Christovito HidajatNivdort Dynamic Malware Analysis Using ANY.RUNAccording to Wikipedia, Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client…6 min read·Nov 21, 2021----
Christovito HidajatPerforming Simple Linux Forensics and MonitoringLinux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on…7 min read·Oct 31, 2021----
Christovito HidajatA Closer Look At Windows ForensicsAs stated in Wikipedia, Windows is a group of several proprietary graphical operating system families, all of which are developed and…10 min read·Oct 22, 2021----
Christovito HidajatDigital Image Forensics: Ways to Investigate Images’ ReliabilityPerforming Digital Image Forensics Using ExifTool, JPEGsnoop, and Forensically6 min read·Oct 3, 2021----
Christovito HidajatInsecure CAPTCHA: DVWA Hacking for Unsafe Verification ProcessDamn Vulnerable Web Application (DVWA): Testing CAPTCHA Vulnerabilities11 min read·Sep 26, 2021----
Christovito HidajatShould We be Allowed to be Invisible on the Net?Online Anonymity: A Controversial Technique for Anti-computer Forensics6 min read·Sep 19, 2021----
Christovito HidajatESP32 Chapter 12: After Hours of Inserting Data into MySQL Database using PHPNote: this will be the very last post of the ESP32 Series8 min read·Apr 25, 2020----
Christovito HidajatESP32 Chapter 11: Data Input on HTML Form ESP32 Web ServerHello and Welcome!7 min read·Apr 25, 2020----
Christovito HidajatESP32 Chapter 10: Being A Weather Forecaster with DHT11DHT11 Readings Transmission to Google Sheets6 min read·Apr 25, 2020----
Christovito HidajatESP32 Chapter 9: DHT11 Readings into Plot ChartsData Visualisation of DHT11 Readings in HTML Web Server7 min read·Apr 25, 2020--2--2