SQL Injection merupakan teknik hacking paling populer pada aplikasi web dengan prinsip melewatkan perintah-perintah SQL lewat aplikasi web untuk dieksekusi oleh database back-end. Kelemahan akan muncul apabila inputan user tidak disaring/difilter dengan sempurna dan akhirnya dieksekusi. Mengidentifikasi kelemahan SQL Injection akan melibatkan proses auditing aplikasi web secara keseluruhan, cara paling ampuhdan efektif menurut security-hacks.com adalah dengan menggunakan SQL Injection Scanner. …
Read More »Tawaran menarik bagi ISP
Apakah Anda tertarik dengan bisnis ISP? Atau barangkali sudah memulai bisnis tersebut tetapi masih banyak kendala teknis dalam pengoperasiannya. Kali ini Google menawarkan kerjasama bagi ISP, portal maupun Service Provider yang tertarik dengan layanan Google Apps. Program ini bertajuk Partner Edition yang memungkinkan ISP untuk memberikan fasilitas pada client seperti Gmail, Google Calendar, dan Google Docs & Spreadsheets tanpa perlu …
Read More »Phishing with Google
Posting singkat tentang vulnerable pada situs Google yang bisa dimanfaatkan oleh phiser untuk memanen username+password calon korbannya! Beware of phisers! Link: Google phishingUpdate: Bingung?? Jika Anda mempunyai account Google Adsense dan mendapati email yang seolah-olah berasal dari Google yang meminta Anda mengupdate informasi personal Anda, kemudian di bagian bawah email itu disertakan link seperti di atas (Anda pasti tidak mengira …
Read More »Securing the connection between MySQL and MySQL Administrator using an SSH tunnel
This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn’t even …
Read More »Prevent Phishing with Mutual Authentication
Phishing is essentially a man-in-the-middle attack. The user is mis-directed, for example by social engineering or DNS-cache poisoning, to a fraudulent site. Because the user doesn’t understand how to validate SSL certificates (and who does?), the trick works far too often. Efforts such as Extended Validation certificates are bound to fail in many cases because they rely on inconsistent visual …
Read More »How To Set Up A FreeBSD Wireless Access Point
This document will guide you on how to use a FreeBSD system as a wireless access point. This is intended to supplement the FreeBSD Handbook and not replace it. Getting FreeBSD to act as a wireless access point involves the following steps: Make sure your installation includes hostapd and named (BIND) Recompile your kernel for pf support pf is not …
Read More »Google Speed Up Google Analytics with urchin.js
Ever notice that sometimes your sites take a while to load all the way because google’s urchin.js file is taking forever? You may recognize this problem when you see something similar to this in your browsers status bar “Transferring data from google-analytics.com…†Time To Setup? 4 minutes I got tired of seeing that all the time and so I set …
Read More »Electricity usage monitor
Many houses in the UK have an electricity meter with a light on it that flashes at a rate proportional to how fast electricity is being used (typically 800 times per kilowatt hour). I built a system that took advantage of this to measure our house’s electricity usage. We already had a PC (our router) sitting on the floor next …
Read More »Falsafah 5 jari
1. Ada si gendut jempol yang selalu berkata baik dan menyanjung. 2. Ada telunjuk yang suka menunjuk dan memerintah. 3. Ada si jangkung jari tengah yang sombong dan suka menghasut jari telunjuk. 4. Ada jari manis yang selalu menjadi teladan, baik, dan sabar sehingga diberi hadiah cincin. 5. Dan ada kelingking yang lemah dan penurut serta pemaaf (ingatkah anda waktu …
Read More »