Archive for the ‘Sistem Keamanan Komputer’ Category


1.  Here are the examples of using Caesar cipher methods to find out plaintext in a sentences which has been encrypsied.

      Examples ofcipherthat will besolved :

      WKLV LV VHFRQG WDVN RI FRPSXWHU VHFXULWB VBVWHP

  • On the cipher above, there are 6 spaces, it means that we have gotten six plaintext (a space also counted as one as one character)
  • Look for the suspicious and short words first, consist of one two or three words or the repetition words
  •  The example of cipher above, there are two words which can be two indicator, namely LV and RI

Buffer Overflow

Posted: November 7, 2011 in Sistem Keamanan Komputer

 

  1. Deskripsi Buffer Overflow

      Untuk mengetahui apakah sebenarnya buffer overflow dan bagaimana cara kerja untuk mengekploitasinya, maka diperlukan pemahaman tentang cara kerja sistem processor di level bawah, seperti pemrograman assembly, manajemen memory text, stack, data dan sebagainya. Selain itu bagi pengguna sistem operasi Linux, pengalaman program debug gdb akan (more…)


– Design additional authentication information beside using username.

Enter username     = Anto

Enter password     = *********

put your finger on the fingerprint machine

Infalid acces (more…)


Implementation of security is essential to ensure the system is not interrupted and disturbed. Protection and security of the hardware and operating system are equally important. The operating system is only one small part of all software in a system.
Table below is an example of access matrix object :

(more…)


Transposition Encryption

Example 1

Plaintext = ANYTHING THAT ALLOWED THE USER TO COMPROMISE THAT WELL BETWEEN USER STATE

Stacking plaintext is like the table below, each line has the same number of characters. In this example I divide 7 characters for each line.

(more…)


  • PEMBOBOLAN DISTRIBUTOR ISI ULANG PULSA.

Salah satu distributor isi ulang di Jawa Tengah dibobol. Pembobolan  distributor isi ulang pulsa diduga dilakukan oleh Hacker.  Hacker masuk ke sistem keamanan jaringan informasi teknologi distributor tersebut.

Cara untuk menjadi anggota cukup mudah yaitu dengan mandaftar, memberikan nomor telepon seluler untuk menjual pulsa, dan menyetor uang untuk pembelian pulsa isi ulang, kemudahan inilah yang dimanfaatkan oleh pihak yang tidak bertanggung  jawab untuk (more…)