These are my dapp wallets publicly for accepting donations and messages.
Keywords: cryptocurrencydonationtransparencywalletweb3
Kawasan indekos dan perumahan, jenis Sertifikat Hak Milik, jalan dapat dilewati 1 mobil + 1 motor, Kecamatan Kuta Selatan, Kabupaten Badung.
Keywords: tanahdijualUnudBaliIndonesia
Kawasan indekos dan perumahan, jenis Sertifikat Hak Milik, jalan dapat dilewati 1 mobil + 1 motor, Kecamatan Kuta Selatan, Kabupaten Badung.
Keywords: tanahdijualUnudBaliIndonesia
Kawasan indekos dan perumahan, jenis Sertifikat Hak Milik, jalan dapat dilewati 1 mobil + 1 motor, Kecamatan Kuta Selatan, Kabupaten Badung.
Keywords: tanahdijualUnudBaliIndonesia
Many Indonesians are freelancers and received their salaries in PayPal. Therefore blocking PayPal, is the same as cutting off their income.
Keywords: IndonesiaKominfocensorshipInternetAuthoritycryptocurrency
This is a cheatsheet for Python programming language that will be constantly updated.
Keywords: programmingpythoncheatsheetcomputerbig data
List of EVM RPC with a button that automatically adds to Metamask written in JavaScript, JSON and Ethereum JS or Web3.
Keywords: dappcryptocurrencyDeFiEVMRPC
With the transparency of cryptocurrency, even you can track donations to Ukraine by simply browsing the web and donate at a tap of a button.
Keywords: cryptocurrencydonationexplorerfreedomtransparencyUkraineRussia
A web3 widget in multiple blockchains to send native assets and message to certain address.
Keywords: dappcryptocurrencyDeFiweb3source
My custom simple widgets JS and Web3 source codes.
Keywords: dappcryptocurrencyDeFiweb3source
List of decentralized application JavaScript and other Web3 source codes including Ethereum, Tron, Stellar, Neo, Near, Hive, Eos, IOST, etc.
Keywords: dappcryptocurrencyDeFiweb3source code
Fans are the ones who brings wealth, fame, and fortune to these stars. Without fans, they are nothing, and yet receives absolutely nothing.
Keywords: cryptocurrencyDeFiTalentsFansJETNFT
An online marketplace between advertiser and publisher based on the open and decentralized blockchain or the open cryptocurrency technology.
Keywords: cryptocurrencydecentralizationblockchainadvertisementWhatIsAdshares
The two default way to get cryptocurrency is to mine and to buy. However, you may chose not to buy for various of reasons. This chapter presents other methods of getting cryptocurrency.
Keywords: cryptocurrency101usersfreemarket
You probably do not know that there are Muslims who refuse to use banking services because some of them believe them to be unlawful practice.
Keywords: cryptocurrencyDeFiIslamShariahMRHBDeFiExplained
Saya menjadi duta dari November 2020 - Februari 2021 dimana tugas saya yaitu menulis konten tentang Torum seminggu sekali dibayar dengan XTM.
Keywords: mata uang kriptoTorumpendapatanXTMduta
I was an ambassador from November 2020 - February 2021 where my job was to write contents about Torum once a week and finally cashed out XTM.
Keywords: cryptocurrencyTorumearningXTMambassador
I stopped daily blogging because it is stressing me out and instead I begun early as a DeFi developer but I still keep short daily routines.
Keywords: cryptocurrencybloggingincomedailyroutineself employed
Sure there are many steps but can be generalized into 3 steps install defi wallet, modify smart contract, compile and deploy smart contract.
Keywords: cryptocurrencyDeFitokensmart contractguide
Wrote a quick guide and gave a seminar in story and philosophy of cryptocurrency and started a new youtube channel of my technical analysis.
Keywords: cryptocurrencybloggingincomeguidetradinginvestingnew
Cross pairs are really just cross pairing of the major and commodity pairs except for the United States (US) Dollar and these are only my TA.
Keywords: forexfreetradingsignaltechnical analysiscross pairmonthly
Trading signals for EURUSD, GBPUSD, USDJPY, USDCHF, USDCAD, AUDUSD, NZDUSD, all monthly charts which can be relevant until end of 2021.
Keywords: forexfreetradingsignaltechnical analysismajor paircommodity pairmonthly
Before going live on my premium trading signal subscription at, I would like to practice drawing trading signals and give them for free.
Keywords: forexfreetradingsignaltechnical analysis
Before going live on my premium trading signal subscription at, I would like to practice drawing trading signals and give them for free.
Keywords: forexfreetradingsignaltechnical analysis
Intermediate technical analysis in this book includes classic chart patterns, Fibonacci Golden Ratios, harmonic patterns, and Elliott Waves.
Keywords: cryptocurrencyfinancial technical analysisintermediatetradinginvestingFTA
Dasar-dasar analisa teknikal adalah Teori DOW, swing, trend, support & resistance, supply & demand, pola candle stick, dan indikator.
Keywords: mata uang kriptoanalisis teknis keuangandasarperdaganganinvestasiFTA
The basics of technical analysis are DOW Theory, swing, trend, support & resistance, supply & demand, candle stick patterns, and indicators.
Keywords: cryptocurrencyfinancial technical analysisbasictradinginvestingFTA
The entire month, I only blogged about basic financial technical analysis which is mainly a note to not forget about my TA intensive course.
Keywords: cryptocurrencybloggingincometechnical analysistradinginvestingfinance
Previously, we only examine up to 3 waves. This chapter will discuss up to 8 waves of the Elliott Wave. Be cautious when the 5th wave forms.
Keywords: cryptocurrencyfinancial technical analysisFibonacciElliott WavetradinginvestingFTA
Most harmonic patterns have five phases forming XABCD pattern and we use Fibonacci Golden Ratios measurement to classify harmonic patterns.
Keywords: cryptocurrencyfinancial technical analysisFibonacciharmonic patterntradinginvestingFTA
Fibonacci retracement and extension are mostly used and memorize these numbers 23.6%, 38.2%, 61.8%, 78.6%, 100%, 161.8%, 261.8%, and 423.6%.
Keywords: cryptocurrencyfinancial technical analysisFibonaccigolden ratiotradinginvestingFTA
Classic chart patterns are the most popular to show drawn using lower and upper trend line to show whether a trend will continue or reverse.
Keywords: cryptocurrencyfinancial technical analysisclassic chart patterntradinginvestingFTA
Indikator teknis adalah perhitungan matematis dari data perdagangan untuk membantu membuat keputusan perdagangan yang lebih baik.
Keywords: mata uang kriptoanalisis teknis keuanganindikatorperdaganganinvestasiFTA
Semua lilin ditemukan dalam grafik mata uang kripto yang berarti pola lilin dapat digunakan dalam perdagangan dan investasi ini.
Keywords: mata uang kriptoanalisis teknis keuanganpola candle stickperdaganganinvestasiFTA
Sebelum pola grafik, bangunlah fondasi yang kuat pada dasar-dasar menggambar swing, tren, support & resistance, dan supply & demand.
Keywords: mata uang kriptoanalisis teknis keuanganmenggambarperdaganganinvestasiFTAswingtrendsupportresistancesupplydemand
Disini saya akan menulis Teori DOW berdasarkan pengalaman kripto dan kursus analisis teknis dimana saya membayar menggunakan keuntungan saya.
Keywords: mata uang kriptoanalisis teknis keuanganTeori DOWperdaganganinvestasiFTA
Technical indicators are mathematical calculations of historical trading data which helps traders in making better trading decision.
Keywords: cryptocurrencyfinancial technical analysisindicatortradinginvestingFTA
All the candles here are found in cryptocurrency charts which means that even candle patterns can be used in crypto trading and investing.
Keywords: cryptocurrencyfinancial technical analysiscandle stick patterntradinginvestingFTA
Before the chart patterns, build a solid foundation on the basics of drawing swings, trends, supports & resistances, and supplies & demands.
Keywords: cryptocurrencyfinancial technical analysisdrawingtradinginvestingFTAswingtrendsupportresistancesupplydemand
Here I will write the DOW Theory based on my crypto experience and financial technical analysis course where I paid using my crypto profits.
Keywords: cryptocurrencyfinancial technical analysisDOW TheorytradinginvestingFTA
All my peers in college, I can count using my fingers who actually know about crypto. How will the price be if crypto becomes main stream?
Keywords: cryptocurrencyincomeself employedunemployedbloggingBear MarketNewcomers
Zilliqa the first smart contract platform to implement Sharding protocol in 2017 which is a method for processing transactions in parallel.
Keywords: cryptocurrencyDeFiDappsZilliqauserdecentralized finance
Terra Luna will strive to become the decentralized finance of tokenize real world assets but how user friendly is its DeFi ecosystem today?
Keywords: cryptocurrencyDeFiDappsTerraLunauserdecentralized finance
Many users already know that Solana can run fifty thousands smart contracts per second but how user friendly is Solana DeFi ecosystem today?
