John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

Deleted Web Pages with the Google Cache and the Internet Archive

Has this situation ever happened to you? You enter search keywords in Google for a very specific topic. In the resulting screen, you see the title of that perfect article with exactly what you were seeking. Hopeful, you click the link and receive a 404-error message saying that the page does not exist. This scenario sadly happens to everyone countless …

Read More »

The 666 sign

Sebelum Tidur: 6 minggu: selamat bobo sayang, mimpi indah ya, mmmuach. 6 bulan: tolong matiin lampunya, silau nih. 6 tahun : Kesana-an doong… kamu tidur dempet2an kayak mikrolet gini sih?! Pakai Toilet: 6 minggu: ngga apa-apa, kamu duluan deh, aku ngga buru2 koq. 6 bulan: masih lama ngga nih? 6 tahun: brug! brug! brug! (suara pintu digedor), kalo mau tapa …

Read More »

Kisah Selembar Cek

Di sebuah keluarga, tinggallah seorang ayah dengan putra tunggalnya yang sebentar lagi lulus dari perguruan tinggi. Mereka berdua memiliki kesamaan minat yakni mengikuti perkembangan produk otomotif. Suatu hari, saat pameran otomotif berlangsung, mereka berdua pun ke sana.Melihat sambil berandai-andai. Seandainya tabungan si ayah mencukupi, kira-kira mobil apa yang sesuai budget yang akan di beli. Sambil bersenda gurau, sepertinya sungguh-sungguh akan …

Read More »

Negeri Orang Bahagia

AKUlah penciptamu. Aku akan turut campur dalam segala permasalahan hidupmu. Ingat, Aku tidak membutuhkan bantuanmu. Jika engkau menghadapi situasi sulit yang tidak bisa engkau pecahkan, masukkan ke kotak SFGTD (something for God to do)-mu. Semua masalah akan terselesaikan, namun bukan menurut ukuran waktumu tapi waktuKU. Sekali engkau masukkan masalah ke dalam kotak SFGTD-mu, engkau tidak perlu lagi melanjutkan kekuatiranmu. Lebih …

Read More »

Hacking Attacks – How and Why

In this age of prolific Internet use, a major concern that has emerged among webmasters and web hosts alike is the threat of hacking. Originally referring to the process of learning programming languages and computer systems, the term ‘hacking’ has now evolved to mean the practice of bypassing a computer system/network’s security (used interchangeably with the term ‘cracking,’ depending on …

Read More »

Microsoft fixes 15 flaws with six patches; four considered critical

Microsoft has released its June 2007 security bulletin, which includes six updates: four are designated Critical by the software giant. Two of the patches affect Windows Vista, with one Critical patch specific to Internet Explorer. One of the Important patches affects Microsoft Office. To keep your Windows XP SP1 system secure, update to Windows XP SP2 today. All Microsoft security …

Read More »

BackTrack – Comprehensive Security Penetration

The are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the WiFi antenna for high gain and strong amplification.   Possibly, you might find a video capture card in the computer. Of …

Read More »

Schannel zero-day exploit released

Only hours after Microsoft released a patch for the Windows Schannel Security Package, the researcher who discovered the vulnerability, Thomas Lim of COSEINC, released a public exploit for it. According to Microsoft, the Schannel security package implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. This vulnerability could allow remote code execution if a …

Read More »

Protecting Your Data

Introduction to Windows Firewall The introduction of high-speed Internet connectivity has created a powerful and extraordinary computer networking experience. This newfound burst of bandwidth has launched new innovations in information exchange, media access, and other advanced computing experiences. Unfortunately, this technology has also created a very accessible conduit to the internals of your computer. Using these open and available digital …

Read More »