Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Month: January 2020

Pemisahan Bukanlah Titik Fokus Reformasi Kelembagaan Pajak

Pemisahan Bukanlah Titik Fokus Reformasi Kelembagaan Pajak

  • 9 min

Bagaikan peristiwa yang terjadi dengan pasangan selebriti di Indonesia dalam gossip selebritas, suami istri selebriti akan bercerai, seluruh infotainment memberitakan lalu munculah pertanyaan dari kita semua, perlukah bercerai? Perceraian tentu ada alasan, tidak ada orang tiba-tiba ingin berpisah tanpa sebab. Berpisah sudah […]

  • 23/01/2020
Tagged enabler, otonomi pajak, pajak
Virtual Tour dan Augmented Reality

Virtual Tour dan Augmented Reality

  • 1 min

Kayanya asyik juga ya kalau bisa bikin virtual tour untuk kantor. Interface-nya mungkin seperti Google Street View, namun hanya sekitar kantor dan area publik saja. Perlu cari howto dan referensi teknisnya terlebih dahulu. Alternatif lain adalah bikin semacam Augmented Reality (AR) jadi […]

  • 12/01/2020
Tagged augmented reality, virtual tour
Mengenal Opini Akuntan

Mengenal Opini Akuntan

  • 3 min
  • 7

Saat ini sedang ramai dibicarakan tentang skandal PT Jiwasraya yang menimbulkan kerugian trilyunan rupiah. Tertarik dengan hal ini, saya yang pernah belajar akuntansi mencoba mendapatkan laporan keuangan PT Jiwasraya. Ternyata publikasi terakhir laporan PT Jiwasraya adalah untuk tahun buku 2017. Saya agak […]

  • 10/01/2020
Tagged akuntansi, audit, Jiwasraya, laporan keuangan, modified opinion
Modus Trade Misinvoicing pada Aliran Uang Ilegal

Modus Trade Misinvoicing pada Aliran Uang Ilegal

  • 9 min
  • 2
  • 2

Tulisan ini bukan dimaksud untuk mengajari para ahli keuangan dan pihak di lapangan yang mungkin setiap hari berkutat menjaga perdagangan agar tetap pada Fair of Bussiness. Namun sekedar berbagi dan untuk menyadarkan kita semua bahwa bocornya pendapatan negara dengan adanya aliran uang […]

  • 03/01/2020
Tagged money laundry, pencucian uang, trade misinvoice, transfer pricing

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Suami Ideal
Kami Nggak Kerja, Kalian Nggak Gajian
Amnesti (Target) Pajak
Sudahkah Kantormu Melek Data?

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

DFShell - The Best Forwarded Shell
Yaralyzer - Visually Inspect And Force Decode YARA And Regex Matches Found In Both Binary And Text Data, With Colors
SSTImap - Automatic SSTI Detection Tool With Interactive Interface

Hakin9

Authentication Flood | Wireless Network AttacksĀ [FREE COURSE CONTENT]
Main Tips for Students to Protect Data Privacy
E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE VIDEO]
What are the Common Security Weaknesses of Cloud Based Networks?
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]
Introduction to Open-Source Intelligence | OSINT Fundamentals [FREE COURSE CONTENT]
Monitoring Docker container metrics and events
Vulnerability management with Wazuh open source XDR
7 Tips to Build A Banking Application That Will Be User-Friendly
Deception Technologies: Improving Incident Detection and Response by Alex Vakulov

Hacktivity h1

Open Redirect at blueonboardingqa1.jetblue.com
Rails ActionView sanitize helper bypass leading to XSS using SVG tag.
[U.S. Air Force] Information disclosure due unauthenticated access to APIs and system browser functions
Reflected XSS on .mil
reflected xss in www..gov
XSS on ( .gov ) Via URL path
IDOR for changing privacy settings on any memories
XSS at TikTok Ads Endpoint
Verification process done using different documents without corresponding to user information / User information can be changed after verification
wavecell.com: Broken Link Hijacking / Instagram Takeover @

The Hacker News

Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Microsoft Urges Customers to Secure On-Premises Exchange Servers
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes