• Recent Post

  • RSS R o o t s e c u r e

    • Verizon: Espionage hacking grows, with more from east Europe
      Hacking for espionage purposes is sharply increasing, with groups or national governments from Eastern Europe playing a growing role, according to one of the most comprehensive annual studies of computer intrusions. Spying intrusions traced back to any country in 2013 were blamed on residents of China and other East Asian nations 49 percent of the time, but […]
    • Google to refund buyers of 'fake' anti-virus app
      Google has decided that a smallish (for The Chocolate Factory) wad of cash is a trivial price to pay for maintaining its reputation, and has begun refunding punters who fell for the fake “virus shield” scam. Uncovered by Android Police earlier this month, the fake virus scanner was nothing more than an icon that changed shape when a user tapped it. The app h […]
    • Active malware campaign steals Apple passwords from jailbroken iPhones
      Security researchers have uncovered an active malware campaign in the wild that steals the Apple ID credentials from jailbroken iPhones and iPads.Tags: AppleiPhoneSecurity […]
    • Digging for answers: The "strong smell" of fraud from one Bitcoin miner maker
      For many crypto-minded libertarians, Bitcoin is the future of money. But that dream hasn't been helped much by the numerous high-profile legal cases involving the currency in recent years: The Bitcoin Savings and Trust hedge fund collapsed; uncertainty fueled the implosion of Mt. Gox, the currency's largest exchange; and the high-profile Silk Road […]
    • Former GitHub CEO leaves the company
      Tom Preston-Werner — founder of the immensely popular social coding site GitHub and its most prominent executive — has left the company in the wake of widely publicized sexual harassment investigation. GitHub, a tech-industry darling whose coding software is used by millions of developers worldwide, launched the investigation last month after one of the comp […]
    • 12 ethical dilemmas gnawing at developers today
      The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it' […]
    • Even the most secure cloud storage may not be so secure, study finds
      Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are.Tags: cloudSecurity […]
    • Most but not all sites have fixed Heartbleed flaw
      The world's top 1,000 websites have been patched to protect their servers against the "Heartbleed" exploit, but up to 2% of the top million were still vulnerable as of last week, according to a California security firm. On Thursday, Menifee, Calif.-based Sucuri Security scanned the top 1 million websites as ranked by Alexa Internet, a subsidia […]
    • Six clicks: Top six camera phones compared
      It's difficult to judge the camera capture capability of most high-end phones today because with the right lighting and setup you can capture great photos with nearly all of them. I took the latest and greatest phones out for a spin this weekend and tried to see if any device stood out from the rest. I took photos using the Samsung Galaxy S5, Apple iPho […]
    • Aereo analysis: Cloud computing at a crossroads
      The question of whether online broadcast television is to remain in the hands of a stodgy industry that once declared the VCR the enemy is being put directly before the Supreme Court. Broadcasters' latest legal target is 2-year-old upstart Aereo—which retransmits over-the-air broadcast television using dime-sized antennas to paying consumers, who can wa […]

Cyrus Rico

.::Everything Must Be Share::.

Archive for the 'Jaringan' Category

Repository Ubuntu Karmic/Linux Mint 8

Buat anda-anda yang ingin melakukan update dan instalasi di Ubuntu Karmic kesayangan anda bisa menggunakan repository lokal ini sehingga bisa lebih cepat. Perlu diketahui repository berikut juga bisa digunakan untuk Linux Mint Daftar Repository Lokal : Repo UGM : deb http://repo.ugm.ac.id/ubuntu/ karmic main restricted universe multiverse deb http://repo.ugm.ac.id/ubuntu/ karmic-updates main restricted universe multiverse deb http://repo.ugm.ac.id/ubuntu/ [...]

10 December 2010 at 01:50 - Comments

Cara Membuat Jaringan LAN

kali ini saya ingin membahas tentang cara membuat JARINGAN LAN .Apabila sobat di rumah mempunyai komputer lebih dari satu, dan masing-masing komputer ingin terhubung antara satu dengan yang lainnnya supaya bisa sharing data, printer, sharing koneksi internet dll, kita bisa lakukan dengan membuat jaringan komputer LAN ( Local Area Network ) sederhana.. Kalau pada postingan yang [...]

6 December 2010 at 09:12 - Comments

Hacking Menggunakan Netcat

Netcat merupakan tools yang banyak dipakai para hacker. Kepopulerannya terlihat dari hasil survey lebih dari 1000 pengguna Nmap pada tahun 2000 dan 2003 yang menempatkannya pada urutan 5 besar, yaitu urutan ke 2 pada tahun 2000 dan urutan ke 4 pada tahun 2003. Tools ini sering disebut sebagai “TCP/IP Swiss Army Knife”-nya para hacker. Versi [...]

21 November 2010 at 17:51 - Comments

NAT

Keterbatasan alamat IPv.4 merupakan masalah pada jaringan global atau Internet. Untuk memaksimalkan penggunakan alamat IP yang diberikan oleh Internet Service Provider (ISP) dapat digunakan Network Address Translation atau NAT. NAT membuat jaringan yang menggunakan alamat lokal (private), alamat yang tidak boleh ada dalam tabel routing Internet dan dikhususkan untuk jaringan lokal/intranet, dapat berkomunikasi ke Internet [...]

21 November 2010 at 17:45 - Comments