• Recent Post

  • RSS R o o t s e c u r e

    • BlackBerry to acquire German firm Secusmart
      BlackBerry is buying privately held German firm Secusmart which specialises in voice and data encryption, in a bid to improve its credentials security as part of its strategy to target specific industries and niches. Secusmart specialises in encryption and anti-eavesdropping services for public sector, enterprise and telecommunications service providers.Tags […]
    • Former NSA director will file "at least" 9 patents to detect malicious hackers
      In an interview Monday with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications—“and possibly more"—pertaining to technology for detecting network intruders.Tags: SecurityIndustry News […]
    • New "Fake ID" exploit allows new types of Malware on Android?
      A new Android design error discovered by Bluebox Security allows malicious apps to grab extensive control over a user's device without asking for any special permissions at installation. The problem affects virtually all Android phones sold since 2010. Bluebox calls the flaw "Fake ID" because it allows malware apps to pass fake credentials to […]
    • Microwave hacked into weapon, used to blow up a stereo
      There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them. Still, as with all things, someone somewhere will eventually try it, as was the case with the person(s) behind Kreosan. Kreosan is the YouTube handle of a young Russian man who, featured in the video below […]
    • How do hackers breach institutions like Canada's NRC?
      Cyberattacks like the one against the National Research Council of Canada are increasing around the world. But by knowing the steps hackers would use for a sophisticated attack, security experts try to gain the upper hand. "Sometimes in breaches, companies call it a 'highly sophisticated cyberattack' (as the Government of Canada's chief t […]
    • US senator seeks strong curbs on NSA metadata collection
      A new Senate proposal to curb the government's bulk collection of Americans' telephone records and increase transparency about the program has White House backing, and may get more traction with critics who have dismissed other bills as too weak. Democrat senator Patrick Leahy, chairman of the Senate Judiciary Committee, introduced the legislation […]
    • Satya Nadella sounds the alarm, literally, to kick-off Microsoft hackathon
      Satya Nadella is pushing a lot of change across the Microsoft org and a new event is kicking off this week called //OneWeek. The week is dedicated to updating the employees on the corporate mission, boosting morale and holding one massive hackathon. The hackathon kicked off today and we have gathered images from the event that offers a peek inside the world […]
    • Amazon opens 3D printing store, sells customizable stuff
      Amazon has sure come a long way from their roots as an online bookstore. They've since expanded to sell everything from music to groceries and everything in between. The company even produces their own hardware now, including the Fire Phone and the set-top Fire TV, expanding into almost every aspect of what a customer may want to purchase.Tags: AmazonIn […]
    • Chinese authorities announce Microsoft anti-monopoly investigation
      Microsoft Corp appears to be the latest U.S. company targeted by China for antitrust investigation as government officials paid sudden visits to the software firm's Chinese offices on Monday. Representatives from China's State Administration for Industry & Commerce, which is responsible for enforcing business laws, made the visits to Microsoft […]
    • About those alleged backdoors in Microsoft products...
      Scott Charney, of Microsoft's Trustworthy Computing, said the government has "never" asked for a backdoor in Microsoft products. Yet a former engineer working on BitLocker claimed the government does ask, but those requests are “informal.”Tags: MicrosoftSecurity […]

Cyrus Rico

.::Everything Must Be Share::.

Archive for the 'Pemrograman' Category

Program STOK Dengan VB dan Ms. Access

Program STOK Penjualan menggunakan VB dan Database Ms Access (Episode 5B) Episode sebelumnya (Epesiode 5A) pembahasan seputar transaksi pembelian, nah pada episode kali ini akan dibahas transaksi penjualan, cara menampilkan data serta tabel dan query yang digunakan. Tetap menggunakan database sebelumnya yakni STOK.MDB yang dapat di download bersama program ini, maka singung terlebih dahulu tabel-tabel [...]

