-
Blockchain implementation on Indonesian government
Indonesian government would achieve a great impact on how their manual services if it were implemented on blockchain technology.
-
Indonesian Government not serious
Indonesian Government? I’m enough, it’s corrupted. I can’t think they hired any better amateur software developer, UI/UX designer, graphic designer, security researcher, workflow designer, or any other bunch it jobs nor even their partners. it’s worst, getting a job in a private company is worth the time than working in any Indonesian Government, they just allowing anyone to…
-
Existing?
Many Years till now, I’m still asked to myself and what does really existed? I uncertainly anxious about this question just because it’s not that simple as you look. it’s god what I’m looking for, does he really exist? he made all of us and who create him? still curious but still worshiping him, do…
-
Read Binary Number as Alpha-Numeric
Sources: Fray117 Before Continue, Check the Parameter first that might be useful later. Example of Binary: 01000110 01110010 01100001 01111001 Now let we try to translate the first byte 01000110, in binary there is quick way to calculate the results. Binary: 01000110 Values: 64, 32 ,16, 8, 4, 2, 1 in alphabets, calculate from behind.…
-
Binary
Source: Fray117 What is Binary? Binary is one of two digits (0 or 1) in a binary system of notation, it’s written exactly in 1 bytes (8 bit). Identifying When the first 3 bit containing 011 it’s mean Lowercase, if the first 3 bit containing 010 so it’s mean Uppercase, and when the first 4…
-
Anon Cyber Team Indonesia
seems it just organization that talking about computer that have many geeks in there, but did you realize if they would be greater than that? unfortunately in first statement is true and in the second statement is also true. well you would not get that in your mind, but today I want to post article…
-
Simple Fix for Login Bypass Vulnerability on PHP Application
Before we’re started, let’s getting know about this vulnerability and this bug is almost same with SQL Injection, so this vulnerability letting user directly login to sites without exploiting any other vulnerability. Several Injection Strings: ‘=”or’ ‘ or 1=1 or ”=’ ‘ or 1=1- ‘ or 1=1# Then, how we patching that vulnerability? I will…