Hi there, I'm Dikky Ryan I'm a Single Fighter Pentester! 🔭 I’m currently working on a ton of project bug bounty! 🌱 I’m currently learning about Cloud Security,Security Analyst,Digital Forensics specially Cloud
FollowDalam era digital yang semakin berkembang, kecepatan akses dan performa aplikasi telah menjadi komponen kunci dalam menentukan kualitas pengalaman pen...
Cloud berperan sebagai fondasi utama dalam memulai transformasi digital global. E-book dari Alibaba Cloud, The Five Essential Tools for a Cloud-Driv...
This article discusses Anti-DDoS Pro, a security service offered by Alibaba Cloud that helps protect online applications and services from Distributed Denial-of-Service (DDoS) attacks.
This article explains Virtual Private Cloud (VPC), a virtual network environment that allows users to create isolated and customizable network resources within a public cloud infrastructure.
This article explains SMS Gateway, a technology that enables the sending and receiving of Short Message Service (SMS) messages between devices, systems, and applications.
This article provides an in-depth explanation of Jenkins, an open-source automation tool written in Java.
This article provides a step-by-step guide to securing a Linux server using Snort, an open-source Network Intrusion Detection System (NIDS).
This article outlines various security features and best practices to protect data from attacks while using Alibaba Cloud.
This article covers the basics of Remote Code Execution (RCE), a critical security vulnerability that allows attackers to execute arbitrary code on a target system remotely.
This article provides an introduction to penetration testing, a service that simulates full-scale, in-depth attacks to test your system security.
This article introduces the Alibaba Cloud Academy Certification program, covering various areas such as big data, security, and artificial intelligence.
This article explores the concepts of Red Team and Blue Team in cybersecurity, describing their roles and activities in testing and improving an organization's security posture.
This article compares AngularJS and ReactJS, two popular JavaScript frameworks used for web application development.
This article introduces DNS spoofing, which is a malicious technique used by attackers to manipulate the DNS resolution process and redirect users to fraudulent websites.
This short article gives an overview of Alibaba Cloud Security.
This short article explains the steps to create a secure remote workspace on Alibaba Cloud.
This short article gives an overview of Alibaba Cloud Data Security solutions.
This article provides a guide on how to install Wireshark on Alibaba Cloud.
The article highlights Shodan's features and capabilities, including device discovery, search functionality, vulnerability detection, exploit integration, geolocation, and IoT device monitoring.
This article discusses the Linux LFS (Linux From Scratch) project which offers a comprehensive guide and scripts for creating a custom Linux operating system from scratch.
5247810744402664 Commented on What Are the Benefits of Joining a Alibaba Cloud Academy Membership?
5658210956348350 Commented on What is Subnetting and How is it Calculated
Kidd Ip Commented on Red Team vs Blue Team Defined
Rizwan Khan Commented on What Is SQL Injection Vulnerability and How to Avoid It?