Senin, 12 Desember 2016


RANKING ULASAN1/ULASAN2 PESERTA OS 2016-2
--------------------------------------------------------------------------------------------------------------------------
01. [U1-19] http://joshiarheinier.blogspot.co.id/2016/12/ulasan-1.html
02. [U2-25] http://ahmadhilman-os162.blogspot.co.id/2016/12/introduction-to-practical-hacking-and.html
03. [U2-33] http://os162-rrrsss.blogspot.co.id/2016/12/ulasan-2.html
04. [U1-29] http://risyadhasbullah.blogspot.co.id/2016/12/introduction-to-hacking.html 
05. [U1-35] http://tugasos162.blogspot.co.id/2016/12/windows-10-your-own-creepy-stalker.html 
06. [U2-13] http://joshiarheinier.blogspot.co.id/2016/12/ulasan-2.html 
07. [U1-88] http://zetlogger.blogspot.co.id/2016/12/apache-hadoop-modern-data-os.html 
08.  [U2-23] http://louissihombing.blogspot.co.id/2016/12/threat-models.html 
09.  [U1-35] http://tugasos162.blogspot.co.id/2016/12/windows-10-your-own-creepy-stalker.html
10. [U2-19] http://luthfanrasyad.blogspot.co.id/2016/12/ulasan-2-aws-cloud-storage.html 
11. [U2-10] http://harunakaze.blogspot.co.id/2016/12/steamos.html
12. [U2-16] http://otonaenomichi.blogspot.co.id/2016/12/understanding-server-licensing-ulasan-2.html
13.[U1-06] http://putrirmd.blogspot.co.id/2016/12/cloud-computing.html
14.[U1-11] http://twobunny22.blogspot.co.id/2016/12/ulasan-1-operating-system.html
15. [U2-26] http://rizkyaly.blogspot.co.id/2016/12/ulasan-2.html
16. [U2-14] http://alvinrezalugiana.blogspot.co.id/2016/12/ulasan-2-operating-system-networking.html
17. [U2-12] http://keynekassapa13.blogspot.co.id/2016/12/review2-io-system-and-device-drivers.html
18. [U1-21] http://rizkyaly.blogspot.co.id/2016/12/the-video-that-im-reviewing-for-my-os.html
19. [U1-03] http://vincent51-ulasan1.blogspot.co.id/2016/11/ulasan-1-virtualization.html
20. [U2-41] http://stephanussoekendar.blogspot.co.id/2016/12/ulasan-2-windows-azure-sebagai-iaas.html
--------------------------------------------------------------------------------------------------------------------------
A Ranking by (Github):/TheCelVanBi

URL:                             http://awdictas.blogspot.com/2016/12/ranking-ulasan1ulasan2-                                              peserta-os-2016.html
First Revision:              12 December 2016
Last Revision:              12 December 2016
--------------------------------------------------------------------------------------------------------------------------

      Sabtu, 10 Desember 2016

      OS162 Review2 Writing Bad @$$ Malware for OS X
      Hello everyone, I am Benediktus Giovanito Antaputra. In this post I would like to review a video available on YouTube entitled: "Writing Bad @$$ Malware for OS X". This video was published on December 2015 by an account named Red Hat (the speaker in the video is Patrick Wardle). The duration of the video is 51 minutes and 38 seconds, and the URL is https://www.youtube.com/watch?v=fv4l9yAL2sU . Patrick Wardle himself is the Director of Research at Synack, an incorporation focusing on security assessment.

      The video begins with Patrick explaining about several known OS X malware such as iWorm, XSLCmd, and WireLurker (though firmware/kernel-mode malware is not covered in the video) as well as the reason why people should be concerned about Apple's so-called prevalent security. He adds that by his assessment, the malwares are sufficient enough but lack elegancy in its programming and are very easy to detect, as most of the sourcecode are unable to handle antivirus countermeasures. He then goes on to describe how one would infect a Mac through means of downloading software over HTTP.

      After that, he recommends several more viable ways other than what the malwares had been using as a means of surviving countermeasures once the user is aware of the malware. Several persistence methods he mentioned are binary infection, load time process infection, and dylib hijacking. He also points out faults in the OS X loader in which a hacker can exploit and then infect the PC. Having pointed out the faults of the loader, he goes on to suggest several ways in which the malwares can be improved, which is by adding self-defense characteristics. Also included is his preferred methods so that the malware can defend itself, which is encryption and hiding. The video draws to an end as he mentions several other methods of bypsasing pre-installed OS X security software.

      Although I am a non-Apple user, this video is interesting and very educative for several reasons. It opens the viewers' eyes to the fact that even if Apple-based malware is much fewer than Windows', this does not guarantee Apple's competence in securing its OS. The speaker himself, in my opinion, is able to express his views on the subject of OS X malware with obvious expertise and finesse. The various 'solutions' he offers, for example, to infect an OS X PC clearly shows that he has given much thought, as well as experimentation, on the matter. The level of professionality, in conclusion. is what makes the video so enjoyable.

      My GitHub account: TheCelVanBi
      The URL of this review: http://awdictas.blogspot.com/2016/12/os162-review2-writing-bad-malware-for.html
      The URL of the video:  https://www.youtube.com/watch?v=fv4l9yAL2sU
      The duration of the video: 51 minutes 38 seconds
      Date of first and last submission: 10 December 2016

      Jumat, 09 Desember 2016

      Review1: Cloud-Based Network Management
      Hello folks, my name is Benediktus Giovanito Antaputra (typically known as Ivan) and today we will be discussing a video created by the YouTuber 'Eli the Computer Guy' entitled 'Cloud Based Network Management Introduction'. This is the URL: https://www.youtube.com/watch?v=gWXHBEH_U-o . The video itself is 57 minutes and 22 seconds long, published on November 13, 2014. This video is specifically created for beginners trying to rely on the cloud as a means of managing and operating their networking equipment.
      Cloud-based network management enables users to interact with the cloud servers so that the necessary configurations for their network equipment can be set up automatically instead of manually. Therefore, instead of using the CLI, they can manage networking equipment on a more user-friendly GUI. Eli also warns interested users to choose their cloud networking service provider carefully, as some will charge extra for various reasons. He explains that the cloud networking equipment itself is straightforward to operate, provided the user can supply the equipment’s necessities.  Another benefit of cloud network that he mentioned was the presence of log files which record the number of clients using a device, time of usage, number of data uploaded/downloaded to/from a website, etc. The rest of the video is filled with his recommendations of various cloud providers and his sponsors.
      Having watched several of Eli's videos, I can say that the videos Eli has made tend to thoroughly explore the concepts that he is discussing, this video not being an exception. Eli has successfully explained the benefits of utilizing the cloud as a method of managing networking equipment. Not only that, he also provides users with his advice concerning choosing the right cloud service provider in terms of additional fees and functionality, sharing invaluable experience to his viewers. Through his detailed recounts of previous experiences we are assured that Eli is, at the very least, experienced in the IT field, giving the video more credibility.

      Finally, here are some information concerning the blog writer. The github account is: TheCelVanBi. The URL of this review is: http://awdictas.blogspot.com/2016/12/review1-cloud-based-network-management.html. The URL of the video is https://www.youtube.com/watch?v=gWXHBEH_U-o . The video itself is 57 minutes and 22 seconds long. The first and final submission date is December 9, 2016.