Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: buku anak

Menghitung Pajak Reseller Buku Anak

Menghitung Pajak Reseller Buku Anak

  • 4 min

Well, sudah lebih setahun belakangan ini istri (callsign IG @bukuasma) menggeluti bidang baru setelah beberapa tahun sebelumnya berkutat di sektor fashion (@HarifaBoutique). Setelah founder Harifa Boutique akhirnya sepakat untuk melabuhkan biduk dakwah di bidang muslim’s fashion (dan kemudian salah satu founder-nya berlayar […]

  • 09/07/2018
Tagged buku anak, jualan, pajak umkm, pp-23/2018, reseller

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Penempatan (kali ini punyaQ)
Kami Nggak Kerja, Kalian Nggak Gajian
Penelusuran Iseng
Vinir Slicing

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

GodPotato - Local Privilege Escalation Tool From A Windows Service Accounts To NT AUTHORITY\SYSTEM
PentestGPT - A GPT-empowered Penetration Testing Tool
Bootlicker - A Generic UEFI Bootkit Used To Achieve Initial Usermode Execution

Hakin9

VPN vs. MPLS: Choosing the Right Solution for Your Business
Email Delivery: How to Break All the Rules of Zero Trust
Bitcoin Account Hijacking Using OSINT Techniques
Why Using Open Source Resources in App Development is Essential

Hacktivity h1

Account takeover due to insufficient URL validation on RelayState parameter
Blind SSRF as normal user from mailapp
Stored XSS in merge request pages
Blind SSRF in FogBugz project import
Domain Takeover - gl-canary.freetls.fastly.net
CVE-2023-28320 - siglongjmp race condition
Privilege escalation to root in Pages build image v2
Authenticated but unauthorized users may enumerate Application names via the API
Git Arg Injection in kubernetes-sigs/release-sdk
Bypass validation parts in AWS IAM Authenticator for Kubernetes

The Hacker News

Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices
Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
6 Steps to Effectively Threat Hunting: Safeguard Critical Assets and Fight Cybercrime
Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks
RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers
CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security
Implementing Risk-Based Vulnerability Discovery and Remediation

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes