I can do in 5 minutes what Jokowi’s IT consultant did in 2 weeks

Recently, I like to read articles that relate between Indonesia’s Presidential Candidates and IT infrastructure. I can argue or giving inputs to public because IT is my daily stuff. I would like to continue what I have said previously in my facebook post about what I can do in 5 minutes compare to Jokowi’s IT […]

Reverse Engineering on Dragonvale database

Since 2.5 months ago I have been addicted to play this game in my iPad: Dragonvale. Its a product from Backflip Studios, you can download it from here. In this game we try to raise, and breed various of dragons. You can get some money and gems here. It went in my mind to reverse […]

How I Met You and Your Mother – Behind the scene (How to encrypt your message)

Hahahaha … I believe many people has been deceived by my previous post ‘How I Met You and Your Mother’. I can see it here by reading the server log :)) *read the first part – ‘How I Met You and Your Mother’ here As a lecturer, If I want to give my students tasks I […]

Non/Human Recognition and Authentication Logic (NURUL). Proof of Concept: Breaking reCaptcha

In this post I will put the basic idea of NURUL, I will not write down details of my article here but only a little bit explanations. The idea is so simple but I guess some people already found out how to bypass it caused I got some evidences that there are bots that can […]