If you require any more information or have any questions about our site's disclaimer, please feel free to contact us by email at https://www.facebook.com/dickydraknes.
Disclaimers for http://infokomdns.blogspot.co.id:
All the information on this website is published in good faith and for general information purpose only. http://infokomdns.blogspot.co.id does not make any warranties about the completeness, reliability and accuracy of this information. Any action you take upon the information you find on this website (http://infokomdns.blogspot.co.id), is strictly at your own risk. http://infokomdns.blogspot.co.id will not be liable for any losses and/or damages in connection with the use of our website.
From our website, you can visit other websites by following hyperlinks to such external sites. While we strive to provide only quality links to useful and ethical websites, we have no control over the content and nature of these sites. These links to other websites do not imply a recommendation for all the content found on these sites. Site owners and content may change without notice and may occur before we have the opportunity to remove a link which may have gone 'bad'.
Please be also aware that when you leave our website, other sites may have different privacy policies and terms which are beyond our control. Please be sure to check the Privacy Policies of these sites as well as their "Terms of Service" before engaging in any business or uploading any information.
Consent
By using our website, you hereby consent to our disclaimer and agree to its terms.
Update
This site disclaimer was last updated on: Saturday, January 2nd, 2016 · Should we update, amend or make any changes to this document, those changes will be prominently posted here.
Terms of Service for
If you require any more information or have any questions about our Terms of Service, please feel free to contact us by email at .
Introduction
These terms and conditions govern your use of this website; by using this website, you accept these terms and conditions in full and without reservation. If you disagree with these terms and conditions or any part of these terms and conditions, you must not use this website.
You must be at least 18 [eighteen] years of age to use this website. By using this website and by agreeing to these terms and conditions, you warrant and represent that you are at least 18 years of age.
License to use website
Unless otherwise stated, and/or its licensors own the intellectual property rights published on this website and materials used on . Subject to the license below, all these intellectual property rights are reserved.
You may view, download for caching purposes only, and print pages, files or other content from the website for your own personal use, subject to the restrictions set out below and elsewhere in these terms and conditions.
You must not:
republish material from this website in neither print nor digital media or documents (including republication on another website);
sell, rent or sub-license material from the website;
show any material from the website in public;
reproduce, duplicate, copy or otherwise exploit material on this website for a commercial purpose;
edit or otherwise modify any material on the website;
redistribute material from this website - except for content specifically and expressly made available for redistribution; or
republish or reproduce any part of this website through the use of iframes or screenscrapers.
Where content is specifically made available for redistribution, it may only be redistributed within your organisation.
Acceptable use
You must not use this website in any way that causes, or may cause, damage to the website or impairment of the availability or accessibility of or in any way which is unlawful, illegal, fraudulent or harmful, or in connection with any unlawful, illegal, fraudulent or harmful purpose or activity.
You must not use this website to copy, store, host, transmit, send, use, publish or distribute any material which consists of (or is linked to) any spyware, computer virus, Trojan horse, worm, keystroke logger, rootkit or other malicious computer software.
You must not conduct any systematic or automated data collection activities on or in relation to this website without 's express written consent.
This includes:
scraping
data mining
data extraction
data harvesting
'framing' (iframes)
Article 'Spinning'
You must not use this website or any part of it to transmit or send unsolicited commercial communications.
You must not use this website for any purposes related to marketing without the express written consent of .
Restricted access
Access to certain areas of this website is restricted. reserves the right to restrict access to certain areas of this website, or at our discretion, this entire website. may change or modify this policy without notice.
If provides you with a user ID and password to enable you to access restricted areas of this website or other content or services, you must ensure that the user ID and password are kept confidential. You alone are responsible for your password and user ID security..
may disable your user ID and password at 's sole discretion without notice or explanation.
User content
In these terms and conditions, “your user content” means material (including without limitation text, images, audio material, video material and audio-visual material) that you submit to this website, for whatever purpose.
You grant to a worldwide, irrevocable, non-exclusive, royalty-free license to use, reproduce, adapt, publish, translate and distribute your user content in any existing or future media. You also grant to the right to sub-license these rights, and the right to bring an action for infringement of these rights.
