Posted inIT Security Security 101 WinRM Posted by FachrezaR January 30, 2026 WinRM (Windows Remote Management) is a Microsoft implementation of the WS-Management protocol used for remote…
Posted inIT Security Security 101 John The Ripper Posted by FachrezaR January 30, 2026 John the Ripper, often called John, is a popular password security auditing tool used in…
Posted inIT Security Security 101 NTLM Posted by FachrezaR January 30, 2026 NTLM (NT LAN Manager) is an authentication protocol developed by Microsoft for verifying user identities…
Posted inABAP Library SAP World Function Module : FI_SUBSTITUTION_ITEM Posted by FachrezaR January 21, 2026 The Function Module FI_SUBSTITUTION_ITEM plays an important role in the SAP Financial Accounting (FI) module,…
Posted inCommon IT Security PORTS Posted by FachrezaR January 20, 2026 Ports are logical endpoints used in computer networks to manage different types of communication. They…
Posted inIT Security Security 101 WireShark Posted by FachrezaR January 20, 2026 Wireshark is a widely used network protocol analyzer designed to capture and inspect network traffic.…
Posted inIT Security Security 101 LinPEAS Posted by FachrezaR January 20, 2026 LinPEAS is a Linux privilege escalation auditing tool used in security testing and system assessments.…
Posted inIT Security Security 101 Uncategorized MYSQL Posted by FachrezaR January 20, 2026 MySQL is a widely used open-source relational database management system. It stores data in structured…
Posted inChess Hobbies Chess Posted by FachrezaR January 17, 2026 Chess is one of the oldest board games in the world and has a long…
Posted inIT Security Security 101 SQL Injection Posted by FachrezaR January 17, 2026 SQL Injection is a common web application attack technique that targets databases through vulnerable input…