Posts

Strandhogg Vulnerability Protection

Image
A new vulnerability discovered by Promon named StrandHogg has been actively attacking Android devices. The bad thing is, it has capability to attack both rooted and un-rooted devices. This vulnerability is so dangerous that even knowledgeable users can be tricked to submit their credentials, which will then be stolen and used for malicious purposes. “StrandHogg is unique because it enables sophisticated attacks without the need for a device privilege escalation (rooting), The vulnerability allows hackers to exploit a weakness in the multitasking system of Android to enact powerful attacks that allows malicious apps to masquerade as  legitimate apps on the device,” says Promon. Securemetric, as one of the many companies, working in digital security, provided a solution named SMobileShieldX (SMSX). Quoted from its website, SMSX is a security technology that provides self-protection abilities to the mobile application. SMobileShieldX integrates directly into the mobile application to

Java Stream API

Image
Introduction Java stream API is not a really new API. This API has been introduced by Oracle since Java version 8. As specified inside the JDK documentation, Java stream is  A sequence of elements supporting sequential and parallel aggregate operations (source: https://docs.oracle.com/javase/8/docs/api/java/util/stream/Stream.html). Stream API, when used properly, can help the use of collections simpler and easier, following the way of doing functional programming . Java stream API has plenty of operations available. In today's post, we are going to run through some of the available operations provided by the stream API, including the sample source code and output from it. Due to so many operations available, we will limit our discussion to just several functions. For the rest of the discussion, we will consider having TWO (2) classes, Student and ClassRoom . The code for the 2 classes is as below. public class Student { private int age ; private String name ;

Digital Signing with Java

Image
Digital Signature Source: Wikipedia In today's post, we are going to see how easy it is to do digital signing using Java programming language. Java has provided libraries that you can use out of the box to produce digital signature. Let's get started. A little bit of theory For those of you who do not know yet about digital signature, this is basically a process that ensures that the content that you sent has not been altered in any way. Digital signature is one of the most important things to do in this digital world. Without it, it will be hard to verify data integrity. Relationship with Hashing At this stage, one must have noticed that to check data integrity, you can actually use a hashing algorithm. For example, when you download a file from the internet, they usually provide the hash (be it MD5 or SHA1 or higher) for you to check the integrity of the downloaded file. Although this is true, digital signing actually provides you with more than just a dat

National Library of Indonesia

Image
Yesterday, 27 December 2018, was my first time visiting the newly renovated National Library of Indonesia. My first impression, of course, it's a big library building with a lot of collections. This building is a 24-storey building consists of collections from books, photos, magazines, newspapers, and many more. Anyone from member to general public is allowed to come here and use the facilities inside. However, for some facilities, such as computer room, only members are allowed. It has cafeteria at level 4, allowing visitors to have a meal there. At the ground level, they provide a room with many lockers inside for you to put your belongings. You will receive a transparent bag, allowing you to bring some simple stuffs that you need during your visitation, such as your laptop. Each locker has its own key, so rest assured your items are pretty much safe there. Children Area If you want to bring your children here, you can go to level 7. T