15 December 2010 at 11:38 - Comments

Trip & Triks Visual Basic

Download Tip – Trik Visual Basic No Diskripsi Links 1 Bosen dengan model tombol yang gitu-gitu aja, coba deh download Source Codenya, kali aja ada pencerahan Klik disini untuk download 2 Tau ga Umur loe pada hari ini, klo’ mao tau coba aja download source codenya disini…. Klik disini untuk download 3 Mao Bikin Bentuk [...]

10 December 2010 at 05:05 - Comments

Tutorial Membuat Robot Pintar

Tahap-tahap pembuatan robot Secara garis besar, tahapan pembuatan robot dapat dilihat pada gambar berikut: Ada tiga tahapan pembuatan robot, yaitu: 1. Perencanaan, meliputi: pemilihan hardware dan design. 2. Pembuatan, meliputi pembuatan mekanik, elektonik, dan program. 3. Uji coba. I. Tahap perencanan Dalam tahap ini, kita merencanakan apa yang akan kita buat, sederhananya, kita mau membuat [...]

7 December 2010 at 08:54 - Comments

Slax Remastering untuk Pemula

Sebelumnya mohon maaf kalau ada yang salah ini hanya untuk pemula yang suka merubah rubah (seperti saya) Slax Remastering 1.copy semua file/direktori yg ada dalam cd live slax (lebih bagus buat folder baru dalam root folder) 2.edit tampilan boot edit File splash.cfg (merubah tampilan text waktu boot) edit file splash.lss (merubah tampilan grafix waktu boot [...]

23 November 2010 at 05:55 - Comments

Sistem Informasi rumah Sakit dengan PHP

input.php <!doctype html public “-//W3C//DTD HTML 4.0 //EN”> <html> <head> <title></title> </head> <body> <form method=post action=output.php> <h2><center><strong>Rumah Sakit Buat Siapa Aja</strong></center></h2> <h2><center><strong>Pendaftaran Pasien Baru</strong></center></h2> <hr size=3 align=center noshade> <pre> No Rekam Medik :<input type=text size=9 name=no> Nama Pasien :<input type=text size=50 name=nm> Tempat Tanggal Lahir :<input type=text size=30 name=tg> Umur :<Input type=text size=2 name=um> Tahun [...]

21 November 2010 at 18:12 - Comments
Have been looking at doing SEO and bettering the design on my website for a long time, so this website ...
12 December 10 at 20:42
You're Welcome... i'am glad if it's usefull.
22 December 10 at 00:52

Linux and OpenSource

Linux adalah sistem operasi yang bersifat open source. Ada banyak lisensi yang bersifat open source. Lisensi-lisensi yang bersifat open source didefinisikan dalam Open Source Definition dan disertifikasi oleh Open Source Organization. Pada umumnya, program-program yang membentuk Linux berlisensi GNU Public License. Setiap orang tidak hanya berhak memperoleh software bersifat open source secara gratis, tetapi juga [...]

21 November 2010 at 17:18 - Comments

Mempercantik Form dengan OCX

Ini terinsipirasi ketika melihat aplikasi lain yang dibuat dalam bentuk portable, lalu terlintas dalam pikiran …apa vb bisa dibikin portable gak ya mulai dah coba cari-cari informsi dan utak atik tuh vb..install dan uninstall dicoba-coba, kemudian melakukan perubahan-perubahan file-file sistem beserta registrinya……huh susah banget. Dicoba beberapa kali error terus..pusing euy…tapi setelah sekian jam dicoba-coba akhirnya [...]

20 November 2010 at 23:52 - Comments


Apa Itu Framework? Sebenarnya apa sih yang disebut dengan framework itu?? Framework bisa diartikan sebagai alat yang digunakan untuk membantu pekerjaan. Karena untuk pembuatan website maka framework disini dapat diartikan sebagai alat yang dapat digunakan untuk mempermudah pembuatan website. Jika dengan CMS maka kita tinggal menjalankan saja tidak perlu lagi memikirkan untuk menulis kode program [...]

20 November 2010 at 23:47 - Comments