Category: Research

  • Blockchain implementation on Indonesian government

    Blockchain implementation on Indonesian government

    Indonesian government would achieve a great impact on how their manual services if it were implemented on blockchain technology.

  • Indonesian Government not serious

    Indonesian Government not serious

    Indonesian Government? I’m enough, it’s corrupted. I can’t think they hired any better amateur software developer, UI/UX designer, graphic designer, security researcher, workflow designer, or any other bunch it jobs nor even their partners. it’s worst, getting a job in a private company is worth the time than working in any Indonesian Government, they just allowing anyone to […]

  • Existing?

    Existing?

    Many Years till now, I’m still asked to myself and what does really existed? I uncertainly anxious about this question just because it’s not that simple as you look. it’s god what I’m looking for, does he really exist? he made all of us and who create him? still curious but still worshiping him, do […]

  • Read Binary Number as Alpha-Numeric

    Read Binary Number as Alpha-Numeric

    Sources: Fray117 Before Continue, Check the Parameter first that might be useful later. Example of Binary: 01000110 01110010 01100001 01111001 Now let we try to translate the first byte 01000110, in binary there is quick way to calculate the results. Binary: 01000110 Values: 64, 32 ,16, 8, 4, 2, 1 in alphabets, calculate from behind. […]

  • Binary

    Binary

    Source: Fray117 What is Binary? Binary is one of two digits (0 or 1) in a binary system of notation, it’s written exactly in 1 bytes (8 bit). Identifying When the first 3 bit containing 011 it’s mean Lowercase, if the first 3 bit containing 010 so it’s mean Uppercase, and when the first 4 […]

  • Anon Cyber Team Indonesia

    Anon Cyber Team Indonesia

    seems it just organization that talking about computer that have many geeks in there, but did you realize if they would be greater than that? unfortunately in first statement is true and in the second statement is also true. well you would not get that in your mind, but today I want to post article […]

  • Shutdown another Windows Machine Remotely

    Shutdown another Windows Machine Remotely

    Maybe you are IT Support in a company, then one computer broken and needed to rebooted, but there’s many computer need rebooted and placed in different several places, this may help you (a lot maybe) too make jobs more faster. Windows Command Prompt > net view (list of computer connected on same network) > shutdown […]

  • Simple Fix for Login Bypass Vulnerability on PHP Application

    Simple Fix for Login Bypass Vulnerability on PHP Application

    Before we’re started, let’s getting know about this vulnerability and this bug is almost same with SQL Injection, so this vulnerability letting user directly login to sites without exploiting any other vulnerability. Several Injection Strings: ‘=”or’ ‘ or 1=1 or ”=’ ‘ or 1=1- ‘ or 1=1# Then, how we patching that vulnerability? I will […]

  • Capturing and Cracking WPA on macOS

    Capturing and Cracking WPA on macOS

    Capturing & Cracking WPA on macOS? maybe I just use the excellent VirtualBox images of Kali Linux from Offensive Security and aircrack-ng. but I just forgotten that: Using advanced wireless features is impossible from a virtual machine Even if he used Kali Linux with a dual boot, installing the wireless drivers to make it work […]

  • What is UTP Cable?

    What is UTP Cable?

    Do you know the term UTP Cable? This cable is used to connect a computer or laptop with an internet network that uses cables. This cable is specifically used in the function and can not be used on television or radio because its function can only deliver internet data flow to the device. The general […]