Keywords: cryptocurrencyDeFiDAPPSolanauserdecentralized finance
Coinbase wallet supports Polygon and crypto.com supports its deposit and withdrawal, many for portfolio generator, and many trading tools.
Keywords: cryptocurrencyDeFiPolygonMaticuserdecentralized finance
Trust wallet supports BSC and Binance supports its direct deposit and withdrawal, many for portfolio generator, and DEX Guru trading tools.
Keywords: cryptocurrencyDeFiBinance Smart ChainBSCuserdecentralized finance
Trust wallet supports AVAX C-Chain, Binance supports direct deposit and withdrawal, Markr for portfolio, and DEX Guru provides trading tools.
Keywords: cryptocurrencyDeFiAvalancheC-Chainuser
Pertama kali saya bilang harga Bitcoin kepada generasi lebih tua, tanggapan mereka harganya sangat mahal dan mereka tidak punya Rp 700 juta.
Keywords: mata uang kriptopecahaninvestasiperdagangankeuangan
The first time I showed Bitcoin price to older generations their immediate respond was that it is very expensive and they do not have $50000.
Keywords: cryptocurrencyfractioninvestingtradingfinance
Bitcoin dan Ethereum tersedia di setiap bursa sementara permata tersembunyi seperti Kucoin Share KCS hanya tersedia di bursa Kucoin.
Keywords: mata uang kriptoKucoinbursa internasionalsetortarikIndonesia
Bitcoin and Ethereum are probably available in every exchange while a hidden gem like Kucoin Share KCS is only available in Kucoin exchange.
Keywords: cryptocurrencyKucoininternational exchangedepositwithdrawal
Ini adalah panduan singkat untuk Tokocrypto bursa mata uang kripto lokal di Indonesia, merupakan salah satu kebutuhan untuk memulai kripto.
Keywords: mata uang kriptoTokocryptopertukaran lokalbankuang tunai
This is a quick guide to Tokocrypto a local cryptocurrency exchange in Indonesia which can be one of the necessities to begin in crypto.
Keywords: cryptocurrencyTokocryptolocal exchangebankcash
Panduan singkat untuk Trust Wallet dompet mata uang kripto pribadi non-kustodian, merupakan salah satu kebutuhan untuk memulai dalam kripto.
Keywords: mata uang kriptodompet pribadiTrust Walletmengirimmenerima
This is a quick guide to Trust Wallet a personal and non-custodial cryptocurrency wallet which is one of the necessities to begin in crypto.
Keywords: cryptocurrencypersonal walletTrust Walletsendingreceiving
Merupakan panduan singkat untuk coingecko mobile, salah satu sumber informasi mata uang kripto yang dibutuhkan untuk memulai dalam kripto.
Keywords: mata uang kriptosumber informasicoingeckofundamentalsentiment
This is a quick guide to coingecko mobile, one of the sources of cryptocurrency information, one of the necessities to begin in crypto.
Keywords: cryptocurrencyinformation sourcecoingeckofundamentalsentiment
Hal-hal penting untuk mulai menggunakan mata uang kripto adalah sumber informasi, dompet pribadi, bursa lokal, dan internasional.
Keywords: mata uang kriptosumber informasidompet pribadibursa lokalbursa internasional
The quick essentials to start using cryptocurrency are information sources, personal wallets, local exchanges, and international exchanges.
Keywords: cryptocurrencyinformation sourcepersonal walletlocal exchangeinternational exchange
The various types of investments are certificate of deposits, mutual funds, government bonds, stocks, commodities, and cryptocurrencies.
Keywords: investmentcryptocurrencycommoditystockmutual fundgovernment bondcertificate of depositgold
Berbagai jenis investasi meliputi deposito, reksa dana, indeks, obligasi pemerintah, saham, valuta asing, logam mulia, dan mata uang kripto.
Keywords: Indonesiainvestasimata uang kriptokomoditassahamreksa danaobligasi pemerintahdepositoemasindeks gabunganvaluta asing
April was the middle of the bull market and I decided to stop blogging and chase the profits through gem hunting.
Keywords: cryptocurrencyincomeself employedunemployedbloggingbull marketgem hunting
In Binance Smart Chain, Harvest Finance saves around a hundred dollar assuming auto compounding everyday, then how much saved on Ethereum?
Keywords: cryptocurrencyDeFiyield farmingHarvest FinanceBinanceFARMerBinance Smart Chaindecentralized finance
Flano Swap can potentially be the first and leading AMM DEX with Yield Farming, ADA Launchpad, and NFT Market Place on Cardano blockchain.
Keywords: cryptocurrencyFlano SwapCardanoDeFiNFTAMMDEXYield FarmingLaunchpadADA
While in Ethereum there are Zerion and Dextools, in Binance Smart Chain there are Ape Board Finance, Yield Watch, Poo Coin, and JDI Yield.
Keywords: cryptocurrencyDeFiyield farmingportfolioBinance Smart Chain
On average there is one DEX on each chain (AVAX, MATIC, NEO, TRX, EOS, TOMO, NRG, IOST, QTUM, SOL, ZIL) while BSC have crazy amount of DEXs.
Keywords: cryptocurrencyDeFiyield farmingdecentralized exchangeBinance Smart Chain
While yield farming using cryptocurrency coins are attractive it is susceptible to price devaluation but farming using stable coin does not.
Keywords: cryptocurrencyyield farmingstable coinfiatdefidecentralized financeDollar
This month I have made my determination to charge through the walls despite not reaching my goal which was to win 1000 months worth salary.
Keywords: cryptocurrencyincomeself employedunemployedbloggingdeterminationprofession
Presearch is transparent because it is built on the blockchain with the future vision to be driven by the community and respect our privacy.
Keywords: cryptocurrencyPresearchsearch enginedecentralizationadvertising
Other than Ethereum there are Binance Smart Chain, Tron, Tomo Chain, Polygon, Neo, Zilliqa, Solana, Avalanche, Energi, QTUM, OKEX, Cosmos...
Keywords: cryptocurrencyDeFiDEXAMMyield farmingEthereumBinance Smart ChainTronTomo ChainPolygonMaticNeoZilliqaSolanaAvalancheEnergiQTUMOKEX ChainCosmosSif ChainStellar LumenEthereum ClassicIOSTBitcoin CashSteemHive
The bull market started when I was recruited for the current project, busy that I even missed the news of Elon Musk in Bitcoin and Dogecoin.
Keywords: cryptocurrencyincomeself employedunemployedbloggingbusymissed out
Upland is a decentralized application (dapp) currently on the EOS blockchain and all our assets are recorded on chain proving our ownership.
Keywords: cryptocurrencyUplandmetaverseEOSgaming
Sebelumnya kami tidak bisa mengakses Torum menggunakan mode mobile dan harus pindah ke mode desktop, akhirnya mereka merilis website mobile.
Keywords: mata uang kriptoTorummobilemedia sosialreferralduta besar
Previously, we cannot access Torum using mobile mode and have to switch to desktop mode everytime, they finally released the mobile website.
Keywords: cryptocurrencyTorummobilesocial mediareferralambassador
Good thing I applied for and got a Visa Card during my time in Japan that can be topped up with cryptocurrency to pay for IEEE membership.
Keywords: cryptocurrencyBitcoinVandleVisacardprepaidIEEE
Other than the fees and the APY, it really depends on the future value both assets and harvests. To Farm, not farm, or just buy the harvest.
Keywords: cryptocurrencyDeFiyield farmingHarvest FinanceCropSpotter
I made $89 by crypto blogging which was unexpected because I was slacking off after new year and maybe because cryptocurrency price increase
Keywords: cryptocurrencyincomeself employedunemployedbloggingslackingnew year
Saya tahu empat pendekatan yaitu sebagai pendukung, sebagai pihak ketiga yang objektif, sebagai penjahat ketiga, dan sebagai pelapor.
Keywords: mata uang kriptoTorummedia sosialmenanggapimendukunglainnyareferralduta besar
I know four approaches which are as a supporter up to an evangelist, as an objective 3rd party, as a 3rd party villain, and as an informer.
Keywords: cryptocurrencyTorumsocial mediarespondsupportothersreferralambassador
Dengan mendukung akun mereka yang lain akan meningkatkan kehadiran mereka di platform lain, dan akan menarik lebih banyak pengguna ke Torum.
Keywords: cryptocurrencyTorumlainmedia sosialdukunganreferralduta besar
By supporting their other accounts will increase their presence on other platforms and thus attracting more users to Torum and help it grow.
Keywords: cryptocurrencyTorumothersocial mediasupportreferralambassador
Meskipun fitur klan dan perusahaan di Torum menyatukan komunitas kripto, masalahnya adalah kurangnya tokoh terkenal dan peniruan identitas.
Keywords: mata uang kriptoTorumterkenalpeniruanmedia sosialklanperusahaanreferralduta besar
While clan and company feature in Torum attracts crypto communities together but the problem is lack of famous figures and impersonations.
Keywords: cryptocurrencyTorumfamousimpersonationsocial mediaclancompanyreferralambassador
If the price is above $1 then more people demands more coins. If the price is below $1 then there is too much coins and less people demands.
Keywords: cryptocurrencyAmpleforthELI5AMPLelastic supplydemand
I lost almost $1000 in 2019 but survived in 2020. I learned that I should invest small so that I can grab more opportunity in the future.
Keywords: cryptocurrencyinvestmenttradereportportfolioprofitloss
I made $88 by crypto blogging this month with total $771 this year, most of my urgent personal mission had finished but hope I can continue.
Keywords: cryptocurrencyincomeself employedunemployedblogging
Hanya memberi XTM membosankan, lebih asyik memberikan kartu hadiah artistik dan akhirnya kartu hadiah memiliki beberapa utilitas dengan NFT.
Keywords: mata uang kriptoTorumNFTkartu hadiahmedia sosialnon fungible tokenngetipsenireferralduta besar
Instead gifting the boring x amount of XTM, we give artistic gift cards and finally they have some utilities where NFTs of them are made.
Keywords: cryptocurrencyTorumNFTgift cardssocial medianon fungible tokentippingartreferralambassador
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSON
Did you try Youtube and gave up? Did you try blogging and gave up? If you did give up then your passion or heart is not in content creating.
Keywords: storypassionheartmoneyevaluation
The five steps in my research plan are choosing a field, choosing an expertise, choosing a topic, literature review, and state of the art.
Keywords: research planexpertisetopicliterature reviewstate of the artsciencefield
Lima tuntutan saya adalah penyortiran pos, pengategorian pemberitahuan, peniti utas, preferensi tanda pagar, dan pengingat tanda pagar wajib
Keywords: mata uang kriptoTorumpermintaanfiturmedia sosialreferralduta besar
My five demands are post sorting, notification categorizing, thread pinning, hashtag and sorting preference, and hashtag must use reminder.
Keywords: cryptocurrencyTorumdemandsfeaturessocial mediareferralambassador
Hampir semua spammer mencuri XTM untuk dijual, jadi apresiasi harga turun tetapi jangan khawatir untuk saat ini.
Keywords: mata uang kriptoTorumpersyaratan layananspammedia sosialreferralduta besar
Almost all spammers steals XTM to sell, so the price appreciation drops but do not worry for now as none of these can happen now.
Keywords: cryptocurrencyTorumterms of servicesspamsocial mediareferralambassador
The chronological order to understand $RFND is to learn Bitcoin Cash, Simple Ledger Protocol, the token's past events, finally light paper.
Keywords: cryptocurrencyRFNDBitcoin CashSimple Ledger Protocolrefund
These are not screenshots of their mobile application but screenshots of their mobile friendly website on the browser to enjoy copy trading.
Keywords: cryptocurrencyTradewithBityardexchangecopy tradingmobilecontractderivativefuturetradingreferral
Anda bisa jadi memilih untuk tidak membeli karena berbagai alasan. Bab ini menyajikan metode lain untuk mendapatkan mata uang kripto.
Keywords: mata uang kripto101penggunabebaspasar
The two default way to get cryptocurrency is to mine and to buy. However, you may chose not to buy for various of reasons. This chapter presents other methods of getting cryptocurrency.
Keywords: cryptocurrency101usersfreemarket
ETH users are asked to sent to a claimed to be a smart contract address to convert to ETH 2.0 while most transactions are irreversible which could be a scam.
Keywords: cryptocurrencyEthereumETH2.0smart contractscamphising
Selain dari segi layanan, tim dan kantor pusatnya diketahui yang bisa menjadi sasaran regulator, sehingga tidak bisa seenaknya.
Keywords: mata uang kriptoTorumterms of servicesregulasimedia sosialreferralduta besar
Other than its terms of services, the team and headquarter are known which can be targeted by regulators, thus you cannot expect total freedom.
Keywords: cryptocurrencyTorumterms of servicesregulationsocial mediareferralambassador
Dimana kantor pusat Torum? Berita eksklusif tidak ditulis di situs web dan whitepaper mereka. Siapa tim dan siapa yang harus diikuti?
Keywords: mata uang kriptoTorummarkastimdiikutimedia sosialreferralperusahaanduta besar
Where is Torum's headquarter? Exclusive news not currently written on their website and whitepaper. Who are the teams and who to follow?
Keywords: cryptocurrencyTorumheadquarterteamfollowingsocial mediareferralcompanyambassador
The story is I loss $600 trading AMPL and the lesson learned to always make my own decision and never invest more than I can afford to lose.
Keywords: cryptocurrencyAmpleforthwreckstorylessonlossamplinvestmenttradingfrienddecisionAMPLMeme
Here we will discuss about the physical and virtual safety and security of server room and data center from unwanted threats to last long.
Keywords: computersserversafetysecurityGDLNUNUDassignmentresearch writing
Data Communication course about writing essays on flow control, error detection & control, and selective repeat ARQ.
Keywords: data communicationcomputerflow controlerrorselective repeat arqdetectioncorrectionassignmentresearch writing
Tugas kuliah Komunikasi Data menulis essai mengenai flow control, error detection & control, dan selective repeat ARQ.
Keywords: komunikasi datakomputerflow controlerrorselective repeat arqdetectioncorrectiontugas kuliahpenulisan ilmiah
I made $126 by crypto blogging and I have personal missions to accomplish before I am willing to let go of this job.
Keywords: cryptocurrencyincomeself employedunemployedbloggingmissionpersonalintroduce myself
Metasploit Framework Payload practice, the difference with an ordinary backdoor is that a Trojan horse disguises itself as a legitimate program.
Keywords: Linuxtrojan horsemetasploit frameworkmsfpayloadWindowsbackdoormalwarevirusassignmentresearch writing
Praktik Metasploit Framework Payload, bedanya dengan backdoor biasa adalah trojan horse menyamar sebagai program sah.
Keywords: Linuxtrojan horsemetasploit frameworkmsfpayloadWindowsbackdoormalwarevirustugas kuliahpenulisan ilmiah
Other colleagues chose HTML5 server streaming software, VLC, Adobe Flash, etc., and I got the rare one, Red5.
Keywords: LinuxstreamingserverAdobe Flash Media Live EncoderRed5Internetcomputervideoaudioassignmentresearch writingWindows
Rekan yang lain memilih software streaming server HTML5, VLC, Adobe Flash, dll, dan saya dapat yang langka yaitu Red5.
Keywords: LinuxstreamingserverAdobe Flash Media Live EncoderRed5Internetkomputervideoaudiotugas kuliahpenulisan ilmiahWindows
Sebelumnya, saya menulis tentang hadiah misi dan sekarang tentang referral, tip, klan, dan sistem perusahaan saat ini.
Keywords: mata uang kriptoTorumsosial mediaklanngetipreferralperusahaangamifikasiduta besar
Previously, I wrote about the mission rewards and now is about the current referral, tipping, clan, and company system.
Keywords: cryptocurrencyTorumsocial mediaclantippingreferralcompanygamificationambassador
This is my undergraduate assignment in the 2013 Technology Application in Education course regarding KDE Linux Semantik.
Keywords: mindmapSemantikLinuxKDEassignmentresearch writing
Ini merupakan tugas S1 saya pada mata kuliah Aplikasi Teknologi Dalam Pembelajaran 2013 mengenai Semantik Linux KDE.
Keywords: mindmapsemantikLinuxKDEtugas kuliahpenulisan ilmiah
3G modem signal strength can be increased by parabolic bazooka pan and reduce Internet connection instability.
Keywords: Internetparabolicpanwajanbolicbazookamodem3G networkamplifiersignalpapermawapres
Kuat sinyal modem 3G dapat ditingkatkan dengan wajanbolic bazooka dan mengurangi ketidak stabilan koneksi Internet.
Keywords: Internetwajanbolicbazookamodemjaringan 3Gpenguatsinyalkarya tulismawapres
Dulu saya menggunakan modem tetapi bermasalah dengan stabilitas koneksi Internet. Kuat sinyal modem dapat ditingkatkan dengan wajanbolic.
Keywords: Internetwajanbolicmodempenguatsinyalkarya tulismawapres
I had problems with the modem's Internet connection stability. Modem signal strength can be increased using parabolic pan.
Keywords: Internetparabolicpanwajanbolicmodemsignalamplifierpapermawapres
Platform media sosial kripto Torum menyenangkan melalui gamifikasi. Siapa sih yang tidak menyukai berbagai misi, terutama para gamer?
Keywords: mata uang kriptoTorummedia sosialmisivariasikesenangan
Torum cryto powered social media platform fun through gamification. Who does not love various missions, especially gamers?
Keywords: cryptocurrencyTorumsocial mediamissionvarietyfun
Network Simulator 3 can simulate REDQueue and display animation so it's easier to observe.
Keywords: Network Simulator 3Random Early DetectionDroptailtrafficqueueassignmentresearch writing
Network Simulator 3 dapat mensimulasikan REDQueue dan menampilkan animasi sehingga lebih mudah untuk diamati.
Keywords: Network Simulator 3Random Early DetectionDroptailtrafikantreantugas kuliahpenulisan ilmiah
What is this yield farming craziness? it is just putting your tokens and get a new token with fancy food names.
Keywords: cryptocurrencyDeFiFARMeryield farmingharvest financeutility
The assignment of my Telecommunication System Reliability course regarding Nagios application which can monitor the state computer network.
Keywords: computer networkNagiosmonitoringwebtelecommunication system reliabilityresearch writingassignment
Telecommunication Network Course assignment about simulating playing DOTA 10 players on LAN using OPNET based on 1 player datarate from Wireshark.
Keywords: telecommunication networkLANOPNETsimulationDOTAscientific writingcoursework
Tugas mata kuliah jaringan telekomunikasi tentang simulasi bermain DOTA 10 pemain LAN di OPNET berdasarkan datarate 1 pemain dari Wireshark.
Keywords: jaringan telekomunikasiLANOPNETsimulasiDOTApenulisan ilmiahtugas kuliah
Research writing assignment regarding abstract, introduction, literature review, method, discussion, conclusion, and bibliography.
Keywords: Adobe Flash Media Live Encoderfpsbitratethroughputstreamingassignmentresearch writing
Tugas mata kuliah penulisan penelitian mengenai abstrak, pendahuluan, kajian pustaka, metode penelitian, pembahasan, penutup, dan daftar pustaka.
Keywords: Adobe Flash Media Live Encoderfpsbitratethroughputstreamingtugas mata kuliahpenulisan penelitian
My final project is to create a C program for image delivery on WSN Imote2 ZigBee and save image transmission cost with JPEG2000 using embedded Linux.
Keywords: wireless sensor networkimote2zigbeetransmissionimagejpeg2000openjpegctosmacembedded linuxfinal project
Tugas akhir saya membuat program C pengiriman citra pada JSN Imote2 ZigBee dan penghematan transmisi citra dengan JPEG2000 menggunakan embedded Linux.
Keywords: jaringan sensor nirkabelImote2ZigBeetransmisicitraJPEG2000OpenJPEGCtosmacembedded linuxtugas akhir
Menggunakan MATLAB jauh lebih cepat dari menghitung manual serta dapat membuat grafik dan menggambarkan illustrasi radius BS dengan MS.
Keywords: jaringan nirkabelcakupanmacro cellOkumura HataMatlabtugas kuliahpenulisan ilmiah
Using MATLAB is much faster than calculating manually and able to graph the base station radius with mobile station.
Keywords: wireless networkcoveragemacro cellOkumura HataMatlabassignmentscientific writing
My practical work on Fiber Optic Installation Project in Badung Regency Government regarding computer network configuration on Cisco Devices
Keywords: computer networkscisco packet tracerfiber opticpractical work reportBadung
Tugas dari mata kuliah Kehandalan Sistem Telekomunikasi S1 saya mengenai aplikasi Nagios yang dapat memantau keadaan jaringan komputer.
Keywords: jaringan komputerNagiospemantauanwebkehandalan sistem telekomunikasipenulisan ilmiahtugas kuliah
I made $142 by crypto blogging which is enough for a month but if I don't improve, I have to give up due to society pressure and find a job.
Keywords: cryptocurrencyincomeself employedunemployedblogging
Kerja praktek saya pada Proyek Instalasi Fiber Optik di Kawasan Pusat Pemerintah Kabupaten Badung mengenai konfigurasi jaringan komputer.
Keywords: jaringan komputerCisco Packet Tracerfiber optiklaporan kerja praktekBadung
TinyOS users on the Imote2 platform encounter many limitations. Hence the community developed embedded Linux.
Keywords: Wireless Sensor NetworkImote2Embedded LinuxZigBeeWLANJTAGOpenOCD
Pengguna TinyOS pada platform Imote2 menemukan banyak keterbatasan. Oleh karena itu komunitas pengembangkan embedded Linux.
Keywords: JSNImote2Embedded LinuxZigBeeWLANJTAGOpenOCD
Factory reset is an action of returning a device into its initial state. On Windows is System Restore, and Linux is Time Shift & Systemback.
Keywords: computersfactory resetsmartphonewindowslinux
Walaupun Hari Bumi berasal dari luar teori Pancasila dengan Hari Bumi sejalan. Justru Hari Bumi menduku mendukung hubungan alamiah Pancasila
Keywords: Hari BumiPancasilaIndonesiaHubungan AlamiahPerayaantugas kuliahpenulisan ilmiah
Directly fixing errors and bad block reallocation may further damage the disk so before that it is highly recommended to clone the disk and recover any data possible.
Keywords: computerscloningdata recoveryerrorbad block
Although Earth Day comes from outside, Pancasila is in line with Earth Day. In fact, Earth Day supports the natural relationship in Pancasila.
Keywords: IndonesiaEarth DayPancasilaNatural RelationshipCelebrationassignmentresearch writing
For natives this kind of assignment can be for elementary school students but for us is above high school since English is rarely used here.
Keywords: EnglishassignmentundergraduateIndonesiaPan Belog
Enable Group Policy Editor, run gpedit, go to Computer Configuration, Administrative Templates, Windows Update, Configure Automatic Updates, Disable.
Keywords: WindowsupdateautomaticLinuxAndroid
Compress multiple image using Windows Image Resizer or Image Magick Linux at once.
Keywords: computersmultiple imageWindows Image ResizerImage MagickLinux
In the end, this was shown for those who wanted to know and try blogging and to find out about the contribution of my Community Service Program in 2014 at Gumbrih.
Keywords: BloggerCommunity Service ProgramGumbrih VillageUdayanaBali
Speculative AMM defines price differently. Therefore whales should not be able to pressure the price on DEXG exchange as much as on regular exchanges.
Keywords: DEXTokenDeFinedcryptocurrencydecentralized exchangeSpeculative AMMwhale
Pada akhirnya ini ditunjukkan bagi yang ingin mengetahui dan mencoba blogging dan mengetahui kontribusi KKN saya pada tahun 2013 di Gumbrih.
Keywords: BloggerKKNDesa GumbrihUdayanaBali
Most common people does not know that IP address is set on the network interface and not in the core system of the computer.
Keywords: computer networkip addressversion 4manualsetting
When you are handling large computer networks, you probably need an automated IP scanner application. Here I use Angry IP scanner and NMAP.
Keywords: computer networkip addressversion 4angry ip scannernmap
Actually it's just a man in the middle essay but I'm also interested in practicing it with Arpspoof and Wireshark on Linux.
Keywords: Linuxarpspoofwiresharknmapaddress resolution protocolman in the middleWindowsassignmentresearch writing
Sebenarnya hanya essay man in the middle tetapi saya juga tertarik untuk mempraktikannya dengan Arpspoof dan Wireshark di Linux.
Keywords: Linuxarpspoofwiresharknmapaddress resolution protocolpenyusup ditengahWindowstugas kuliahpenulisan ilmiah
There are connectivity issues in developing countries and is distributed LMS. However, the resource cost keeps on increasing which requires incremental synchronization.
Keywords: elearningonlinersyncsynchronizationlearning management system
My own summary regarding to the lecture about how computer hardware works and who knows it might give you a description.
Keywords: computer organizationinterconnection networkhardwaremicroprocessorFPGAassignment
Find a suitable Nvidia driver version, install bumblebee for optimus laptop, and find suitable CUDA version, wrong version will not work.
Keywords: Kali LinuxNvidiaCUDAblank screenfix
Anda bisa jadi memilih untuk tidak membeli karena berbagai alasan. Bab ini menyajikan metode lain untuk mendapatkan mata uang kripto.
Keywords: mata uang kripto101penggunagratispenghasilan
The two default way to get cryptocurrency is to mine and to buy. However, you may chose not to buy for various of reasons. This chapter presents other methods of getting cryptocurrency.
Keywords: cryptocurrency101usersfreeearning
This assignment is structured for readers in 2011 can find out how big the role and influence of Internet technology is in everyday life.
Keywords: InternetIndonesianetworkshistoryregulatorrolecomputerstechnologycourseworkscientific sciences
Tugas ini disusun agar pembaca pada 2011 dapat mengetahui seberapa besar peran dan pengaruh Teknologi Internet dalam kehidupan sehari-hari.
Keywords: InternetIndonesiajaringansejarahregulatorperankomputerteknologitugas kuliahpenulisan ilmiah
The tasks recorded electronically are electrical insulation and conductor and thermoelectric, others are handwritten and submitted.
Keywords: electrical materialsthermoelectricelectrical insulationelectrical conductorassignments
Tugas yang tercatat secara elektronik adalah isolasi dan pengantar listrik dan termoelektrik dimana yang lain ditulis tangan dan dikumpul.
Keywords: bahan listriktermoelektrikisolasi listrikpengantar listirktugas kuliah
The course assignment in Electric Field Theory is writing essays on Ampere's Law, Biot-Savart Law, and other magnetic field laws.
Keywords: electric field theoryAmpere LawBiot-Savart Lawmagnetic fieldsassignmentresearch writing
Tugas kuliah Teori Medan Listrik menulis essai mengenai Hukum Ampere, Hukum Biot-Savart, dan hukum medan magnetik lainnya.
Keywords: teori medanHukum AmpereHukum Biot-Savartmedan magnetiktugas kuliahpenulisan ilmiah
Saya belajar di Jepang dan sudah waktunya saya kembali ke negara asal saya Indonesia dan prosedurnya berbeda dari biasanya karena pandemi COVID-19.
Keywords: COVID-19penerbangan internasionalIndonesiaPCR/SWABkarantina
I studied in Japan and it was time for me to return to my home country Indonesia and the procedure is different that usual due to COVID-19 pandemic.
Keywords: COVID-19international flightIndonesiaPCR/SWABquarantine
The steps are download Linux, create a bootable drive, start boot menu and bootable drive, try it, and install it either in internal or external drive.
Keywords: LinuxUbuntubootableexternalvirtual machineVirtualBoxRufusinternaldiskdriveWindowsEtchercomputerstechnology
A mini mp3 player is a portable device to store and play electronic music files. Some reasons still exist for people to own mini mp3 player.
Keywords: technologycomputersmini mp3 playerASUSmusic
Few years ago, the prices are over $3000 was not affordable for many people. Today, the price averages $200 where average people can afford.
Keywords: technologycomputerseye trackingTobii 4cWindows
Almost no risk as the calculator only worth a few bucks. Instead, fixed it, know what is inside the calculator and gained some experience.
Keywords: engineeringtechnologyTima KK402 calculatordisassemblingbroken
The pcsxr and pcsx2 emulators are available by default on Debian repository where you only need one command line to install.
Keywords: LinuxDebianPlaystationEmulatorGames
I tried several upgrade paths and found one that succeeded which are moodle version 1.x > 1.9 > 2.2 > 2.7 > 2.9 > 3.0 > latest.
Keywords: MoodleupgradeLinuxUbuntuserver
The difference on the Ubuntu version is the directory location C:xampp\htdocs and GUI control panel and the rest of the process are the same
Keywords: MoodleWindowsXAMPPserverlearning management system
The steps are installing web and database server, php packages, download moodle files and put into web server directory, and open browser.
Keywords: MoodleLinuxUbuntuserverlearning management system
Dengan Bitcoin dan mata uang kripto lainnya, secara regulatori dapat dilarang tetapi secara teknis tidak dapat dihentikan atau disensor, secara teknis tidak dapat disita dimana satu-satunya cara adalah dengan membujuk, menekan, atau menipu pemilik untuk menyerahkan diri.
Keywords: mata uang kripto101kebebasankeuanganpengantarkekayaanblockchainsejarahekonomidesentralisasijelastanpa batastidak dapat disensortidak dapat disitaterbukakonsensusmata uang digitalbitcoinaltcoin
With Bitcoin and other cryptocurrency, regulatorily can be banned but technically cannot be stopped or censored, technically cannot be confiscated where the only way is to persuade, pressure, or social engineer the owners to hand over themselves.
Keywords: cryptocurrency101freedomfinanceintroductionwealthblockchainhistoryeconomydecentralizationtransparentborderlessuncensoribleunconfiscatibleopenconsensusdigital currencybitcoinaltcoin
Here I demonstrate Brave Frontier on Microsoft Store Windows, Bluestacks on Windows, Genymotion on Linux, and Remix OS on personal computer.
Keywords: AndroidEmulatorBluestacksGenymotionRemix OSComputersLinuxWindowsVirtualBoxOperating System
Untuk memasuki ruang mata uang kripto diperlukan media disebut dompet mata uang kripto yang dapat dibawa ke mana saja di dunia.
Keywords: mata uang kripto101dompetkustodiannon penahanansemi penahananmasukpenggunadompet kertasdompet perangkat kerasdompet panasdompet dinginbitcoin atmkartu kreditpeer to peerkeluargatemanlocalbitcoins
To enter the cryptocurrency space, you need a medium that can receive, send, and perform other interactions with those coins. A simple medium is called a cryptocurrency wallet which you can carry to anywhere in the world. The first category division of a wallet is divided into three either custodial, semi-custodial or non-custodial.
Keywords: cryptocurrency101walletcustodialnon-custodialsemi-custodialenteruserspaper wallethardware wallethot walletcold walletbitcoin atmcredit cardpeer to peerfamilyfriendslocalbitcoins
First group 4 bits per block, and then obtain the 3 hamming bit codes from the 4 bits for each blocks and add them to make 7 bits per block.
Keywords: mathbinarychaospiecewisehammingassignmentmarkovrandomengineeringsciencetechnology
For error probability below 0.2 the Skew Tent Map has lower undetected error and for above that, it is better to use Piece Wise Linear Map.
Keywords: mathbinarychaospiecewiseparityassignmentrandomengineeringsciencetechnology
Uses piecewise linear chaotic binary sequence which is more complex than skew tent map but allows various map design for chaotic sequences.
Keywords: mathbinarychaospiecewisemarkovassignmentrandomengineeringsciencetechnology
Using the chaotic sequence generated by skew tent map we can generate the random binary sequence with the probability of '0's and '1's.
Keywords: mathbinarychaosmarkovassignmentrandomengineeringsciencetechnology
We can predict the weather for a month. Beyond that, we will likely miss predict. In computer it can be applied for creating random values.
Keywords: mathengineeringchaosrandomassignmentsciencetechnology
This is a dissertation submitted to Graduate School of Science and Technology, Computer Science and Electrical Engineering in Kumamoto University, Japan, on September 2020 in partial fulfillment of the requirements for the degree of Doctor of Philosophy.
Keywords: computersmouse trackingweb browsercontent interactionlossy compressiondoctoraldissertation
Most importantly, accept things regardless of background and status, always be prejudiced, and accept all differences.
Keywords: hard skillssoft skillsopen mindedpersonalityassignment
Yang paling penting, menerima sesuatu tanpa memandang latar belakang dan status, selalu berprasangka baik, dan menerima segala perbedaan.
Keywords: keterampilan kerasketerampilan lunakketerbukaankepribadiantugas kuliah
Older programmers will feel nostalgic and young programmers will be surprised how much Visual Basic was underdeveloped before.
Keywords: visual basicprogramminghello worldfree space lossold fashionedassignments
Para programer tua akan merasa nostalgia dan para programer muda akan kaget mengenai bagaimana belum berkembangnya Visual Basic dulu.
Keywords: visual basicpemrogramanhello worldfree space losskunotugas kuliah
This is a thesis submitted to Graduate School of Science and Technology, Computer Science and Electrical Engineering in Kumamoto University, Japan, on September 2017 in partial fulfillment of the requirements for the degree of Master of Engineering.
Keywords: technologye-learningportablesynchronizationdistributed systemportablemastersthesis
The assignments that survived are Control System, Xray, Noise Policy, Pulse Power, Binaural Accoustic, and how to return home without honor.
Keywords: technologyscienceengineeringJapanassignment
The assignments in human perceptions were exciting where we experiment in compressing image, analyzing website, making video presentations.
Keywords: engineeringimagehumanperceptionassignment
This summary contains the origin of biosignals as deep as how cells generate electricity and how living body can be illustrated as circuit.
Keywords: engineeringmedicalelectricitybiosignalassignment
This summary contains materials about wireless communication, Maxwell equation, line of sight and nlos, circular polarization, and antennas.
Keywords: telecommunicationline of sightcircular polarizationantennaassignment
In summary out of my mind applied to Valve and Blizzard, applied to many scholarships, and my first stressing employment in manufacturing.
Keywords: collegegraduationstudyingabroademployee
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSON
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSONmonetizationsyndicatecrypto.com50%discount
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSONmonetization
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSON
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSON
Keywords: cryptocurrencyportofolioholdingprofitlossinitialcurrentdollarCoingeckoAPIjQueryHTMLCSSJavaScriptJSON
The Internet is vast and we need Google to navigate for us with its page ranking and crawler technology and this is my Google essay in 2013.
Keywords: Googlesearch enginecrawlerspage rankingInternetassignment
Keywords: cryptocurrencywhaletransaction feealgorithmmathematic
For deflation to be attractive, it must occur due to market movement. Like BOMB, Statera burns 1% of each transaction. Now, the question is, how to make people perform more transaction? Ofcourse, the answer is to deliver value. One of the best way to deliver value is to have a product and what product does Statera provides? A balancer, a great product to twist deflation.
Keywords: MyStateraProjectcryptocurrencyStateradecentralized financedeflationdefiUniswapBalancer
In Engineering we are encouraged not to waste time solving manually for example find periods in signal equations through visualization.
Keywords: engineeringsignalplotperiodassignment
An oscilloscope is an electronic device that can display electrical signals and the wave equation of an electrical signal.
Keywords: electrical measurementoscilloscopewavefrequencyperiodvibrationassignmentresearch writing
Osiloskop merupakan suatu peralatan elektronik yang dapat menampilkan sinyal listrik dan bentuk persamaan gelombang suatu sinyal listrik.
Keywords: pengukuran listrikOsiloskopgelombangfrekuensiperiodegetarantugas kuliahpenulisan ilmiah
An electrician doing a Megger is an electrical insulation test also sometimes called a Megger Test. Megger has now grown into a big company.
Keywords: electrical measurementMeggerMega Ohm Meterelectrical insulationassignmentresearch writing
Seorang teknisi listrik melakukan Megger yang dimaksud adalah pengukuran atau pengujian isolasi listrik juga terkadang disebut Megger Test.
Keywords: pengukuran listrikMeggerMega Ohm Meterisolasi listriktugas kuliahpenulisan ilmiah
AVO meter is a combination of ampere meter, voltmeter, ohmmeter which have various functions, namely measuring current, voltage, resistance.
Keywords: AVO MeterGalvanometerelectrical measurementsassignmentresearch writing
AVO meter adalah gabungan dari ampere meter, voltmeter, ohmmeter yang mempunyai fungsi bervariasi yaitu pengukuran arus, tegangan, hambatan.
Keywords: AVO MeterGalvanometerpengukuran listriktugas kuliahpenulisan ilmiah
TV with live broadcasts either passes through electromagnetic waves that are captured by the antenna while IPTV through the Internet network.
Keywords: technologyiptvtelecommunications networkcomputerassignment
TV dengan siaran langsung baik melewati gelombang elektromagnetik yang ditangkap dengan atenna. Sedangkan IPTV melewati jaringan Internet.
Keywords: teknologiIPTVjaringan telekomunikasikomputertugas kuliah
This report is about designing our own PIC16F84A microcontroller system on an Nexys4 FPGA board using Verilog Hardware Description Language.
Keywords: engineeringcomputersFPGAVHDLassignmenttechnologysciencemath
The traditional microprocessor have five instructions which in order are fetch, decode, execute, memory, and write, pipelining to speed up.
Keywords: technologycomputersparallelprocessingassignmentengineeringsciencemath
Some calls it a wonder material only found in a comic book, all due to its amazing properties, stronger than steel, lighter than feather.
Keywords: sciencematerialgrapheneoxideassignmentengineeringtechnologymath
The old days are material exploration. In the 20th century, atoms were discovered by microscope. Today is the age of designing materials.
Keywords: engineeringmaterialexplorationdesignassignmentsciencetechnologymath
Back then, I was fully into academic and research, and met a friend who did postdoc in many countries which was my inspiration, I changed.
Keywords: academictechnologysustainabledevelopmentgoalassignment
You are going to pick up a treasure box 500kg at bottom of a deep hole. You have a long steel wire 30kg/mm2. Can you pick up the box or not?
Keywords: engineeringstrengthmetalliftingassignmentsciencetechnologymath
When using a drone we simply have to apply a control system so the drone will capture 2 image separately that fulfills the 3D requirements.
Keywords: technologycomputersdroneperception3Dassignment
With the advance in technology we can use electronic devices to communicate with others in long distances but can it detect emotions?
Keywords: technologycomputersinformationperceptionemotionassignment
The four steps of digital forensic are confiscating and isolating storage drive, cloning data, analyzing data, and writing a detail report.
Keywords: technologycomputersdigitalforensicassignment
My Opinion of XSS/CSS, Digital Forensic, and Digital Crime Investigation when I was a Young Student
Keywords: technologycomputersXSSCSSdigital forensicassignment
ChangeNOW is one of the platforms that provides widgets for bloggers like me where all you need to do is to paste the code provided on your widget section.
Keywords: ChangeNOWExplainedcryptocurrencynon-custodialexchangewidget
There are mainly 3 steps of breaching NSA using kill chain analysis which are researching the target, initial intrusion, and exfiltration.
Keywords: technologycomputersEdward SnowdenNSAbreachassignment
The statically assigned variables or local variables resides in the stack area and dynamically assigned variables resides in the heap area.
Keywords: technologycomputersbuffer overflowheapC Programassignment
Buffer overflow overwrites other part of the memory. The simplest case is variable B if put too much data can flood to the next variable A.
Keywords: technologycomputersbuffer overflowC Programassignment
Reverse engineering was originally applied only to hardware, reverse-engineering is now applied to software, databases and even human DNA.
Keywords: technologycomputersreverse engineeringdecompileassignment
Use email anti virus (AV), outbound port 25 blocking & authentication, sender policy framework, domain key identified mail, identification.
Keywords: technologycomputersmalwareemailspamassignment
In computer and information system the quarantine is used to isolate harmful data that could spread and infect other PC for example malware.
Keywords: technologycomputersmalwarequarantineassignment
Which type of intrusion detection system should be placed? The best security choice is use both HIDS and NIDS but the problem is resource.
Keywords: technologycomputersintrusion detection systemHIDSNIDSassignment
The important specifications are coverage, detection capability, processing power, false negative, and false positive, though there are more
Keywords: technologycomputersintrusion detection systemspecificationassignment
Antivirus handles malware inside devices, firewall filters packet based on identity, and intrusion detection system find malware in packets.
Keywords: technologycomputersantivirusfirewallintrusion detection systemassignmentmalware
The counter measures are quarantining infected devices, plugging to an external malware cleaner, scan for infections, and delete infections.
Keywords: technologycomputersmalwarecounter measureassignment
The lecture explained the policies when facing vulnerabilities in the kernel, server program, and server common gateway interface (CGI).
Keywords: technologyinformationsecuritypolicyassignment
The countermeasures of Malicious Ware are mitigation, evasion, and treatment like any other measures to cope against harmful substances.
Keywords: technologycomputersantivirusmalwareassignment
Network consists of clients and servers, there are many bots, and ddos and web defacements and sql injections are popular hacking methods.
Keywords: technologycomputer networkbotpenetration testingassignmenthacking
Sekalipun mata uang kripto berpotensi menjadi revolusi di bidang keuangan, itu tetap hanya sebuah potensi. Ini berarti Anda tidak dapat beralih dari sistem fiat tersentralisasi saat ini ke sistem desentralisasi baru seperti menjentikkan sakelar atau mengubah bit dari 0 ke 1 dan sebaliknya. Ini karena era desentralisasi keuangan belum tiba.
Keywords: mata uang kripto101sistem perbankan saat inikoneksipertukaranfiatdebitkreditkartudigitaldompetIndodaxCoincheckkustodian
This task covers the supply of electricity (generation, transmission, distribution), basic electrical theories, transformer, and generators.
Keywords: Basic Electrical Power Engineeringconversiontransmissiondistributiongeneratortransformerinverterrectifierassignment
Tugas ini mencangkupi pengadaan listrik (pembangkit, transmisi, distribusi), teori dasar seperti hukum ohm trafo, dan generator arus searah.
Keywords: Dasar Teknik Tenaga Listrikkonversitransmisidistribusigeneratortrafoinverterrectifiertugas kuliah
This is my script for English speaking practice during my International English Language Testing System (IELTS) course few decades ago.
Keywords: EnglishIELTSspeakingundergraduateassignmentwriting
Eventhough cryptocurrency can potentially be a revolution in finance, is still only a potential. This means that you cannot switch from the current centralized fiat system to the new decentralized system like flicking a switch or changing a bit from 0 to 1 and vice versa. This is because the age of decentralized finance has not yet come.
Keywords: cryptocurrency101current banking systemconnectionexchangefiatdebitcreditcarddigitalwalletIndodaxCoincheckcustodial
I feel the laptop each time it boots and finally found the problem that it was overheated. I disassembled it and found the fan to be rusted.
Keywords: computerslaptopoverheatfanrustAcertechnology
One of my favorite feature is in wallet staking. Atomic wallet allows you to stake while keeping your private keys.
Keywords: AtomicWalletTutorialcryptocurrencystakingreferralatomic wallet token
The authors developed an application to investigate real-time mouse tracking online. It was implemented on the Moodle learning management system and tested on an online quiz session accessed abroad. Additionally, the application can handle tracking on mobile devices.
Keywords: technologymouse trackingimplementationinvestigationonlinereal time
Keywords: technologymouse trackingregion of interestonlinereal time
Recording all geometrical data is sometimes unnecessary. The preprocessing that is introduced converts the geometrical data from each x and y point to a region-of-interest concentration, in other words only heat map areas that the analyzer is interested in.
Keywords: technologymouse trackingregion of interestonlinereal time
Our method involves in providing a portable hotspot device for correspondent to connect and access our local survey questionnaire website.
Keywords: single board computerhand carry serverraspberry piportablesurvey
This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course's backup files based on rsync algorithm.
Keywords: rsyncrdiffmoodlenetworksynchronization
A copyright transfer is transferring a copyright holding to another party. The main author loses the authority so why would anyone want to do this? On the academia side, authors needs reputation where they will try to have their work published in top journals, proceedings, or reports.
Keywords: copyrighttransfersharerepostpublishers
The cost of electricity and internet remains a liability in households, but what if there is a method to zero electricity running cost?
Keywords: cryptocurrencylitecoinasus tinker boardsingle board computerminingarmcpumaligpufuturebit moonlander 2asicusbwattmetersolar panel
The web application can show the date accessed to a particular section and the duration spent on that section by the user. It can also provide data that shows the reading pattern of a reader which in the future can be used for analysis by other researchers.
Keywords: technologymouse trackingsection based page viewweb analyticmonitoringonline
The data can answer what, when, and where, but cannot answer how a page is viewed. To answer that question it is needed to track as detail as the page section level.
Keywords: technologymouse trackingsection based page viewweb analyticmonitoringonline
The tipping does not come from your pocket, Publish0x sponsors your tipping and you can get a share of that tipping. In other words, both you the reader and the writer gets paid. Technically, you decide how Publish0x monetize the readers and the writers.
Keywords: Publish0x100kPublish0xreadwriteearncontent creatorarticlecryptocurrencytokenreferralmonetization
Tipping tidak datang dari saku Anda tetapi Publish0x mensponsori tip Anda dan Anda bisa mendapatkan bagian dari tip itu. Dengan kata lain, Anda sebagai pembaca dan penulis dibayar. Secara teknis, Anda memutuskan bagaimana Publish0x menghasilkan uang dari pembaca dan penulis.
Keywords: Publish0x100kPublish0xreadwriteearncontent creatorarticlecryptocurrencytokenreferralmonetization
Loopring memungkinkan siapa saja untuk membangun pertukaran berbasiskan throughput, non-penahanan, orderbook di Ethereum dengan memanfaatkan Zero-Knowledge Proofs. Loopring diklaim aman, throughput tinggi, dan biaya rendah.
Keywords: LRCDEXloopring.ioLoopringdecentralized exchangeDEXmetamaskwalletconnecttradingstakingcryptocurrencyEthereumUSDT
Loopring allows anyone to build high-throughput, non-custodial, orderbook-based exchanges on Ethereum by leveraging Zero-Knowledge Proofs. Loopring is claimed to be secure, high throughput, and low cost.
Keywords: LRCDEXloopring.ioLoopringdecentralized exchangeDEXmetamaskwalletconnecttradingstakingcryptocurrencyEthereumUSDT
Porn blocked sure, but Reddit and Imgur? What more? The common ways I found are by DNS, proxy, VPN, and TOR. Leave a comment if you know anymore.
Keywords: censorship resistanceTORThe Onion RouterWindowsLinuxAndroidDNSproxyVPN
Pornografi diblokir, tetapi Reddit dan Imgur juga? Cara umum yang saya temukan adalah DNS, proxy, VPN, dan TOR. Adakah cara lain?
Keywords: anti sensorTORThe Onion RouterWindowsLinuxAndroidDNSproxyVPN
Onion Router (TOR) adalah implementasi open source dari perutean bawang untuk anonimitas dan privasi, saya menggunakannya untuk melewati sensor.
Keywords: TORThe Onion RouterWindowsLinuxAndroidrelayexitbridgenodeprivasianonimanti sensor
The Onion Router (TOR) is an open source implementation of onion routing for anonymity and privacy, but I use them for bypassing censorship.
Keywords: TORThe Onion RouterWindowsLinuxAndroidrelayexitbridgenodeprivacyanonimitycensorship resistance
Jaringan pribadi virtual (VPN) memperluas jaringan pribadi melintasi jaringan publik. Jika jalur keluar terbuka dapat digunakan untuk melewati sensor.
Keywords: vpnvirtual private networkWindowsLinuxAndroidServeropenvpnbittubetunnel bearanti sensor
Virtual private network (VPN) extends a private network across a public network where if outgoing path is open can also be used to bypass censorship.
Keywords: vpnvirtual private networkopenvpnWindowsLinuxAndroidServerbittubeTunnel Bearcensorship resistance
Daripada langsung ke alamat tujuan, paket akan pergi ke server proxy dan diproses di sana sebelum pergi ke tujuan
Keywords: proxysquidWindows 7LinuxAndroidServerKalianti sensor
Instead of going straight ahead to the destination address the packets turn around to the proxy server and processed there before going to the origin.
Keywords: proxysquidWindows 7LinuxAndroidServerKalicensorship resistance
Mengubah DNS pada klien juga termasuk yang paling mendasar karena ada banyak server DNS terbuka di luar sana dibandingkan dengan server proxy dan VPN.
Keywords: DNSdomain name serviceWindows 7LinuxAndroidServerKalianti sensor
Changing DNS on client is also among the most basic because there are many open DNS server out there compared to proxy and VPN server.
Keywords: DNSdomain name serviceWindows 7LinuxAndroidServerKalicensorship resistance
Tujuannya adalah untuk mempercantik dan menyederhanakan hyperlink yang ada berdasarkan pepatah satu gambar bisa berarti seribu kata.
Keywords: media sosialikonhyperlinkHTMLCSS
The purpose in my opinion is to beautify and simplify hyperlinks where there is a saying that a single picture can mean a thousand words.
Keywords: social mediaiconhyperlinkHTMLCSS
Actually it was just an assignment to write an essay but I happened to try Backtrack Linux at that time and just practiced it.
Keywords: Linuxbrute forceHydraWindowsTelnetassignmentresearch writing
Sebenarnya hanya tugas untuk menulis esai tapi kebetulan saat itu saya mulai mencoba Backtrack Linux dan sekalian saja praktik.
Keywords: Linuxbrute forceHydraWindowsTelnettugas kuliahpenulisan ilmiah
Dari bebas adalah domain publik, creative commons tanpa kondisi, kondisi ringan dan berat, lalu hak cipta dan terlarang
Keywords: hak ciptacreative commonsno rights reservedkontentlisensi
From most free are public domain, creative commons of unconditional, light conditional, and heavy conditional, then copyright and restricted
Keywords: copyrightcreative commonsno rights reservedcontentlicense
There was no CommView in Linux where I used it to perform DoS. However, I found a similar software called Ostinato and it can work for Dos.
Keywords: LinuxDoSdenial of servicewifiOstinato
Tidak ada CommView di Linux untuk melakukan DoS. Namun, saya menemukan perangkat lunak serupa yang disebut Ostinato dan dapat Dos.
Keywords: LinuxDoSdenial of servicewifiOstinato
DOS prevents other users from doing activities on the network. Here I will demonstrate DOS on a wifi using CommView for WiFi on Windows.
Keywords: WindowsDOSdenial of servicewifiCommView
DOS mencegah pengguna lain beraktivitas di jaringan. Di sini saya akan mendemonstrasikan DOS pada wifi menggunakan CommView for WiFi di Windows.
Keywords: WindowsDOSdenial of servicewifiCommView
You may find yourselves having frequent urges to see the price. It happened to me, and I felt like wasted a lot of time and energy doing so.
Keywords: investmentdesktopwidgetwatchlistWindowsLinuxAndroid
Anda mungkin sering merasa ingin melihat harga asset investasi. Itu terjadi pada saya, dan saya merasa membuang banyak waktu dan energi untuk itu.
Keywords: investasidesktopwidgetpantauanWindowsLinuxAndroid
Kata sandi yang kuat berisi huruf kecil, huruf kapital, angka, simbol, lebih dari 6 karakter. Yang super berisi simbol bukan di keyboard
Keywords: passwordbrute forcehave I been pawnedaccountsocial engineering
Strong password contains small letters, capital letters, numbers, symbol, more than 6 characters. Super ones contain symbols not on keyboard
Keywords: passwordbrute forcehave I been pawnedaccountsocial engineering
I can define password brute forcing in just one sentence which is trying every single character combination to crack a password.
Keywords: penetration testingbrute forceHydraLinuxBacktrackNMAP
Saya dapat mendefinisikan password bruteforce hanya dalam satu kalimat yaitu mencoba setiap kombinasi karakter untuk memecahkan kata sandi.
Keywords: penetration testingbrute forceHydraLinuxBacktrackNMAP
JENESYS 2.0 merupakan program kedua Japan East Asia Network of Exchange for Students and Youths dimana pesertanya berasal dari 10 negara di ASEAN.
Keywords: 2.0ASEANFukuokagelombang 3JENESYSJepangmahasiswapelajarpemudapertukaran
JENESYS 2.0 is the second program of Japan East Asia Network of Exchange for Students and Youths where the participants are from 10 countries in ASEAN.
