Skip to content
-
  • facebook
  • Instagram
  • YouTube
  • Tele
FachrezaR Blog FachrezaR Blog
  • Home
    • About Me
    • Contact
  • IT SecurityThe quieter you become, the more you are able to hear.
    • Common
    • Security 101IT Security 101 provides an introduction to the fundamental concepts and practices used to protect systems, networks, and data from cyber threats.
  • SAP WorldSystems, Applications & Products in Data Processing
    • ABAP
      • Library
      • C_ABAPD_2507
        • ABAP core data services and data modeling– Work with the ABAP development environment – Apply basic techniques of ABAP – Create simple object-oriented programs – Use ABAP SQL to access the database – Work with Business Objects and the Entity Manipulation Language – Develop simple applications with the ABAP RESTful Application Programming Model
      • TAW 10
      • TAW 12
  • HobbiesSweet Escape
    • Chess
    • Dota
    • Tennis
  • Home
  • 2026
  • January
WinRM
Posted inIT Security Security 101

WinRM

Posted by FachrezaR January 30, 2026
WinRM (Windows Remote Management) is a Microsoft implementation of the WS-Management protocol used for remote…
Continue..
John The Ripper
Posted inIT Security Security 101

John The Ripper

Posted by FachrezaR January 30, 2026
John the Ripper, often called John, is a popular password security auditing tool used in…
Continue..
NTLM
Posted inIT Security Security 101

NTLM

Posted by FachrezaR January 30, 2026
NTLM (NT LAN Manager) is an authentication protocol developed by Microsoft for verifying user identities…
Continue..
Function Module : FI_SUBSTITUTION_ITEM
Posted inABAP Library SAP World

Function Module : FI_SUBSTITUTION_ITEM

Posted by FachrezaR January 21, 2026
The Function Module FI_SUBSTITUTION_ITEM plays an important role in the SAP Financial Accounting (FI) module,…
Continue..
PORTS
Posted inCommon IT Security

PORTS

Posted by FachrezaR January 20, 2026
Ports are logical endpoints used in computer networks to manage different types of communication. They…
Continue..
WireShark
Posted inIT Security Security 101

WireShark

Posted by FachrezaR January 20, 2026
Wireshark is a widely used network protocol analyzer designed to capture and inspect network traffic.…
Continue..
LinPEAS
Posted inIT Security Security 101

LinPEAS

Posted by FachrezaR January 20, 2026
LinPEAS is a Linux privilege escalation auditing tool used in security testing and system assessments.…
Continue..
MYSQL
Posted inIT Security Security 101 Uncategorized

MYSQL

Posted by FachrezaR January 20, 2026
MySQL is a widely used open-source relational database management system. It stores data in structured…
Continue..
Chess
Posted inChess Hobbies

Chess

Posted by FachrezaR January 17, 2026
Chess is one of the oldest board games in the world and has a long…
Continue..
SQL Injection
Posted inIT Security Security 101

SQL Injection

Posted by FachrezaR January 17, 2026
SQL Injection is a common web application attack technique that targets databases through vulnerable input…
Continue..

Posts pagination

1 2 Next page
Categories

Recent Posts

  • HR Function Module Library
  • WinPEAS
  • SMBClient
  • Groovy Script
  • SSTI – Server Side Template Injection

Recent Comments

  1. FachrezaR on Unit 1 – Getting Started
  2. https://www.billighemsidafretag.se/ on Unit 1 – Getting Started
  3. FachrezaR on 👋 Hello World
  4. G on 👋 Hello World
  5. A WordPress Commenter on 👋 Hello World

Archives

  • April 2026
  • February 2026
  • January 2026
  • October 2025
when you have eliminated the impossible, whatever remains, however improbable, must be the truth?
Copyright 2026 — FachrezaR Blog. All rights reserved. Bloghash WordPress Theme
Scroll to Top

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by