Skip to content

  • Home
    • Hello world!
    • Testing Post
  • Journal
    • Ethical Hacking and Penetration Testing
      • Introduction to Ethical Hacking
      • Fake Verifying SSL Certificate by Burp Suite
      • Social-Engineer Toolkit
      • Damn Vulnerable Web Application
      • Maltego
      • SQL Injection Tutorial: Learn with Example
      • Finding Real IP Address Behind Cloud Flare
      • WordPress Security Scanner
      • Reverse IP Lookup & Ports Scan
      • Vulnerability Scanner Zoom
      • Google Dorks
      • Cracking Password of Website Using Response Header
      • Password Extraction from Website Content
    • Intelligent System
      • Intelligent System Week 1 Journal
      • Intelligent System Week 2 Journal
      • Intelligent System Week 3 Journal
      • Intelligent System Week 4 Journal
      • Intelligent System Week 5 Journal
    • Network Forensics
      • Introduction to network forensics
      • Evidence Acquisition
      • Malware
      • Dissecting Evidence
      • Source of Evidence
      • Event log correlation and analysis
      • Event Logs
      • NIDS, NIPS, HIDS
      • Switchers, Routers, Firewalls
      • Statistical Flow Analysis
      • Wireless data
      • Malware analysis
  • Projects
    • Multimedia and HCI
      • Construct 2 Game Proposal
      • Game Contribution
      • Game Manual
    • Database System
      • Proposal Database Final Project
      • Final Project Database System
    • Intelligent System
  • About me
Projects of Computer Science Major

Projects of Computer Science Major

Just another Binusian blog site