Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: safety

Tips Berpergian dengan Airsoftgun

Tips Berpergian dengan Airsoftgun

  • 4 min
  • 2

Akhir bulan April lalu saya dinas ke Jakarta selama beberapa hari, ceritanya saya ditugaskan untuk memperbaharui konten situs organisasi yang memang perlu ditata ulang isinya. Jadi kalau anda berkunjung ke situs instansi saya, anda akan menemui kerapihan konten yang tidak ada sebelumnya […]

  • 18/05/2018
Tagged airsoft, airsoftgun, safety, tips

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Buka Setiap Hari Kerja
Kami Nggak Kerja, Kalian Nggak Gajian
Pemisahan Bukanlah Titik Fokus Reformasi Kelembagaan Pajak
Sudahkah Kantormu Melek Data?

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

Shodan-Dorks - Dorks for Shodan; a powerful tool used to search for Internet-connected devices
Pegasus-Pentest-Arsenal - A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool
Witcher - Managing GitHub Advanced Security (GHAS) Controls At Scale

Hakin9

RSS Error: A feed could not be found at `https://hakin9.org/category/news/feed/`; the status code is `403` and content-type is `text/html; charset=iso-8859-1`

Hacktivity h1

Memory Leak in libcurl via Location Header Handling (CWE-770)
`Curl_socketpair()` fallback vulnerable to man-in-the-middle attack
Any WARP User Can Access Organization-Specific Application
Shopify Partners Invitation Process Allows Privilege Escalation Without Email Verification
Bedrock Guardrails Evasion with Prompt Formatting
Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args) when args[0] is a string.
Weak Rate Limiting Controls in the (LOGIN) page Expose System to Brute Force and DoS Attacks
Open Redirect Vulnerability in OAuth Flow Leading to Potential Phishing Attack
[Xenoblade Chronicles X: Definitive Edition] Unrestricted RPCs allow DoS and writing arbitrary flags remotely
[Xenoblade Chronicles X: Definitive Edition] Improper validation of names allows injecting formatting tags and bypassing profanity filter

The Hacker News

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
Securing CI/CD workflows with Wazuh
How to Detect Phishing Attacks Faster: Tycoon2FA Example
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes