Minggu, 11 Desember 2016

RANKING

------------------------------------------------------------------------------
RANKING ULASAN1/ULASAN2 PESERTA OS 2016 - 2017
------------------------------------------------------------------------------

-------------------------------------------------------------------------------
oleh : alvinrezalugiana
URL BLOG RANKING :http://alvinrezalugiana.blogspot.co.id/2016/12/ranking.html
Revisi Pertama : 12 Desember 2016
Revisi  : - 
------------------------------------------------------------------------------- 


 

Jumat, 09 Desember 2016

ULASAN 2 "Operating System : Networking"

This time, me myself Alvin Reza and my friend Risyad Ridho will review about one video which is interested from Youtube called “Networking” from Youtuber named “Eli the  Computer Guy”. In this video which have a duration 57 minutes 38 seconds, we will learn about how computer connect to the internet, internet devices such as : router, firewall, VPN, switches, wireless access points, cables, etc. 

URL : https://www.youtube.com/watch?v=rL8RSFQG8do&t=58s

Modem is the first device that will connect you to internet. Router connected to the modem, it doesn’t have high cpu or gpu specification but this device does networking very well. It allows computer on the internal network to talk to each other and also allow computers to connect to the internet. Underneath the router, there is device called firewall, it is the protective device provide the protection from hacker. Switch is splitter of the internet signal. Computer connects to switch, then switch will either allow to communicate to each other or to the internet. Basic diagram of how networking connects together and looks : Computer -> Switch -> firewall -> router -> modem. Devices explanation will be explained after this.
   
    There are 2 types of networking ; Physical and Logical Networking, which Within the computer world, they are very different.
  1. Physical Networking
Computer connects physically through network cable, switcher, router, etc.
  1. Logical Networking
           Even physically computer connect each other through switch, but sometimes logically they      aren’t connected to each other because of the switch
Device that connects network to the internet
  1. Modem
First device that connects the computer to the internet with other devices help. Can be either for T1 connection, cable connection, DSL, legally satellite internet connection. Turns your internet signal, protocol, language that used on your internal network into the language that can be used into the internet.
  1. Routers
Allows you to separate diff networks. Sharing internet connection. Some way to separate, no hacking each other. Internet connection split out from the modem, tenant have their own router. Can’t get into others router. Logically to divide network for multiple users.
  1. Firewall
Underneath router is firewall, device that tries to prevent hackers from being able to get into your network through the internet. Part of security function, it will affect the entire network and may have some unintended consequences, if its on, it will block internet services for the entire network.
  1. Switches
Device that connects all of the devices on the network together to allow them to “talk” to each other. Diff hubs and switches basically hubs split the internet signal for the network signal to everybody equally, it’s like a complicated cable splitter. Switches understand how to transfer data properly, so the network will run efficiently. Computer plugs into these ports, connects to router and so on. Can afford to connect more than 1000 computers which is very expensive.
There are 2 types of switches : Unmanaged and Managed Switches
  1. Unmanaged Switches is absolutely automatic which means we can’t configure anything on the switch, so we only hope that the switch will do what it’s supposed to do.
  2. Managed Switches is more complicated, because it allow you to program the switch to do certain things and make it do properly, allows you to play and change settings with things like quality of service and other high - level networking stuff.
  1. VPN (Virtual Private Network)
Allows computer anywhere in the world to connect to someone internal network and as far as the computers and networking devices are concerned that computer is now inside his / her network. They able to access it but a lot more slowly because the internal network works at least a hundred megabytes which is pretty fast, but for the person which go through the internet, it depends on internet speed and problems at that moment that can take things get very slow.
To be safe, the internal network use username and password which be informed to the client for them to connect to internal network. It will authenticate and then as long as it’s okay, VPN point will then allow the computer to be on the network.
  1. Wireless Access Points
Device that allows wireless computers and devices to connect to the network. It doesn’t really matter to have antenna or not. All computers wirelessly connect to them, and they have to plug 1 cable into the switch which allow the wireless device can communicate with wired devices and wired devices can communicate with a wireless device through WAP. 
4 standards WAP:
  1. 802.11 a | < 10 years ago
  2. 802.11 b | 10 years ago
  3. 802.11 g | 7 years ago
  4. 802.11 n | 3 years ago
   
In this video, I learn so many interesting things that I didn’t know before. I like how Eli explained to us, from the contents until the examples of each cases. He talks clearly and well prepared, so we can easily understand what he tries to say.

