Tag: internet
-
Blockchain implementation on Indonesian government
Indonesian government would achieve a great impact on how their manual services if it were implemented on blockchain technology.
-
Sharing Network Access from Exploited Router
as seen project from https://blog.exploiter.id/2019/06/why-dont-share-out-network-access-from-exploited-router/ that i think should be illegal, but in one case there several condition that might be legal to done: the most legal are owner has permitting you(moreover they ask you to patch it then allowing you to use them) the network are public already people being volunteer to share out…
-
Surf Anonymously using VPN
Depending on the type of Internet service you subscribed, you may be getting a static or dynamic IP address from your ISP. A static IP address is a permanent (non-changing) IP address assigned to you. Most users on the other hand gets an dynamically assigned IP address from their ISP. The device (a router, gateway or computer)…
-
SQL Injection
SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. Now many websites are built using PHP and…
-
Hidden Uploader
So many technique that can accessing server via website like SQLi and Hidden Uploader, hidden uploader is a file containing function to upload data that can triggered from the live web or remote exploiting. This is caused because some Administrator that don’t know about program, making the sites vulnerable but this is need a great…