s devotion has also run well throughout the academic year, which is good. PC teachers * The role of PC Teachers is really important for building a better communication between schools and parents. Reacter teachers also support christian sharing articles

CONTINUE READING …

CentOS: Backup Database MySQL

BY IN Linux Comments Off on CentOS: Backup Database MySQL

Kalau kita memiliki akses console, kita dapat melakukan backup terhadap database MySQL dengan cara sebagai berikut: # mysqldump -u user -p database | bzip2 -c > /home/user/public_html/data/nama_database$(date +%Y-%m-%d-%H.%M.%S).sql.bz2 Enter password: ******** Perintah diatas akan mengekspor database dalam format sql yang dikompresi dalam bentuk bz2 yang disimpan di folder data, dan dapat didownload dari FTP. Format

CONTINUE READING …

CentOS: Menghapus file log

BY IN Linux Comments Off on CentOS: Menghapus file log

Umumnya file2 log di Linux disimpan di beberapa folder berikut: /var/log /var/log/httpd /var/lib/mysql /usr/local/apache/logs /usr/local/cpanel/logs untuk menghapus file log, disarankan untuk tidak menghapusnya langsung dengan perintah RM, namun sebaiknya di TRUNCATE saja, sehingga selesai operasi, akan ditemukan file kosong yang tidak ada isinya. Untuk proses truncate, digunakan tanda > Untuk log MySQL, kita dapat mengikuti

CONTINUE READING …

CentOS: Mengubah NS Record

BY IN Linux Comments Off on CentOS: Mengubah NS Record

Dapat dilakukan dengan urutan perintah berikut: # cd /var/cpanel # cp nameserverips.yaml nameserverips.bak # nano nameserverips.yml sampai pada langkah ini, kita bisa mengedit langsung filenya, yaitu mengubah datanya selanjutnya kita harus merestart servicenya # /etc/init-d/named start | stop | restart

CentOS: Melihat status disk

BY IN Linux Comments Off on CentOS: Melihat status disk

Berikut adalah beberapa perintah yang umum dilakukan saat kita ingin melihat status disk di CentOS # df -h perintah ini digunakan untuk melihat status disk dan available spacenya # ls -l melihat isi directory yang aktif beserta ukuran file2nya # du –max-depth=1 -h /folder # du –max-depth=1 -m -x /folder melihat isi dari /folder berikut

CONTINUE READING …

MySQL Backup Solutions for Windows

BY IN Linux Comments Off on MySQL Backup Solutions for Windows

Masalah Backup Data adalah hal yang sangat penting untuk menjamin aplikasi web kita tetap berjalan dengan lancar. Waktu browsing di internet, saya melihat ada satu tool yang bisa kita manfaatkan untuk membackup data MySQL kita, langsung dari web server ke local. Adapun software tersebut adalah MySQL Backup Solutions for Windows. Perintah CLI nya adalah sebagai

CONTINUE READING …