Sabtu, 28 Desember 2013

Basic tips for Secure Browsing

1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,
2. Use multiple accounts so that you dont get spams in your personal/ official email address.
3. Install good Antivirus and Two way firewall.
4. Use VPN for hiding identity and secure browsing when using internet out of your home.
5. Update your OS, Antivirus, Firewall and Browsers regularly.
6. Install a good spyware & Adware scanner .
7. Never provide personal information openly in public websites. Share your information carefully.
8. Never click on unwanted or suspiicious links. It may be hacking attempt.
9. Change your passwords regularly to increase the security of your daily actiivities.


Rabu, 25 Desember 2013

How to reveal saved asterisk password in the browser without any tool

What do you want to do when you open the web browser and then find a page with saved credential like this?
Do you want to know that saved password? :D

well, here is few step to reveal that asterisk password without any tools:
1. Right click on the saved password and then choose inspect element

2. Find text "<input type='password' name='bla bla bla >"
3. Change "type='password'" to "type='text'"

4. Enter
5. Now you can reveal the asterisk password

Next question, how to avoid this happening?
to avoid this happening you can do this things,
1. If there are anyone else that can use your computer, never save your password when your browser ask you to save the password.

2. if you really the one that can use your computer don't forget to lock your computer when you leave it. The simplest way if you can Windows OS you can press (Windows + L) to lock your computer.

-Your awareness is your computer security key- :)

How to know the real extension of a file?

In computer forensic challenge we usually work with a file with no extension like the file in red rectangle below
The next question, how we can know the real extension of those files?
If you want to know the real extension of those files the first thing you can do is check the "file signature" from those files.
what is file signature?
 a file signature is data used to identify or verify the content of a file. In particular, it may refer to:
  • File magic number: bytes within a file used to identify the format of the file; generally a short sequence of bytes (most are 2-4 bytes long) placed at the beginning of the file (wikipedia)
     1 byte = 8 bits = 2 Hex
     2 - 4 bytes = 4-8 hex
to know the "file signature" a file the first thing you can do is check the hex value of that file (because most of file signature is stored as hex value on database),
to do this you can follow this steps:
1. download this tool "HxD Editor"
2. after download, just install and open it.

3. open the file you want to know the real extension (click menu File --> Open)

4. copy first 4-8 hex value from HxD Editor
in example we copy first 6 digit Hex value : FF D8 FF
5. find file signature database in internet, like this one
the other file signature database:
6. rename the file with real extension

ta daaaa :)
For your exercise please find the right extesion for "Mocca" file :D
this is the file that you can download.

Jumat, 27 September 2013

Tahapan Instalasi Active Directory pada Windows Server 2008 R2

Active Directory adalah layanan directory yang terdapat pada system operasi server. Active Directory terdiri atas basis data dan juga layanan directory. Active Directory menyediakan sarana untuk mengelola identitas dan hubungan yang membentuk organisasi. Active Directory yang ada pada Windows Server 2008 R2 menyediakan berbagai fungsi untuk melakukan konfigurasi yaitu: administarasi system, pengguna (user), group, computer, dan pencarian directori. Active Directory juga memberikan cara untuk mengelola credential untuk mengizinkan pengguna yang sah yang dapat mengakses baik itu perangkat aplikasi maupun data.

Untuk lebih lengkapnya silakan download paper berikut ini :
  1. Paper versi Nunung
  2. Paper versi Herdi

The New Generation of Enterprise Java: Designing for the Next Big Thing

Telah terjadi pergeseran generasi dalam pembuatan java enterprise application. Berawal dari arsitektur monolitik menjadi multiple services yang saling berhubungan dan terdistribusi. Ada 4 Big Things yang dibutuhkan oleh Java Professional dalam melakukan perancangan, yaitu Cloud, Big Data, Agile Development & Operations, dan Failure is an option.

Berikut ini adalah hasil dari review Video Stepen Burton : The New Generation of Enterprise Java.

Untuk lebih lengkapnya silakan download paper berikut ini :
Download Paper versi Nunung atau Download Paper versi Herdi

Minggu, 20 Mei 2012

Configure Cisco 3600 Router with Radius Server

Radius Server 
A protocol or hardware that serves AAA services. AAA services include authentication, authorization and accounting. With AAA we can centralize our network configuration in one place (Radius Server). If we have many router or other device in our topology, we don't need to configure that devices one by one. Just list all username and password that used in network and add it to radius server.
How to make a radius server?
Radius server can be made by nomerous tools, like, windows server, ubuntu, Terminal Access Controller Access-Control System (TACACS) or etc. In this tutorial I will make a radius server by "WinRadius", a lite application that support AAA services.

Requirement to do this tutorial
At least you have this 5 tools:
1. VMware
2. GNS3
3. CISCO C3640 IOS
4. WinXP
5. WinRadius
6. A cup of coffe.. :D
Topology of router and radius server

1. Comfigure WinRadius
WinRadius Setting
NAS Secret : Secret key for router

WinRadius Database

WinRadius Test

 2. Setting your computer

If you want to know more about setting up radius server using WinRadius you can watch at this video.. :D

This is the video...
- Video1
- Video2

If you have any qusestion please leave your comment here..

Selasa, 01 Mei 2012


Communication is the exchange and flow of information and ideas from one person to another; it involves a sender transmitting an idea, information, or feeling to a receiver (U.S. Army, 1983). Effective communication occurs only if the receiver understands the exact information or idea that the sender intended to transmit.

If you want to know more about communication, you can download here.