#assignmentUnmoderated tagAll postsTrendingHotNewPromotedPayoutsfajar.purnama in #engineering • 2 years agoMy Simple C Program Demonstrating Heap Buffer OverflowNote This is the twelth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, licensefajar.purnama in #engineering • 2 years agoMy Summary About Origin of BiosignalsNote This is a summary about Biosignals in my Masters course of Bioinformation Engineering. If the passage is too much for you, then it is better to view the slide instead.…fajar.purnama in #engineering • 2 years agoMy Assignment in Simple Image Compression Utility Website Evaluation and Other Journal Paper PresentationMy Impression About This Course Overall I really enjoyed the class, the materials were not complicated and interesting, the links shows to interesting page, the quiz helped me focus on thefajar.purnama in #engineering • 2 years agoMy Examples on Reverse Engineering in Computers when I was a young studentNote This is the tenth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license…fajar.purnama in #engineering • 2 years agoFinding Periods in Signal Equation Through VisualizationBack in high school and university in department of science and mathematic, it is compulsory to solve mathematical problem manually using theories through formulas. However in…killereyes in #hive-122108 • last yearHuman Computer Interaction1.What is Human Computer Interaction? -Human–computer interaction is research in the design and the use of computer technogodingame in #hive-148441 • 2 years agoI was busy with completing my university project todayToday was my busy day.It was sunday but I was not free.The engineering drawing teacher gave us some of projects.I did all the project all the day.Here I shared two of them.This…sarahrogerson32 in #information • last yearInformation Technology Assignment: How IT is managed in Apple?In any organisation, the infrastructure of IT faces a huge part. The IT is where the server works and the data is stored. Over the years enterprises over the world no matter how…fajar.purnama in #math • 2 years agoChaotic and Memoryless Binary Sequences Based on Skew Tent Maps0. Note This is the second assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright…fajar.purnama in #math • 2 years ago7,4 Hamming CodesFigure 0. 7,4 Hamming Code Venn Diagram 0. Note This is the fifth assignment from my Masters Applied Digital Information Theorfajar.purnama in #math • 2 years agoMarkov Information Binary Sequences Based on Piecewise Linear Chaotic Maps0. Note This is the third assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright…fajar.purnama in #math • 2 years ago(4,3)-Single Parity Check of Binary Sequence Skew Tent and PWL Map0. Note This is the fourth assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder,fajar.purnama in #math • 2 years agoChaotic Real-Valued Sequences By Skew Tent Map0. Note This is the first assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder,fajar.purnama in #technology • 2 years agoMy Comments on Network and Bots and Pentest when I was a young studentThis is the first assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignmfajar.purnama in #technology • 2 years agoMy Simple C Program Demonstrating Buffer OverflowNote This is the eleventh assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license…fajar.purnama in #technology • 2 years agoMy Opinion on Digital Forensic Steps when I was a Young StudentNote This is the fifteenth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright hfajar.purnama in #technology • 2 years agoIntrusion Detection System Important SpecificationsThe performance of an intrusion detection system (IDS) is how well an IDS can detect intrusions in a given network. There are many factors in measuring its performance, but in my opinionfajar.purnama in #technology • 2 years agoDealing with Malware for Ordinary UsersThe countermeasures of Malicious Ware (malware) are mitigation (prevention) or treatment like any other measures to cope against harmful substances. To prevent virfajar.purnama in #technology • 2 years agoMy Comments on Malware Quarantine when I was a young studentQuarantine is a place to isolate an object to prevent the infection of harmful substances. We can see when a person who is suffering from influenza is brought into an isolfajar.purnama in #technology • 2 years agoMalware Counter Measure Standard Operation Procedure in Old CorporationsI have a few experience in playing around with cyber attacks, but it was merely a curiosity and I did this on my own PCs and virtual machines. [Back then I tried e