Your user content must not be illegal or unlawful, must not infringe any third party's legal rights, and must not be capable of giving rise to legal action whether against you or or a third party (in each case under any applicable law).
You must not submit any user content to the website that is or has ever been the subject of any threatened or actual legal proceedings or other similar complaint.
reserves the right to edit or remove any material submitted to this website, or stored on the servers of , or hosted or published upon this website.
's rights under these terms and conditions in relation to user content, does not undertake to monitor the submission of such content to, or the publication of such content on, this website.
No warranties
This website is provided “as is” without any representations or warranties, express or implied. makes no representations or warranties in relation to this website or the information and materials provided on this website.
Without prejudice to the generality of the foregoing paragraph, does not warrant that:
this website will be constantly available, or available at all; or
the information on this website is complete, true, accurate or non-misleading.
Nothing on this website constitutes, or is meant to constitute, advice of any kind. If you require advice in relation to any legal, financial or medical matter you should consult an appropriate professional.
Limitations of liability
will not be liable to you (whether under the law of contact, the law of torts or otherwise) in relation to the contents of, or use of, or otherwise in connection with, this website:
to the extent that the website is provided free-of-charge, for any direct loss;
for any indirect, special or consequential loss; or
for any business losses, loss of revenue, income, profits or anticipated savings, loss of contracts or business relationships, loss of reputation or goodwill, or loss or corruption of information or data.
These limitations of liability apply even if has been expressly advised of the potential loss.
Exceptions
Nothing in this website disclaimer will exclude or limit any warranty implied by law that it would be unlawful to exclude or limit; and nothing in this website disclaimer will exclude or limit the liability of in respect of any:
death or personal injury caused by the negligence of or its agents, employees or shareholders/owners;
fraud or fraudulent misrepresentation on the part of ; or
matter which it would be illegal or unlawful for to exclude or limit, or to attempt or purport to exclude or limit, its liability.
Reasonableness
By using this website, you agree that the exclusions and limitations of liability set out in this website disclaimer are reasonable.
If you do not think they are reasonable, you must not use this website.
Other parties
You accept that, as a limited liability entity, has an interest in limiting the personal liability of its officers and employees. You agree that you will not bring any claim personally against 's officers or employees in respect of any losses you suffer in connection with the website.
Without prejudice to the foregoing paragraph, you agree that the limitations of warranties and liability set out in this website disclaimer will protect 's officers, employees, agents, subsidiaries, successors, assigns and sub-contractors as well as .
Unenforceable provisions
If any provision of this website disclaimer is, or is found to be, unenforceable under applicable law, that will not affect the enforceability of the other provisions of this website disclaimer.
Indemnity
You hereby indemnify and undertake to keep indemnified against any losses, damages, costs, liabilities and expenses (including without limitation legal expenses and any amounts paid by to a third party in settlement of a claim or dispute on the advice of 's legal advisers) incurred or suffered by arising out of any breach by you of any provision of these terms and conditions, or arising out of any claim that you have breached any provision of these terms and conditions.
Breaches of these terms and conditions
Without prejudice to 's other rights under these terms and conditions, if you breach these terms and conditions in any way, may take such action as deems appropriate to deal with the breach, including suspending your access to the website, prohibiting you from accessing the website, blocking computers using your IP address from accessing the website, contacting your internet service provider to request that they block your access to the website and/or bringing court proceedings against you.
Variation
may revise these terms and conditions from time-to-time. Revised terms and conditions will apply to the use of this website from the date of the publication of the revised terms and conditions on this website. Please check this page regularly to ensure you are familiar with the current version.
Assignment
may transfer, sub-contract or otherwise deal with 's rights and/or obligations under these terms and conditions without notifying you or obtaining your consent.
You may not transfer, sub-contract or otherwise deal with your rights and/or obligations under these terms and conditions.
Severability
If a provision of these terms and conditions is determined by any court or other competent authority to be unlawful and/or unenforceable, the other provisions will continue in effect. If any unlawful and/or unenforceable provision would be lawful or enforceable if part of it were deleted, that part will be deemed to be deleted, and the rest of the provision will continue in effect.
