New era of computing has come, as more and more people use their Mobile devices, usage of cloud service for personal storage will become inevitable. PT. XL Axiata Tbk. is the one of first cloud ser…
Medical science has come a long way in achieving many wondrous feats. One of its implementation is the DICOM protocol, Digital Imaging and Communications in Medicine. First developed by NEMA in 199…
Dionaea is a low interaction honeypot that detects malware or intruders? activities on the emulated ports. The study shows that Raspberry Pi is capable and suited for running honeypots. It is very …
In recent years, cloud storage grows rapidly among technology users. Cloud storage is one of the service that cloud computing could provide. Most of the user aware about cloud storage, but not unde…
Intrusion Detection System (IDS) are used to detect attack and make recommendation for future incident.Snort is the most popular open source tools for IDS with the consideration of no limitation. S…
Virtualization in Computer Science is a technology that enables users to create virtual environment of hardware and software and run them concurrently. With a growing open source market today, seve…
Uncontrolled network traffic in organizations could lead to many malicious threats, such as data breach, server compromised, server availability, and others. Many network security threats can be de…
Usersare in danger of getting hit by a client side attacks which can come from a malicious URL. This URL can contain trojan apps that disguise as a normal application or trigger a download and exec…
Next Generation Firewall (NGFW) adds new capabilities of a standard fire-wall with an ability to inspect packets' contents, thus increasing precision. Three main usages of NGFW are to improve the Q…