Minggu, 11 Desember 2016

Ranking Ulasan

--------------------------------------------------------------------------------------------------------------------------
RANKING ULASAN1/ULASAN2 PESERTA OS 2016-2
--------------------------------------------------------------------------------------------------------------------------


  1. [U1-15] http://harunakaze.blogspot.co.id/2016/12/zephyr-rtos.html

  2. [U1-20] http://keynekassapa13.blogspot.co.id/2016/12/review1-deadlock.html
  3. [U1-26] http://alvinrezalugiana.blogspot.co.id/2016/12/operating-system-introduction-to-hacking.html
  4. [U1-01] http://tugas-os162.blogspot.co.id/2016/11/anatomy-of-filesystems-posted-by-benno.html
  5. [U2-02] http://vincent51-ulasan1.blogspot.co.id/2016/12/ulasan-2-servers.html
  6. [U1-17] http://dwitri-rizkydarmawan.blogspot.co.id/2016/12/ulasan-1.html
  7. [U1-34] http://ahmadhilman-os162.blogspot.co.id/2016/12/hybrid-cloud-infrastructure-introduction.html
  8. [U1-21] http://rizkyaly.blogspot.co.id/2016/12/the-video-that-im-reviewing-for-my-os.html
  9. [U2-08] http://zetlogger.blogspot.co.id/2016/12/apache-hadoop-modern-data-os.html
10. [U1-32] http://www.kompidolar.com/2016/12/mass-storage-system.html
11. [U1-31] http://louissihombing.blogspot.co.id/2016/12/controlling-hijacking-attacks.html
12. [U2-01] https://johannestobing.blogspot.co.id/2016/11/ulasan2.html
13. [U2-06] https://muhammadnuim.blogspot.co.id/2016/12/raids.html
14. [U2-04] http://twobunny22.blogspot.co.id/2016/12/ulasan-2-operating-system.html
15. [U1-04] https://psudeosudo.blogspot.co.id/2016/11/linux-sucks.html
16. [U2-10] http://harunakaze.blogspot.co.id/2016/12/steamos.html
17. [U2-05] http://indahp-os162-ulasan.blogspot.co.id/2016/12/understanding-switches.html
18. [U1-27] http://luthfanrasyad.blogspot.co.id/2016/12/ulasan-1-network-convergence.html
19. [U2-03] http://anissaedwita.blogspot.co.id/2016/11/ulasan2.html
20. [U1-18] http://catatanpartoba.blogspot.sg/2016/12/ulasan-1.html
21. [U1-34] http://ahmadhilman-os162.blogspot.co.id/2016/12/hybrid-cloud-infrastructure-introduction.html
22. [U2-12] http://keynekassapa13.blogspot.co.id/2016/12/review2-io-system-and-device-drivers.html
23. [U1-22] http://luthviar.blogspot.co.id/2016/11/ulasan-1-android-architecture.html
24. [U1-05] http://rahmanfathin.blogspot.co.id/2016/11/ulasan-1.html
25. [U1-13] http://muhammadiqbalnazulis.blogspot.co.id/2016/12/ulasan-1-kesempatan-kali-ini-saya-akan.html


--------------------------------------------------------------------------------------------------------------------------

Oleh (GITHUB)             : joshiarheinier
URL BLOG RANKING  : http://joshiarheinier.blogspot.co.id/2016/12/ranking-ulasan.html
Revisi Pertama             : 11 Desember 2016
Revisi Ketiga                : 13 Desember 2016
--------------------------------------------------------------------------------------------------------------------------

Kamis, 08 Desember 2016

Ulasan 2

    In this post, I want to review a video from Youtube that is uploaded by Youtube account named Burton Mullins. The title of the video is Defeating The Hackers - BBC Documentary. The video has duration 53 minutes and 17 seconds. To access the video, you can use the URL https://www.youtube.com/watch?v=HQJMg6FdcvQ.

    At first, the video tells about how the world is nowadays, how gadgets become important things to people, and also how vulnerable they are. Any gadgets, especially gadgets that have keyboards, are so vulnerable. People can be able to get your identity through gadgets nowadays. And people can also expose your secrets, steal your money, even steal your indentity by "eavesdropping" your gadgets. This kind of people is known as hacker. There are so many victims of hackers, most of them get their passwords cracked, causing the hackers be able to access all secrecy and privacy of the victims. Hackers can hack a person's account, and even hijack the account and own it. That's why cyber security is important. Nowadays, there are so many cyber security experts that are ready to protect the networks of computers against hackers.

   Hackers can cause many dangerous things. Not only get a person's secrets and identity, hackers can also hack a nuclear bomb! This thing has become a concern of governments in many countries. Since it becomes criminal and malicious, there also must be some defenses for hacker's attacks. Therefore, there is a thing in mathematics called semi prime number, that will be used for encryption to prevents the attacks of the hackers.

