Hacker

Oct
21

Getting to Know What is a Proxy? Definition, Examples, Functions and How it Works

When surfing the internet, you may have heard the term proxy . Proxy is becoming a topic that is increasingly discussed along with the need for privacy and security in cyberspace. Many people use proxies for various purposes, such as increasing security, accessing blocked sites, or speeding up internet connections. But what is a proxy ? How does it work, and […]

By Yazid Yusuf | Blog . Hacker . Network . News . Programming
DETAIL
Sep
26

Steps to Secure Web Applications from SQL Injection Attacks

Web application security has become a major focus in today’s digital era, especially with the increasing threat of cyber attacks. One of the most common threats is the SQL Injection attack, which is a technique for exploiting vulnerabilities in a web application by manipulating SQL commands. If a web application does not have adequate protection, […]

By Yazid Yusuf | Blog . Hacker . News . Programming
DETAIL
Sep
18

What is Ethical Hacking and How to Become an Ethical Hacker?

In the increasingly advanced digital era, cybersecurity threats have become one of the most critical issues for companies around the world. Cyberattacks can result in significant financial losses, data breaches, and damage a company’s reputation. One way to overcome this threat is through ethical hacking. In this article, we will discuss what ethical hacking is, […]

By Yazid Yusuf | Blog . Hacker . News . Programming
DETAIL
Aug
20

How to Secure Personal Data on the Internet

Protecting our personal data is becoming more and more important in today’s computer and internet era because every time we use the internet, our data can be targeted by cybercriminals. Therefore, it is very important to know how to protect our personal data when using the internet. 1. What is meant by Personal Data? 1.1 […]

By Yazid Yusuf | Blog . Hacker . News
DETAIL