Entire agreement
These terms and conditions, together with 's Privacy Policy constitute the entire agreement between you and in relation to your use of this website, and supersede all previous agreements in respect of your use of this website.
Law and jurisdiction
These terms and conditions will be governed by and construed in accordance with the laws of , and any disputes relating to these terms and conditions will be subject to the exclusive jurisdiction of the courts of .
Model OSI adalah sebuah protocol-stack dimana layer bawah khusus menangani segala sesuatu yang berhubungan dengan hardware, sedangkan layer atas berkaitan dengan software. 7 layer model OSI di desain sedemikian rupa sehingga kendali dapat dialihkan dari satu layer ke layer yang lain.
Berikut adalah susunan model OSI dari layer paling atas (layer 7) sampai layer paling bawah (layer 1) beserta fungsi yang dijalankan :
Application
Menyediakan dukungan untuk aplikasi seperti FTP, Telnet, dan HTTP
Presentation
Enkripsi, SMB, ASCII, format data
Session
Flow control data, inisiasi dan terminasi koneksi
Transport
Komunikasi end-to-end (aplikasi ke aplikasi), layanan TCP dan UDP.
Network
Routing (OSPF, dan lain-lain). IP addressing
Data Link
Lan card, MAC address, pembentukan frame
Physical
Media transmisi seperti kabel UTP, wireless, maupun Fiber Optik
Model OSI bekerja seperti berikut ini :
Informasi dikirim dengan cara dikirim mulai dari layer application turun sampai layer physical.
Kemudian dikirimkan melewati media (kabel, wireless) sampai ke tujuan.
Setelah sampai, informasi di proses naik dari layer physicalsampai ke layer application.
Layer Application
Layer 7 (application) bukanlah aplikasi/program/software itu sendiri, tapi merupakan interface yang digunakan oleh aplikasi/program/software untuk berkomunikasi .
Berikut adalah beberapa layanan dan protokol-protokol yang bisa dibilang “tidak aman” :
FTP, layanan TCP yang beroperasi pada port 20 dan 21. Port 20 digunakan untuk transfer data klien dan server, sedangkan port 21 digunakan untuk control dan pengiriman command antara klien dan FTP server. Serangan pada layanan ini bisa berupa eksploitasi kesalahan konfigurasidirectory permission dan atau sniffing password yang berbentuk cleartext.
Telnet, layanan shell pada TCP yang beroperasi pada port 23. Telnet mengirimkan informasi yang kita ketikkan di klien kepada komputer lain. Telnet bisa diatur untuk koneksi secaraanonymous dan bisa juga diatur agar menggunakan username dan password. Kelemahan telnet adalah semua data termasuk username dan password dikirim dalam bentuk cleartext.
SMTP, layanan TCP yang beroperasi pada port 25 dan berfungsi untuk menjalankan proses pertukaran email antar sistem network. Pesan yang dikirim melalui SMTP memiliki 2 bagian,address header dan pesan text. Semua jenis komputer dapat bertukar pesan email dengan SMTP. Dua jenis serangan SMTP yang cukup beresiko adalah spoofing dan spamming.
DNS, layanan ini berjalan pada port 53 dan berfungsi untuk melakukan address mapping. DNS mengkonversi Fully Qualified Domain Names (FQDNs) seperti www.google.com ke bentuk IP address dan sebaliknya. DNS menggunakan UDP untuk DNS query dan TCP untuk zone transfers. DNS rawan oleh serangan poisoning dan jika salah konfigurasi dapat disalahgunakan untuk melakukan zone full transfer.
TFTP, beroperasi pada port 69, merupakan versi FTP yang menggunakan UDP untuk mengurangi overhead dan reliability dengan menghilangkan proses session management dan autentikasi, hal ini menimbulkan resiko keamanan yang cukup tinggi. TFTP biasa digunakan untuk mengirim file-file konfigurasi router dan untuk mengkonfigurasi kabel modem. Orang yang melakukan hacking pada kabel modem biasa dikenal sebagai uncapper.
HTTP, layanan TCP yang beroperasi pada port 80 ini membuat web menjadi layanan paling populer saat ini. HTTP menggunakan protokol request response, dimana klien mengirimkan request kemudian server memberikan response. Serangan pada HTTP bisa ditujukan ke server, browser, atau script-script yang berjalan pada browser.
