Posted inIT Security Security 101 REDIS – Basic Security Posted by FachrezaR January 16, 2026 Redis is an open-source, in-memory data structure store commonly used as a database, cache, and…
Posted inIT Security Security 101 SAMBA – Basic Security Posted by FachrezaR January 16, 2026 Samba is an open-source software suite that implements the SMB/CIFS (Server Message Block) protocol, allowing…
Posted inIT Security Security 101 FTP – Basic Security Posted by FachrezaR January 16, 2026 FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a…
Posted inIT Security Security 101 NMAP – Basic Security Posted by FachrezaR January 16, 2026 Nmap (Network Mapper) is a powerful network scanning and security assessment tool widely used by…
Posted inIT Security Security 101 Ping – Basic Security Posted by FachrezaR January 16, 2026 The PING program is a network utility used to test connectivity between one device and…
Posted inABAP SAP World TAW 10 TAW 10 – Changing Tables Posted by FachrezaR October 23, 2025 CHANGE TO TABLES An ABAP program can correctly access a database table only when the…
Posted inABAP SAP World TAW 10 TAW10 – views and maintenance dialog Posted by FachrezaR October 23, 2025 WHY DO YOU NEED VIEWS? You typically find data for an application object distributed on…
Posted inABAP SAP World TAW 10 TAW 10 – Search Help Posted by FachrezaR October 23, 2025 SAP STANDARD FUNCTION: INPUT HELP By using F4 help or the input help, the flight…
Posted inABAP SAP World TAW 10 TAW10 – Introduction to Screen Programming Posted by FachrezaR October 23, 2025 USER DIALOGS A user dialog is a form of interaction between the user and the…
Posted inABAP SAP World TAW 10 TAW10 – THE PROGRAM INTERFACE Posted by FachrezaR October 23, 2025 OVERVIEW: INTERFACE A GUI status comprises different components including a menu bar; a standard toolbar;…