Halaman

Pulpit rock

Minggu, 18 Desember 2011

Social Engineering

Social engineering is commonly understood to mean the art of manipulating people into performing actions or divulging confidential information. While it is similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.

Minggu, 11 Desember 2011

What Is Mikrotik?




Mikrotik is a small company headquartered in Latvia, adjacent to Russia, its formation was initiated by John Trully and Arnis Riekstins.  John Trully an American who immigrated to Latvia and met a scholar arnis Physics and Mechanics at around 1995.  In 1996 John and Arnis began to routing the world (Mikrotik vision is to routing around the world).  Starting with Linux and MS DOS system that combined technology with Wireless LAN (W-LAN) Aeronet speed 2Mbps in Moldova, neighboring Latvia , then serve five customers in Latvia, because their ambition is to make a reliable router software and spread around the world.  This is somewhat contradictory with the existing information on the web Mikrotik, that they had 600 points (customers) and wireless largest in the world.
Their basic principle is not to make the Wireless ISP (WISP), but makes the program a router that is reliable and can run all over the world. Latvia is the only "experimental area" John and Arnis, because now they've helped other countries including Sri Lanka which serves about four hundred customers. 
Linux they use the first time is the Kernel 2.2 that was developed jointly with the help of 5-15 staff of R & D MikroTik which now dominate the world of routing in developing countries. In addition to staffs of the Mikrotik, according to arnis, they recruited also freelance workers and third parties to develop an intensive Mikrotik marathon.




Types Mikrotik
MikroTik RouterOS ™
MikroTik version is in the form of software that can be installed on home computers (PCs) through the CD. You can download the image file from the official website MikroTik RouterOS MikroTik, www.mikrotik.com. However, this image file is a trial version MikroTik which can only be within the next 24 hours. To be able to use it full time, you must purchase a license key with the record of a license for only one hard drive.
RouterOS Level and ability
RouterOS is present in a variety of levels.  Each level has the ability of each, ranging from level 3, up to level 6.  In short, level 3 is used for interfacing ethernet router, level 4 for the wireless client or a serial interface, level 5 for the wireless AP, and level 6 does not have any limitation.  For hotspot applications, can use level 4 (200 users), level 5 (500 user) and level 6 (unlimited).

Jumat, 02 Desember 2011

Cryptography : Encryption

In cryptography, we must know about Encryption and Decryption

Encryption is system algorithm that used to change some of plain-text (for example) into some unreadable text or unusual character that just can possessing by knowledge. the algorithm is usually called as chiper here. First, this encryption used by military to make enemy confuse when they send to another base to make some move plan. but, for now most company using this way to make their database keep safe. so, if someone who restrict come and have the data, that will cannot be read until they and just be the meaningless text.

Decryption is the other side of encryption that used the related algorithm to decode the encrypted text be an normal text or human readable. but, you cannot make a decryption system without knowing what is algorithm that encryption used before. why, the logic is like this, you will not recognize some people language without knowing where they from. it's make sense right? that's why, most of other people who do this job is always make an encryption first before decryption. hehehe

Kamis, 01 Desember 2011

How To Bypass The Firewall and The Solution

Before i deep explain about How To Bypass The Firewall and The Solution you must have know about what is the firewall.

Firewall



Firewall is the system which filtering the access that allow every safe connection and disallow the other. firewall usually place between gateway from localhost to network. and used for controlling access and prevent the system from harm activities that make your system danger such as cracker, spy, stealing the data and much more. firewall is the last defend on your system, that's why many of commercial company spend their money to buy the best firewall just to keep their system secure.

Prevent Your Computer From Virus Or Mallware

This time, i want share the basic knowledge about how to prevent our computer from computer-virus and mallware.

Just to the point :

Step I 

Make sure that you choose the Right Anti Virus
Most people used the Anti-virus for their engine now. Because they thing the antivirus will prevent their computer but some of them apparently spreading virus. yups, it's a profit's problem, for the benefits of that own company. 
that's the first thing that you have to face. 

My First Blog

Hello,

This is my first blog Post. I hope this blog will be help you all guys.. ^_^