            My GITHUB Account is alvinrezalugiana and my friend’s GITHUB account is ngoding, my blog URL is http://alvinrezalugiana.blogspot.co.id/2016/12/ulasan-2-operating-system-networking.html, our Youtube URL is  https://www.youtube.com/watch?v=rL8RSFQG8do&t=58s  57 minutes 38 seconds, submission date 9 December 2016

ULASAN 1 "Operating System : Introduction to Hacking"

At this moment, me myself Alvin Reza and my friend Risyad Ridho will review about one interesting video from Youtube called “Introduction to Hacking” from Youtuber named “Eli the  Computer Guy”. In this video which have a duration 69 minutes 40 seconds, we will learn about what actually the meaning of hacking, who are hackers, why hacker hacks, how hackers plan hack, how the hackers protect themselves, and how you protect yourself from hackers. 

URL : https://www.youtube.com/watch?v=yGIHjTmTFfA&list=PLB250111087E58F76   

Hacking is simply a technical skill set. It is a non conventional ways of interacting with the systems and getting to data. The meaning of conventional ways is the way the designer’s of the system wants the user to interact and the non conventional ways is exploring the system not in the way that the designers want to. Then who is hacker? Of course hackers are people who do hacking.
There are three types of hackers,
  1. Black hat hackers : Evil hacker that destroys systems and steals data. We can think it as the bad guy.
  2. White hat hackers : It’s like an angel hacker, hacking to discover, always do hacking for good and right reasons. Ethical hacking so they basically act ethically. But this is just a marketing term. Spying isn’t ethical marketing concept. Only do hacking for the good such as looking for vulnerabilities
  3. Grey hat hackers : can be good  or bad, they understand how the system works so well and sometimes modify the system to improve. They may be saint or evil, so the position of the grey hat hackers is in the middle between black hat hackers and white hat hackers.
Also, there are three level of hacking skills.
  1. Computer science skill level. They are impressive people who learn about networking protocol, people who actually program, create viruses, malware, and fixes bugs. They are those who have high level of hacking skill, who understands, develops, and modify system or program.
  2. Technician class hacker, people who modify other people program, new and better tool to use in the open source market.
  3. The script kiddies, they are non technical people and decide to use other program, download virus and share it to others. All they do is install software into the computer and capture all the files and informations such as spying kids. They are just consumer people who use program on the market, they don’t understand what are computers are and how the computer system works.
Why hacker hacks?
  1. To acquire data for good or bad intentions. Good? For data recovery, pictures programs, and security testing. Bad? To acquire someone’s password, contact information, credit card, and monitor users activity for bad things.
  2. To impersonate somebody, stealing somebody identity and use it to deceive people.
  3. Destruction, destroy somebody you don’t like to shut them down
  4. Just for FUN. 
Hackers have 2 methods plan of attack, Physical and Digital Methods.
  1. Physical
    1. Hackers will pretend as a computer technician
    2. He will get into the building and gain access from the usb he / she attach to the server, and start hacking
  2. Digital
  1. Flood the target with so much data, that create the data full, and they can’t get out the data inside
  2. Backdoors, gaining unauthorized access to the system, and get in the computer.
  3. “Click this link here” or using advertisement. It’s a virus when it’s clicked, hacker can gain data from someone who click it.

To protect hacker himself, usually hacker will go to open cafe outside his town, and use the open wireless. This will prevent him to be tracked. He will go as far as possible and use internet connection which not even connected to him. He will make sure no trace of activities, temporary files and log files will be deleted, use somebody else’s computer, library computer, cafe computer, or buy a single use device(disposable). Because all of your activities on internet could be and usually tracked, through the firewall, computer systems, logging information all can be tracked. So to protect yourself from the hackers, use cash instead of credit card because they can get your credit card information and use it for their purpose. Other thing to protect ourselves is to  understand what hacker do, and it will be easy to guard ourselves against them.

In this video, I learn so many things that I didn’t know before. I like how Eli explained to us, from the contents until the examples of each cases. He talks clearly and well prepared, so we can easily understand what he tries to say. The content of this video is interesting, that’s why we choose this video to be reviewed. 

My GITHUB Account is alvinrezalugiana and my friend’s GITHUB account is ngoding, my blog URL is http://alvinrezalugiana.blogspot.co.id/2016/12/operating-system-introduction-to-hacking.html, our Youtube URL is https://www.youtube.com/watch?v=yGIHjTmTFfA&list=PLB250111087E58F76  69 minutes 40 seconds, submission date 9 December 2016