×

Dikky Ryan Pratama

4820 Reputation

Hi there, I'm Dikky Ryan I'm a Single Fighter Pentester! 🔭 I’m currently working on a ton of project bug bounty! 🌱 I’m currently learning about Cloud Security,Security Analyst,Digital Forensics specially Cloud

Follow
Activities(100) Posts(61) Series(0) Areas of Expertise Following Followers
Areas of Expertise

Following (9)

See All

Followers (14)

See All

How to Protect Your Wordpress Sites with Anti-DDoS Pro

This article discusses Anti-DDoS Pro, a security service offered by Alibaba Cloud that helps protect online applications and services from Distributed Denial-of-Service (DDoS) attacks.

What Is Virtual Private Cloud and How to Implement Virtual Private Cloud in Alibaba Cloud

This article explains Virtual Private Cloud (VPC), a virtual network environment that allows users to create isolated and customizable network resources within a public cloud infrastructure.

What Is SMS Gateway?

This article explains SMS Gateway, a technology that enables the sending and receiving of Short Message Service (SMS) messages between devices, systems, and applications.

What Is Jenkins?

This article provides an in-depth explanation of Jenkins, an open-source automation tool written in Java.

How to Secure Linux Server Using Snort NIDS ?

This article provides a step-by-step guide to securing a Linux server using Snort, an open-source Network Intrusion Detection System (NIDS).

How to Protect Data with Features in Alibaba Cloud?

This article outlines various security features and best practices to protect data from attacks while using Alibaba Cloud.

What is Remote Code Execution (RCE)?

This article covers the basics of Remote Code Execution (RCE), a critical security vulnerability that allows attackers to execute arbitrary code on a target system remotely.

What Is Penetration Testing?

This article provides an introduction to penetration testing, a service that simulates full-scale, in-depth attacks to test your system security.

What Is Alibaba Cloud Academy Certification?

This article introduces the Alibaba Cloud Academy Certification program, covering various areas such as big data, security, and artificial intelligence.

Red Team vs Blue Team Defined

This article explores the concepts of Red Team and Blue Team in cybersecurity, describing their roles and activities in testing and improving an organization's security posture.

AngularJS vs ReactJS

This article compares AngularJS and ReactJS, two popular JavaScript frameworks used for web application development.

What Is DNS Spoofing and How to Avoid It?

This article introduces DNS spoofing, which is a malicious technique used by attackers to manipulate the DNS resolution process and redirect users to fraudulent websites.

What Is Alibaba Cloud Security?

This short article gives an overview of Alibaba Cloud Security.

How to Create a Secure Remote Workspace on Alibaba Cloud

This short article explains the steps to create a secure remote workspace on Alibaba Cloud.

Data Security in Alibaba Cloud

This short article gives an overview of Alibaba Cloud Data Security solutions.

What Is Wireshark and How to Install It on Alibaba Cloud

This article provides a guide on how to install Wireshark on Alibaba Cloud.

What Is Shodan?

The article highlights Shodan's features and capabilities, including device discovery, search functionality, vulnerability detection, exploit integration, geolocation, and IoT device monitoring.

What Is Linux LFS (Linux from Scratch)

This article discusses the Linux LFS (Linux From Scratch) project which offers a comprehensive guide and scripts for creating a custom Linux operating system from scratch.

What is Dork?

The article provides an overview of the concept of "dorks" in the field of cybersecurity.

What Is Burp Suite and How to Install It on Ubuntu Server

The article provides a step-by-step guide to installing Burp Suite Community Edition on an Ubuntu server.

Latest Comments

5658210956348350 Commented on What is Subnetting and How is it Calculated

If you are having trouble calculating the networking range or netmask ,Maximum Subnets ,Hosts per Subnet,Wildcard Mask and more this calculator:https://www.one-calculator.com/online-ip-subnet-calculator.html help you a lot :)

Kidd Ip Commented on Red Team vs Blue Team Defined

Thank you for the sharing, but seems not much Red Team focus on Microservices now

Rizwan Khan Commented on What Is SQL Injection Vulnerability and How to Avoid It?

Thank you for providing such detailed information about SQL injection vulnerabilities and preventive measures. It's evident that you have a deep understanding of the subject matter. Your suggestions for mitigating SQL injection risks through parameterized queries, input validation, the least privilege principle, character escaping, stored procedures, web application firewalls, regular security audits, and updates are all valuable recommendations.By implementing these strategies, web application developers can significantly reduce the risk of SQL injection attacks and enhance the overall security posture of their applications. It's essential to adopt a multi-layered defense approach and adhere to secure coding practices to safeguard against these vulnerabilities effectively.

5419784409254907 Commented on What Is Squid Proxy?

By incorporating the web proxy provided by Utopia P2P into your online routine, you can reap the benefits of a heightened level of online privacy and security. The proxy acts as an intermediary between your device and the websites you visit, effectively shielding your personal information from potential threats such as hackers or data snoopers.

5545683528948057 Commented on What Is DNS Hijacking?

Mantabb mas dikk

No series yet.