Vulnerabilities in Encapsulation

Encapsulation as people might have aware is a programming statement that been defined when it wrapping up the data under a single unit code. The main function would be to […]

Yara Tools Usage

Malware Researchers will use the tool YARA in terms of helping them to identify and classify any sample of the malware used. Normally, Malware Researchers will able to create any […]

Data Breach Assessment

What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as defined but some people will […]

Google Dork

Google Dork can be considered as one of the traditional and old ways of extracting sensitive information from the website such as email addresses and lists, login credentials, and gain […]

Cryptography Review

Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key […]

Secure over the Network

Nowadays, most everyone uses the internet for personal and business users over the network device (Router/Switch). However, the organization only do some protection on their server and system where they […]

Password Security

Nowadays, the user has to be careful when choosing the password for any system or device to avoid. I would advise that the user need to be putting a strong […]

OS fingerprint method

During Penetration Testing phrase, A pentester will test the Operating System for verification usage. The method can be used for this activity such as Nmap and TTL response where it […]

Business Continuity Plan Review

As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization because it has included: Continous […]

SQL Injection Masterclass

In this post, I would like to take some time to talk on the well-known attack to all people out there. The attack that I mentioned above is SQLi which […]