Microsoft launch Azure Sphere OS

What is new in Microsoft? Recently, Microsoft has announced that they will launch a linux distro of its own from the simply loving Linux. The purpose is to aimed for the Internet of Things(IoT) market…

Computer Forensic

What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide…

Prowler – AWS Security Assessment tools

What is Prowler? During my research on how to do an security assessment on the cloud infrastructure, i stumble with Prowler tools which been write by┬áToni de la Fuente Twitter. The origin of the "Prowler"…

CryptoJacking

Cryptojacking is a new terms that means as a secret use of your computing device to mine cryptocurrency where it normally used on the purpose of be confined to the victim without their awareness. The…

Information Gathering Method

Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some "soft skills" and social engineering method. There is a lot of choice of information gathering such as…

Penetration Testing Walkthrough

As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing…

Meltdown & Spectre Protection

Nowadays, Meltdown & Spectre issues have been spread over the world pretty quickly. As people know, Meltdown & Spectre issues can let the attacker access the sensitive information that been stored in the victim's PC…

2018 Security Prediction

The year 2017 will raise down their curtains in a few days, and we will facing a new year soon. Because of that, there are a few prediction that might occurs in the year of…