Mengubah host in Mac Sierra

  1. Ketik perintah dibawah ini terminal

    sudo nano /etc/hosts

  2. Masukkan IP dan Alamat Website yang anda inginkan

    173.21.69    web.dev

  3. Silahkan di ping alamat website yang anda ubah

Note : ketika menuliskan ip jgn gunakan spasi.

 

Advertisements
| Leave a comment

Linux Command Key

Baru belajar linux lagi, berikut list command yang sering digunakan di sysadmin 🙂

  • List User                                        : $ cat /etc/passwd
  • List User Simple .                        :  awk -F’:’ ‘{ print $1}’ /etc/passwd
  • Copy same text file                     : cp file1.txt file2.txt
  • List all file include hidden .      : list -a
  • Version of debian .                      : lsb_release -da
| Leave a comment

My New year’s resolution

 Make dreams come true with this score : 100 or 7.

| Leave a comment

Daftar tempat glamping (glamour camping)

Ramadhan tahun ini rencananya berlibur bersama keluarga dengan thema liburan yang berbeda dari biasanya, ya kita akan melakukan glamping (glamour camping). Tujuan kita melakukan glamping saat ini adalah agar kita lebih mendekatkan diri dengan alam. Setelah melakukan riset tempat2x yang menarik untuk dikunjungi akhirnya saya mendapatkan daftar tempat2x Glamping yang cukup menarik. Semoga bermanfaat.

untitled-1untitled-2

 

Posted in Rileks | Leave a comment

Daya saing Indonesia 2016 – 2017 berdasarkan data WEF

Beberapa hari kemarin Indonesia dikejutkan oleh
menurunnya daya saing Indonesia versi WEF.
Untuk itu saya mencoba melihat dari 12 pilar yang berhubungan
dengan Kementerian Ristekdikti nilai – nilai apa sajakah
yang menurun.

Dari 12 pilar WEF dapat kita lihat bahwa terdapat 3 pilar
yang berhubungan dengan Kementerian Ristekdikti yaitu
Higher Education and Training, Technological Readiness
And Innovation. Dari laporan yang diberikan WEF dapat kita lihat adanya penurunan
di ketiga pilar tersebut.

Dilihat dari data Innovasi WEF; Kementerian Ristekdikti masih
perlu bekeja keras dalam kolaborasi Industri dan Avalaibilty of
Scientist and Engineers.

1

4

3

Hipotesis saya dengan bergabungnya Ristek dan Dikti menjadi menurun
mungkin ada benarnya mengingat salah satu indikator penurunan Innovasi
adalah kolaborasi Universitas dan Industri.

| Leave a comment

Android Studio Shortcuts

Add unimplemented methods: CTRL + I

Override methods: CTRL + O

Format code: CTRL + ALT + L

Show project: ALT + 1

Show logcat: ALT + 6

Hide project – logcat: SHIFT + ESC

Build: CTRL + F9

Build and Run: CTRL + F10

Collapse all: CTRL + SHIFT + NumPad +

Expand all: CTRL + SHIFT + NumPad –

Find and replace: CTRL + R

Find: CTRL + F

Posted in IT learning | Leave a comment

A practical security guide for web developers

The intended audience

Security issues happen for two reasons –

  1. Developers who have just started and cannot really tell a difference between using MD5 or bcrypt.
  2. Developers who know stuff but forget/ignore them.

Our detailed explanations should help the first type while we hope our checklist helps the second one create more secure systems. This is by no means a comprehensive guide, it just covers stuff based on the most common issues we have discovered in the past.

Contents

  1. The Security Checklist
  2. What can go wrong?
  3. Securely transporting stuff: HTTPS explained
  4. I am who I say I am: Authentication
    4.1 Form based authentication
    4.2 Basic authentication
    4.3 One is not enough, 2 factor, 3 factor, ….
    4.4 Why use insecure text messages? Introducing HOTP & TOTP
    4.5 Handling password resets
  5. What am I allowed to do?: Authorization
    5.1 Token based Authorization
    5.2 OAuth & OAuth2
    5.3 JWT
  6. Trust no one: User Inputs are evil
    6.1 Sanitizing Inputs
    6.2 Sanitizing Outputs
    6.3 Cross Site Scripting
    6.4 Injection Attacks
    6.5 User uploads
    6.6 Tamper-proof user inputs
  7. Plaintext != Encoding != Encryption != Hashing
    7.1 Common encoding schemes
    7.2 Encyption
    7.3 Hashing & One way functions
    7.4 Hashing speeds cheatsheet
  8. dadada, 123456, cute@123: Passwords
    8.1 Password policies
    8.2 Storing passwords
    8.3 Life without passwords
  9. Public Key Cryptography
  10. Remember me, please: Handling Sessions
    10.1 Where to save state?
    10.2 Invalidating sessions
    10.3 Cookie monster & you
  11. Fixing security, one header at a time
    11.1 Secure web headers
    11.2 Data integrity check for 3rd party code
    11.3 Certificate Pinning
  12. Configuration mistakes
    12.0 Provisoning in cloud: Ports, Shodan & AWS
    12.1 Honey, you left the debug mode on
    12.2 Logging (or not logging)
    12.3 Monitoring
    12.4 Principle of least privilege
    12.5 Rate limiting & Captchas
    12.6 Storing project secrets and passwords in a file
    12.7 DNS: Of subdomains and forgotten pet-projects
    12.7 Patching & Updates
  13. When the bad guys arrive: Attacks
    13.1 Clickjacking
    13.2 Cross Site Request Forgery
    13.3 Denial of Service
    13.4 Server Side Request Forgery
  14. Stats about vulnerabilities discovered in Internet Companies
  15. On reinventing the wheel, and making it square
    15.1 Security libraries and packages for Python
    15.2 Security libraries and packages for Node/JS
    15.3 Learning resources
  16. Maintaining a good security hygiene
  17. Security Vs Usability
  18. Back to Square 1: The Security Checklist explained

 

taken from : https://github.com/FallibleInc/security-guide-for-developers

| Leave a comment