Jan 8

Weekly Blog:

Week 1:

Network forensics definition and intent. Basically, Network Forensics focuses on analyzing controlled network traffic. The aims are the detection/prevention of intrusion, collection of information, and collection of legal evidence.

Two types of techniques of inquiry. The first one is OSCAR and TAARA is the second one. OSCAR stands for acquiring records, strategizing, gathering information, evaluating and finally reporting, while TAARA stands for activating, acquiring, analyzing, reporting and acting.

Week 2:

Switches, routers, DHCP servers, DNS servers, authentication servers, and so on are the sources of network data. In both the second and third OSI layers, the switch and router are used. The proof that one can gain from the switches is the devices’ MAC addresses. The IP addresses and port numbers of origins in the case of the router and can be accessed from it as the router

A consolidated log server is a server that records a network’s traffic originating from multiple computers. Then the traffic is sent to the SIEM to be processed.

The DNS server is the center of the Internet since, by referring to its name rather than the complicated IP address, we can access websites with its presence. For humans, it is easier to recall names instead of numbers.

Week 4:

What is analyzing flows? The word “flow” itself refers to a packet series that is sent to the destination from the source. Flow analysis is then carried out to determine the trends in the packet or traffic chain, isolate irregular behavior, analyze protocols of the higher layer, and extract data.

The distinction between multicasting and broadcasting. In the context that packets are transferred to different destinations, the principles of broadcast and multicast are identical. In broadcasting, however, services are only offered to customers. For starters, First Media’s consumers can only get access to its services.

The methods used for the study of movement. The flow analysis applications used are Tshark, Tcpflow, Pcapcat, Tcpxtract, etc.

Week 5:

The aim of proof acquisition. Its aim is to collect data from the network devices in an enterprise without leaving a deep impact on the business itself. A zero footprint inquiry is, however, difficult to accomplish.

Some of the applications for traffic acquisition are Tcpdump, Wireshark, Snort, etc.

Week 7:

The CSMA/CD and CSMA/CA differences. The ethernet medium in CSMA/CD can only be used by one device at a time. If another computer (let’s say computer B) wishes to connect with a different system, the ethernet medium has to wait for it to be unoccupied. The computer that needs to connect using the occupied ethernet medium in CSMA/CA will be told that the medium is actually in operation.

The evil twin. To eavesdrop on wireless contact, the evil twin is included. It falls under the guise of a legal connection point for Wi-Fi, but it is clearly fake.

Week 8:

Week 11:

A network proxy works between us and the Internet as a portal. As it has the potential to provide anonymity, it provides a high degree of privacy. Caching, URI filtering, page filtering, and distributed caching are other notable web proxy functionalities.

There are many kinds of constant, erratic, and off-system evidence. Persistent facts can include all HTTP/https traffic history, configuration files for web proxies, etc. Volatile proof applies to cached information contained in volatile memory, such as RAM, etc. Off-system proof implies proof that comes from centralized logging and documentation.

Feb 28

Week 1

  • Forming a team for the final project

Week 2

  • Find resources for the base of the project
  • Understanding the materials
  • Discuss the materials and patterns with teammates
Dec 4

Member:
1. Winson Wardana – 2201798345
2. Jennifer Ihdata – 2201798774
3. Rafli Trianindya Putra – 2201798585
4. Gadiza Namira Putri Andjani – 2201798452

Introduction :
Gadiza’s grandma own a cookie store. So her grandma sells cookies but has never had a system to organize her order, we plan to create a system for her to sell her cookies in an orderly fashion. So we intend to make sure her grandma makes the right amount for the correct people, as well as finish her orders based on who ordered first.

Problem Statement :
In this project database our group will make a “Grandma’s Cookie Store System”. As of now, grandma takes calls or texts and makes her cookies as she gets the orders. And sometimes she mistaken her order and doesn’t make them based on who order first ,but rather which message she sees first. We hope that with a new system to organize her orders, she will be able to satisfy her customers more as well as make it easier for her to conduct her small business. In addition we might add the money managing system to organized the finance for the store.

Target user:
The target users is to all the user who wants to manage the orders, as it will
make the user admin to access and track and view the orders easily.

ER Diagram :

Jul 8

 

Final Project Report Construct 2

Game Title : The Adventure of Potato Head

Members :

  1. Klementinus Kennyvito Salim – 2201811391
  2. Wely Dharma Putra – 2201808365
  3. Winson Wardana – 2201798345

Screenshots:

How to Play:

This is a platformer game, similar to games such as Mario Bros. In order to play this game, you just need to use the arrow keys: arrow up to jump, arrow left to walk left and arrow right to walk right. The goal is to collect 3 keys each level in order to complete the level, and collect coins to as the score. There are 3 lives, if you hit a spikey or flying alien, you will lose 1 live. Use all 3 lives and game over, or if you fell down it is also game over. Complete until level 4 and you finished the game. Moreover, you can reset the levels by pressing the button on the top right of the main menu screen.

 

Player Controls :

  • Left arrow to walk left
  • Right arrow to walk right
  • Up arrow to jump

Contributions for this project:

My contribution of this project is making level 4 and the ending credits scene, which is shown after you finished, and the level selection menu. I also diagnosed and checked the project if there is any errors or bugs.

Items we created by our own:

  • Potato Head – Made by Wely Dharma Putra

 

Items we took :

Jul 5

In this final project multimedia is about construct 2. Me and my team member create a game called “The Adventure Of Potato Head”. The game is a bout a potato head man, that is lost in a strange planet than full of aliens and he must find a way to escape from the planet and finally reach safety.

This game have several level and each time the potato head finish the stage the aliens and the challenge become harder than before. And he only have 3 live to in the stage and to reach the next stage you must collect all the key to open the next stage. And there is several trap that is unseen so its little bit tricky.

Members:

  1. Klementinus Kennyvito Salim – 2201811391
  2. Wely Dharma Putra – 2201808365
  3. Winson Wardana – 2201798345
Feb 27

Welcome to Binusian blog.
This is the first post of any blog.binusian.org member blog. Edit or delete it, then start blogging!
Happy Blogging 🙂