Keywords: JENESYS2.03rd batchJapanASEANexchangestudentyouthreportFukuokaundergraduate
There are four main steps in penetration testing which are (1) Information Gathering, (2) Scanning, (3) Exploitation, (4) Maintaining Access
Keywords: penetration testinghackinginformation gatheringscanningexploitationmaintaining accessmetasploitnmaptheharvesteropenvaspingnslookupGooglewhite hatgrey hatblack hat
Ada empat langkah utama dalam pengujian penetrasi (1) Pengumpulan Informasi, (2) Pemindaian, (3) Eksploitasi, (4) Mempertahankan Akses.
Keywords: hackerpentestpengumpulan informasipemindaianeksploitasipemeliharaan aksesmetasploitnmaptheharvesteropenvaspingnslookupGooglewhite hatgrey hatblack hat
This article introduces computer programming for those who would like to dive into the world of programming starting with Pascal and C lang.
Keywords: computerprogrammingInternetCPascal
Objective is simulate Local Area Network (LAN). Simulate Wide Area Network (WAN). Common services of The Internet. Design your simple cloud.
Keywords: computerCOREdefault routeDHCPDNSdynamic routeInternetLANnetworksimulationstatic routeWANweb
Mensimulasikan Local Area Network (LAN). Mensimulasikan Wide Area Network (WAN). Layanan umum Internet. Rancang cloud sederhana Anda.
Keywords: DHCPDNSInternetjaringan komputerLANP2Prouting dinamisrouting statisWANweb
Di sini saya akan menyatakan perspektif kesepakatan saya tentang sekolah berdasarkan keuangan, kebebasan, semangat, kualitas, dan jaringan sosial, dievaluasi dalam skala likert.
Keywords: analisischartdimensiedukasikebebasankeinginankeputusankeuangankualitaspenawaranpilihanradarsekolahsosial
Here I will state my deals perspective of going to school based on finance, freedom, passion, quality, and social network, evaluated in likert scale.
Keywords: analysischartdealsdimensiondoctoralfinancefreedomjunior highschoolkindergartenmastersmetricpassionprimary schoolqualityradarschoolsenior highschoolsocialundergraduatevariablechoices
In 2 days the bitcoin price crashed from around $9000 to $5000. Have you learned your lesson? This is a question directed not to professional traders, supporter, or technologist, but to you who are only here to get rich quick.
Keywords: bankbenefitbitcoinblack swanbuyingchallengechecklistcoronacrashcrisisCryptocurrencyfiatfinancialget rich quickgoldmonetarymoneysystemtrading
Metode ini menggunakan sarana fisik melalui media yang dapat di-boot untuk mendapatkan akses ke baris perintah administratif (cmd.exe di sini) dan mengeksploitasi sethc.exe.
Keywords: Bypass BlocksUSB AccessMicro TrendHackingAdministrative AccessWindows 7sethc.exevulnerability
The method uses physical means through a bootable media to gain access to administrative command line (cmd.exe here) and exploit sethc.exe.
Keywords: Bypass BlocksUSB AccessMicro TrendHackingAdministrative AccessWindows 7sethcvulnerability
Use my code HNRCWSLFLF when registering at https://www.btcbox.co.jp and we both get ¥500. Don't miss the chance especially if you are in Japan.
Keywords: bitcoinbitcoin cashBTCBOXCryptocurrencyethereuminvitation campaignJapanlitecoinreferraltrading platformyen
Keywords: anonymityborderlessdecentralizationprivacycensorshipInternetnetworkfreedomcontentwebsitevideoplatformmediadnsproxyvpntorblockchainIPFSblog
Most of us agreed that referral link should not be post naked where a better way is to give a brief description.
Keywords: referrallinkaffiliateendorsementethicsocial mediaarticlecontent creatorsalesmarketingdesignerwritersellerInternetonlinebest practice
Coinbase is giving away coins for taking their free course.
Keywords: BATcoincoinbasecourseCryptocurrencyDAIearnEOSfreequeuequickStellarwaiting listZcashZRX
The 4 browsers that rewards users in cryptocurrency are Brave Browser, Netbox Browser, Bittube Browser or Extension, and Cryptotab Browser.
Keywords: adblockaffiliateairtimebittubebravebrowsercensorship resistantcoincryptocurrencycryptotabdecentralizationdigital walletdonationmonetizationnetboxrewardStakingtippingtorvpn
Keywords: adblockaffiliateairtimebittubebravebrowseranti sensorkoinkriptocryptotabdesentralisasidompet digitaldonasimonetisasinetboxrewardstakingtiptorvpn
The simulation for this circuit succeeded and can be implemented to build a real star-delta motor. The motor will initially be slow, and then a few seconds the motor will be faster.
Keywords: delta connectionevery circuitmiscellaneousstar connectionstar delta motor
Keywords: faucetmultiplierlotteryroulettecryptocurrencygamblingcasinoonlineinternetadvertisementreferral
Keywords: accountingassetbusinesscash flowexpensefinancialincomeinspirationinvestmentliabilitymiddle classpoorrichwealth
Keywords: accountingassetbusinesscash flowexpensefinancialincomeinspirationinvestmentliabilitymiddle classpoorrichwealth
Simulasi untuk rangkaian ini berhasil dan dapat diimplementasikan untuk membangun motor delta bintang yang sebenarnya. Motor awalnya akan lambat, dan kemudian beberapa detik motor akan lebih cepat.
Keywords: deltaeverycircuitstarmotorkoneksi
Keywords: cryptocurrencyinterestpospowstakingwalletpassive income
Keywords: accountingassetbusinesscash flowexpensefinancialincomeinspirationinvestmentliabilitymiddle classpoorrichwealth
Keywords: airtimebitcoinbittubebravebrowsercoinkomputercryptocurrencycryptotabpendapatanlistrikgratisInternettambangmonetisasiuangnetboxpasifponsel
If they provide you with free electricity and Internet, you can earn passive incomes.
Keywords: airtimebitcoinbittubebravebrowsercoincomputercryptocurrencycryptotabearningelectricityfreeincomeInternetminingmonetizationmoneynetboxpassivesmartphone
Keywords: contentcryptocurrencymonetizationonlineinternetadvertisementdonationreferralminingtippingbittubebravecoinimpjavascriptairtime
Keywords: educationfinancialmarketOnlinesecond handsellingused
Keywords: assetbasicbitcoinbusinesscrisisCryptocurrencydebtentrepreneurshipfinancialinvestmentliabilitymonetarymoneynecessitiespower
Keywords: basiccrisiseconomyfinancialinflationnaturepreparationsurvival
Ruang ruang dalam percobaan ini dikenal sebagai sirkuit otomasi. Ini dirancang untuk menjaga suhu ruangan pada derajat tertentu.
Keywords: thermocouplechamber roomrelayLD Microsimulation
Keywords: Androidblocksbridgebrowserbypasscensorshipdarknetdeepwebexithidden wikiLinuxRelaytortorifytorsockswikileaksWindows
Keywords: bypasscensorshipInternetLinuxnetworkProxyProxy Setting on PCsquidUbuntuwebwebproxy.to
The method uses physical means through a bootable media to gain access to administrative command line (cmd.exe here) and exploit sethc.exe.
Keywords: Bypass BlocksHack Administrative Access Windows 7sethc.exe vulnerabilityBypass BlocksUSB Access Micro Trend
Keywords: opinionfreesexprohibitionmarriageenduringfastingmeditationdistractionporntoysmasturbatordesperation
Keywords: opinionselfhealingrelaxationbasicbreathingfeelingbodystretchingexercisingmeditationcultivationenergy
Keywords: opinonprocrastinationinstallmentdaily livessmalllazinessgreedfearpresentfuturemotivationstressburdenoverwork
Keywords: cryptocurrencyminingelectricityInternetproof of workproof of stakeproof of capacityblockchainconsensustrustlesstransactionbank
Keywords: mastersschooluniversityresearchpublicationjournalconferencetechnicalpaperarticlemanuscriptslide
Keywords: what ifplayrelaxhobbybusinessentrepreneurworkfinishopinionfriendfamilyhappinessinvestdonategracious
Keywords: what ifplayrelaxhobbybusinessentrepreneurworkfinishopinionexercisehealthpowersupernatural
The narrative was to send to a smart contract to fix the issue and ofcourse there is no such thing as almost all transactions are irreversible.
Keywords: scamCobowalletIndodaxcryptocurrencyEOSEthereumtelegram
Keywords: fictionfatedeathafterlifegorefearhorrortortureeternaldamnationpainsuffering
Keywords: doctoralschooluniversityresearchpublicationjournalconferencetechnicalpaperarticlemanuscriptslide
A chamber room in this experiment is known as an automation circuit. It's designed to keep the room temperature at a certain degree.
Keywords: thermocouplechamber roomrelayLD Microsimulation
Keywords: Indonesiainvestasimata uang kriptokomoditassahamreksa danaobligasi pemerintahdepositoemasindeks gabunganvaluta asing
Keywords: servicecoursetutoreducationinvestingtradingcryptocurrency
Keywords: dreamjournalrebirthreborngirlgender benderfictionnovel