Thursday, February 09, 2006

Networking Over Programming

Networking Over Programming


Just bothering my mine, is it really true that networking will be more jobs than programming in the future?...

Hacking VS Hacker

Do Ethical Hacking is allowable ?


My Argument:

For  if there is no harms then hacking could not be consider as crime

• For educational purpose such as internet security,
to practice internet knowledge we must practice in real world , otherwise it will be useless when we enter into the real world. Some of company will catch some student that only wants to practice their knowledge in the university. For example Port scanning. But “Swinburne” University also blocks port scanning and give a warning to student who doing port scan.
• To increase the security in our security knowledge.
Because of hacker who like to try another system, or try to hack or try to learn the security issue. There are a lot of internet security books who is written by the famous hacker. If they are not allowing to doing research to hack that not causing harm, how can they increase the knowledge of internet security.
• If we see using the utilitarianism, we can see if there is no harm it means there will be more benefits. So hacking that is not causing harm can not be consider as crime.
• If there is no hacker such as no cracker in this world. We will be more sorrow. It is the opposite of the meaning of the computer. Computer should be making live happier. If we should buy the expansive software, there will be one person that has the most happiness above our sorrow ness.


Against if there is no harms then hacking still consider as crime
• Even though it is not causing any harms, no program/system is created are not to be break by hacker. They will expect that the software or program that he made was perfect, no one will break it.
• According to hacker it is not harm, but according to the software creator it has already breaks the confidentiality of the system. And the privacy of the software.
for example: can you read others diary that you don’t know even though you will not causing them harm because you don’t have any relationship with them?
• Even though there is no harm , you has entered or probing information without permission. According to social contract theory, it is explicitly immoral action.
• According to Kantianism the motive is wrong. They use other company’s security to improve the skills, or practice their knowledge or just having fun. Why they don’t choose the authorize system?

Program To protect your document

(My Original Program to protect your document)
+ Original Source Code


Background
After I know how dangerous my computer, I try to make software (Using C++ language) that can protect my important document from bad guys. So, in this chapter I will explain about how my program works, and how to use my program.
Basically this program is used to secure your data when transfer across internet or you can use to secure your private document at your computer

Data Saver Attachment Folder Mapping
I have Attach My program, source code and documentation of algorithm in this “DATA SAVER PROGRAM” folder.

ASSIGNMENT 2
“DATA SAVER PROGRAM”
BIN
SENDER.exe à For Sender Program
RECEIVER.exe à For Receiver Program
Test Document.txt à document that you want to secure
SOURCE CODE
SENDER
Sender Source code (C++ language)
DEScpp.dswàCan be open using Visual C++ 6.0
DEScppdlg.cpp (Actual Source Code
RECEIVER
Receiver Source code (C++ language)
DEScpp.dswàCan be open using Visual C++ 6.0
DEScppdlg.cpp (Actual Source Code
Note: This Source code name is still DES because this source code is the extension from my DES program, so I start with the DES program and combine with another algorithm (MD5, RSA).

DOCUMENTATION
DES Algorithm.doc
RSA Algorithm.doc
MD5 Algoritm.doc

Signature Data Type
· -Program Name / info -->Char (8)
· -Length File Name -->Byte
· -File Name --> Char (length of file name)
· -File Size --> Long Integer
· -Nick Name Length -->Byte
· -Nick Name Sender -->Char (Nick Name Length)
· -Time Stamp -->Time
· -Signature (MD5) Encrypted by RSA -->Integer (32)
· -Original Message

After Encrypted with DES it will be structured:
· -DES KEY --> encrypted by RSA -->Integer (8)
· -SIGN MESSAGE ENCRIPTED by DES

Fancy Homepage

Fun Page


This is my First page that i created when i was senior high schools.
It is pretty fancy but it is very lack of standard web.
I just relised it when i studied at university.
It is very difficult to maintance.
you can see it but remember that was my first homepage when i was the first touch my computer.




See my 1st homepage

See my 1st games javascript

Multimedia Anime.....

My Anime



This Anime was created by me as a present for my beloved friend
I use Adobe Premiere, 3DMAX, Pinnacle Studio, other sound technology
to make this Multimedia story.

This Movie was very bad quality because i compressed in order to be view in the web.



See The anime



Note: you need to have real player to display this movie

Web Based Games Interactive

Web Based Games Interactive

This is my First page that i created when i was senior high schools. It is pretty fancy but it is very lack of standard web. I just relised it when i studied at university. It is very difficult to maintance. you can see it but remember that was my first homepage when i was the first touch my computer.

See my 1st homepage
See my 1st games javascript

Wednesday, February 08, 2006

XML Technology

Project 1: Kurniawan Resume

Using Xml Technology and Schema Technology to validate the xml documents
the sample code is available on my web sites


XML TECHNOLOGY

XML Technology is very useful through the web in the future,
This is the sample idea why it is can be very useful.
I have created my resume based on XML
It is very easy and very interesting, I hope i can use xml besides ASP to create my public data such as my resume.
Note: try to View Source to check it is truly XML Documents

See Kurniawan Resume