SNMP, layanan UDP yang beroperasi pada port 161 dan 162, SNMP didesain sebagai cara yang efisien dan murah untuk memonitor network. Protokol SNMP memungkinkan perangkat-perangkat jaringan yang berfungsi sebagai agent untuk mengumpulkan berbagai macam informasi dan mengirimkannya ke server management. Hal yang membuat SNMP kurang aman adalah proses pengiriman community string yang masih dalam bentuk clear-text. SNMP versi 3 merupakan versi terbaru dan menawarkan fitur enkripsi agar lebih aman.
Layer Transport
Layer transport penuh dengan lubang keamanan karena merupakan tempat bagi UDP dan TCP. Karena UDP bersifat connectionless, mudah bagi hacker untuk melakukan serangan DoS (Denial of Service). Selain itu juga mudah untuk melakukan spoofing. Sedangkan TCP dapat dieksploitasi oleh hacker untuk mengidentifikasi berbagai macam layanan yang berjalan dan sistem operasi yang digunakan oleh target. Hal ini penting bagi hacker sebelum melakukan serangan.
Layer Network
Pada layer ini terdapat IP dan ICMP. IPv4 tidak memiliki built-in fitur security, karenanya IPSec yang merupakan komponen built-in dikembangkan. Tanpa IPSec, IP dapat dengan mudah menjadi target bagi berbagai macam serangan. Sedangkan ICMP dapat menjadi target bagi serangan Smurf DoS.
Layer Data Link
Konversi pengalamatan logik (IP) ke physical (MAC) harus dilakukan antara layer network dan layer data link. Protokol ARP digunakan untuk hal ini. Namun, ARP sering dimanfaatkan oleh hacker untuk melakukan ARP poisoning, sehingga hacker dapat mem-bypass switch dan monitor traffic. Selain itu,passive sniffing dapat menjadi metode bagus bagi hacker jika ia berada pada posisi yang strategis didalam network.
Layer Physical
Layer physical ini adalah layer yang paling mudah untuk “dibobol“. Logika sederhananya adalah jika seseorang mendapatkan akses secara fisik ke sebuah perangkat jaringan, tentunya dia juga bisa mendapatkan kendali penuh terhadap perangkat tersebut. Beberapa vendor perangkat jaringan juga menyediakan metode melakukan reset password untuk mendapatkan akses ke perangkat tersebut.
Layer Manusia
Layer ini tidak termasuk dalam susunan Model OSI. Namun layer ini bisa kita tambahkan sebagai layer terpenting dalam desain dan implementasi jaringan. Begitu pula dalam hal keamanan, layer ini memiliki ancaman terbesar yang dikenal sebagai social engineering, karena targetnya adalah manusia (admin, dan lain-lain). Pada umumnya organisasi membelanjakan anggaran yang cukup besar dalam bidang kontrol dan teknis, namun sangat sedikit anggaran yang dikeluarkan untuk pendidikan/pelatihan proses dan prosedur keamanan bagi karyawannya. Hacker dapat menggunakan berbagai macam teknik untuk melakukan tipu muslihat pada karyawan.
Ancaman lain pada layer ini adalah dumpster diving. Banyak perusahaan yang “membuang” berbagai macam hal yang terlihat tidak berguna tapi dapat dimanfaatkan oleh hacker sebagai alat untuk mengorek informasi tentang network internal. Misalnya, printout nama dan password, source code, memo, dan lain-lain.
Tolong Laporkan Jika Ada Link Yang Error Atau Gambar Tidak Muncul :) dan mohon untuk mengklik iklan banner untuk kelangsungan blog :)" Sekalian juga untuk biaya sekolah admin nya. :) terimakasih :) EmoticonEmoticon
Tolong Laporkan Jika Ada Link Yang Error Atau Gambar Tidak Muncul :)
dan mohon untuk mengklik iklan banner untuk kelangsungan blog :)"
Sekalian juga untuk biaya sekolah admin nya. :) terimakasih :)
EmoticonEmoticon