New: assignmentAll contentburnbotblurtkractifitzzangamesvideoinstablurtr2cornellburnpostartcurationblurtafricaphotographyblurtindiablurtgermanblurtblockblurthispanonewsblurttribeHotTrendingNewDAppsbonyenglucero in assignment • last yearKindergarten Journey!Today is the 3rd day of school! How many times have you asked your child, “How was school today?” and been frustrated by the lack of response? As a parent,I want to know on how have been my…fajar.purnama in writing • 3 years agoMy IELTS Speaking Script Decades AgoNote This is my script for English speaking practice during my International English Language Testing System (IELTS) course few decades ago. This assignment has never been published anywhere and…fajar.purnama in blurtech • 3 years agoShort Description of IPTV AssignmentNote This is my undergraduate assignment in the Telecommunications Network course which creates a short description of IPTV obtained from that I translated to English myself. This work has…fajar.purnama in blurtech • 4 years agoMetal Wire Strength Calculation Object Lifting AssignmentNote This is one of my Doctoral assignment from Current Science and Technology in Japan Course which has never been published anywhere and I, as the author and copyright holder, license this…fajar.purnama in blurtech • 4 years agoMy Opinion on Digital Forensic Steps when I was a Young StudentNote This is the fifteenth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment…fajar.purnama in blurtech • 4 years agoMy Simple C Program Demonstrating Heap Buffer OverflowNote This is the twelth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment…fajar.purnama in blurtech • 4 years agoMy Simple C Program Demonstrating Buffer OverflowNote This is the eleventh assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment…fajar.purnama in blurtech • 4 years agoMy Examples on Reverse Engineering in Computers when I was a young studentNote This is the tenth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment…fajar.purnama in blurtech • 4 years agoMy Comments on Malware Quarantine when I was a young studentQuarantine is a place to isolate an object to prevent the infection of harmful substances. We can see when a person who is suffering from influenza is brought into an isolated place because…fajar.purnama in blurtech • 4 years agoChoosing Between Host and Network Intrusion Detection SystemRegarding to the deployment of IDS on the public cloud there are two cases. The first one is when we own the cloud the other one is if we borrow someone else's cloud. As for the first there are two…fajar.purnama in blurtech • 4 years agoIntrusion Detection System Important SpecificationsThe performance of an intrusion detection system (IDS) is how well an IDS can detect intrusions in a given network. There are many factors in measuring its performance, but in my opinion a good IDS…fajar.purnama in blurtech • 4 years agoMalware Counter Measure Standard Operation Procedure in Old CorporationsI have a few experience in playing around with cyber attacks, but it was merely a curiosity and I did this on my own PCs and virtual machines. Back then I tried exploiting the vulnerability on…fajar.purnama in blurtech • 4 years agoMy Comments on Information Security Policy when I was a young studentThe information security policies that were explained on this lecture are policies when handling vulnerabilities. I strongly agree to this policy due to my past experience in modifying systems. Most…fajar.purnama in blurtech • 4 years agoDealing with Malware for Ordinary UsersThe countermeasures of Malicious Ware (malware) are mitigation (prevention) or treatment like any other measures to cope against harmful substances. To prevent virus/worm infection is either we put…fajar.purnama in blurtech • 4 years agoMy Comments on Network and Bots and Pentest when I was a young studentThis is the first assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized…fajar.purnama in blurtech • 4 years ago7,4 Hamming CodesFigure 0. 7,4 Hamming Code Venn Diagram 0. Note This is the fifth assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the…fajar.purnama in blurtech • 4 years ago(4,3)-Single Parity Check of Binary Sequence Skew Tent and PWL Map0. Note This is the fourth assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder, license this…fajar.purnama in blurtech • 4 years agoMarkov Information Binary Sequences Based on Piecewise Linear Chaotic Maps0. Note This is the third assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder, license this…fajar.purnama in blurtech • 4 years agoChaotic Real-Valued Sequences By Skew Tent Map0. Note This is the first assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder, license this…fajar.purnama in blurtech • 4 years agoCollection of My Mini Assignments in Current Science and Technology in Japan 2016 CourseNote As the title suggest, the course is a collection of topics discussed by Professors in Kumamoto University which is compulsory for international students and optional for native Japanese…