    Semi prime number is a multiplication result of 2 prime numbers. Prime number is a number that only can be divided by 1 and the number itself. What makes them important to a code, is when you combine those 2 prime number, become a semi prime number. Semi prime number. Semi prime number is really difficult to be found what are the numbers that could have been multiplied together to form them to get back to the original values. A big semi prime number is used as a code word, a key to scramble your credit card details when you buy something online. The big semi prime number is made from 2 big prime number that only you and the bank know. This semi prime number cannot be cracked by hacker. This algorithm of encryption is called RSA. RSA is effectively uncrackable because however powerful the PCs are, they can only process one computation at a time. But, as time goes by, scientists also try to build more powerful computer than before. Now, scientists are trying to build a computer that can do many computation at once, which has a potential to smash the codes that protect the internet. This computer is called a quantum computer. Since then, experts always try to find inovations about how to protect anything from hackers. And then, there is a person, named Daniel Sanchez, has found a way. He made a password embedded system, that uses muscle memory as the password. The deep unconcious part of the brain will prove the user's identity, so that no one can steal his/her indentity. It can be said that you must to "play" your own password first with your own signature, and the password will be embedded in your muscle memory.

    In my opinion, this video is great. The explanation of what a hacker is at first explained obviously, and there are so many interesting things about how the cyber security experts try to find a way to defeat the hackers. The quality of the video is also great, and for overall, the topic is interesting.

GitHub Account : https://github.com/joshiarheinier
URL Ulasan       : https://joshiarheinier.blogspot.com/2016/12/ulasan-2.html
Video URL         : https://www.youtube.com/watch?v=HQJMg6FdcvQ
Video Duration   : 53 Minutes 17 Seconds
First Revision     : Friday, December 9th 2016
Last Revision     : Friday, December 9th 2016


Ulasan 1

    In this post, I want to review a video from Youtube that is uploaded by Youtube account named Phillip Freeman. The title of the video is REDACTED - Public Key Encryption Intro with GnuPG. The video has duration 49 minutes and 47 seconds. To access the video, you can use the URL https://www.youtube.com/watch?v=SvlrGqi0_mU.

    In this video, the video maker, Phillip Freeman, introduces a public key encryption to the viewers, named GnuPG. In his introduction to this encryption, the topics focus on basic command line and concept of GnuPG and its relation with some file encrypting, like email, etc. The GnuPG is an open source PGP encryption system. PGP is an acronym for Pretty Good Privacy. PGP was found in 1991, created by Phil Zimmermann. The GnuPG itself is a strong cryptography that provides data privacy and data authentication.

    The GnuPG encryption system can generate keys. There are 2 part of keys, the public part and the private part. For the public part, it is distributed widely and not sensitive. For the private part, it is known only to the owner of the key. When a user wants to encrypt a file, his/her session key will be generated and encrypted for each recipient using his/her public key. When a user wants to decrypt a file, he/she must decrypt the session key using his/her own private key, and he/she must be the recipient of the encrypted file. In GnuPG, there is also a thing called signing. Signing is used to create digital signature by using the private key.

   To use the GnuPG, the user must generate a new key-pair first that will be used as their key. The user can also choose the key-type, key-size, and expiration date of the key. After that, he/she must fill the key-id, like the user's real name, email address, and also some comments for the key. The key is located in a file with .asc extension, which stands for ASCII text file. A file named pubring.gpg contains user's public key, while the scring.gpg file contains your secret key. You can also see the information of the other users' key with command line "--edit-key", as long as you have their public keys in your own computer. For the others, you can also set how far you trust other users' keys by changing the trust level To add the others' key to your own computer, you can use import command to import a key from a file. If the other wants to have your key, you can also export your key to a text file as well. Users can also share their signature with other through the key. But, the first thing to do before signing a key is to verify its authenticity.

    At the end of the video, Phillip Freeman shares some cheat sheets about GnuPG encryption system, like how to generate a key, how to revoke, how to import a key, etc.

    In my opinion, this video is great for someone who wants to know what is GnuPG encryption system and how to be able to use it for the first time. Phillip Freeman introduces the GnuPG so clearly, and he also gives some example about the encryption using GnuPG. Although, the quality of the making of the video is not so good. But, for overall, the video is quite interesting for them who wants to know GnuPG encryption system.

GitHub Account : https://github.com/joshiarheinier
URL Ulasan       : https://joshiarheinier.blogspot.com/2016/12/ulasan-1.html
Video URL         : https://www.youtube.com/watch?v=SvlrGqi0_mU
Video Duration   : 49 Minutes 47 Seconds
First Revision     : Thursday, December 8th 2016
Last Revision     : Friday, December 9th 2016