SlideShare a Scribd company logo
Bulletproofing Web 2.0
Seminar Vaksincom 2013
Palcomtech - Palembang
What is Internet
Bulletproofing your account palcomtech
Latest Trend in Internet
• More interactive
• Social Media
• Too many services that need to
identify its users.
• Security expert recommend to
change password regularly  users
tend to use one password.
• Hacker got one password  all in.
Bulletproofing your account palcomtech
Threat to your account

•Bruteforce
•Phishing
•Trojan

CAPTCHA

WebProtection
Adobe Password Breach
How to be Safe
•
•
•
•

Kombinasi password yang unik.
Password berbeda untuk setiap layanan.
Ganti password secara reguler.
Gunakan password manager seperti KeePass Password
Safe www.keepass.info (gratis) untuk manajemen kredensial.
• Hindari login dari komputer publik.
• Proteksi komputer dari antivirus yang terupdate yang
mendeteksi keylogger / trojan.
• Aktifkan Login Verification TFA.
The Dark Side on Internet
• NSA Surveilance
• What is SSL
Bulletproofing your account palcomtech
How long to crack 2048 bit
• Implemented by Google by the end of
2013
• Implemented by Yahoo on Q1 2013
Bulletproofing your account palcomtech
KeePass Password Safe
•
•
•
•
•
•
•
•

Copy and Paste to prevent keylogger
Password creator combination
Only remember 1 password
Encripted database
Multi Platform
Free
Translation to Indonesia
Supported by Vaksin.com
Screen Capture
Why G Data
• Antivirus with most award.
https://www.gdatasoftware.co.uk/about-g-data/awards.html

• Best Position in Virus Bulletin RAP
Quadrant.
• Local support by Vaksin.com.
• Made in Germany.
TAO

More Related Content

PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PDF
Predstavitev Kaspersky Small Office Security za mala podjetja
PDF
Hardening Microservices Security: Building a Layered Defense Strategy
PPTX
Security in microservices architectures
PDF
(ISC)2 Kamprianis - Mobile Security
PPTX
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
PPTX
SnapComms Technical Overview
PDF
Top 10 web application security risks akash mahajan
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Predstavitev Kaspersky Small Office Security za mala podjetja
Hardening Microservices Security: Building a Layered Defense Strategy
Security in microservices architectures
(ISC)2 Kamprianis - Mobile Security
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
SnapComms Technical Overview
Top 10 web application security risks akash mahajan

What's hot (20)

PDF
Mobile Threats and Owasp Top 10 Risks
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PPTX
Securing the cloud
PPTX
ZeroNights2013 testing of password policy
PDF
Microservices Security: dos and don'ts
PDF
Week11
PPTX
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
PDF
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
PPTX
Web application security
PDF
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
PDF
PPTX
Continuous Integration and Quality Development
PPTX
Real time fluent communication using SignalR and Cloud (Windows Azure)
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
PPTX
Abusing Google Apps and Data API: Google is My Command and Control Center
PPTX
Magento Security and Us
PPTX
Uniface Web Application Security
PPTX
CSA Presentation - Software Defined Perimeter
PPTX
How secure is your website?
Mobile Threats and Owasp Top 10 Risks
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Securing the cloud
ZeroNights2013 testing of password policy
Microservices Security: dos and don'ts
Week11
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
Web application security
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
Continuous Integration and Quality Development
Real time fluent communication using SignalR and Cloud (Windows Azure)
Abusing, Exploiting and Pwning with Firefox Add-ons
Abusing Google Apps and Data API: Google is My Command and Control Center
Magento Security and Us
Uniface Web Application Security
CSA Presentation - Software Defined Perimeter
How secure is your website?
Ad

Viewers also liked (9)

PPSX
What Is Public Health In Fulton County
PPT
Глобальная школьная лаборатория
PPT
PDF
Teknologi antivirus vs malware 2015 expanded
PPSX
The shli progress report
PDF
Csrf change dns
PPTX
ChamberMaster Training
PPTX
IV Rousseau 12-13 Awarding presentation1
PPTX
Conisbrough Castle Research
What Is Public Health In Fulton County
Глобальная школьная лаборатория
Teknologi antivirus vs malware 2015 expanded
The shli progress report
Csrf change dns
ChamberMaster Training
IV Rousseau 12-13 Awarding presentation1
Conisbrough Castle Research
Ad

Similar to Bulletproofing your account palcomtech (20)

PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PDF
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
PPTX
Fragments-Plug the vulnerabilities in your App
PDF
Zero Day Malware Detection/Prevention Using Open Source Software
PDF
Solving problems with authentication
PDF
WebAuthn & FIDO2
PPTX
Safenet Authentication Service, SAS
PPT
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
PDF
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
PPTX
How to write secure code
PPTX
WatchGuard-CriminalMindsAdvMalware2015
PPTX
Understanding Session Hijacking: Protecting Your Online Sessions
PPTX
Anonymous Individual Integration for IoT
PDF
Hitachi ID Password Manager
PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
PPTX
Cybersecurity_Office_everyday Presentation.pptx
PPTX
Best Practices for Multi-Factor Authentication on IBM i
PDF
9 Writing Secure Android Applications
PPTX
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
PPTX
The Best Shield Against Ransomware for IBM i
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Fragments-Plug the vulnerabilities in your App
Zero Day Malware Detection/Prevention Using Open Source Software
Solving problems with authentication
WebAuthn & FIDO2
Safenet Authentication Service, SAS
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
How to write secure code
WatchGuard-CriminalMindsAdvMalware2015
Understanding Session Hijacking: Protecting Your Online Sessions
Anonymous Individual Integration for IoT
Hitachi ID Password Manager
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Cybersecurity_Office_everyday Presentation.pptx
Best Practices for Multi-Factor Authentication on IBM i
9 Writing Secure Android Applications
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
The Best Shield Against Ransomware for IBM i

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Architecture types and enterprise applications.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
The various Industrial Revolutions .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Tartificialntelligence_presentation.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles – August ’25 Week III
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Group 1 Presentation -Planning and Decision Making .pptx
1. Introduction to Computer Programming.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Architecture types and enterprise applications.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
observCloud-Native Containerability and monitoring.pptx
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
Getting started with AI Agents and Multi-Agent Systems
DP Operators-handbook-extract for the Mautical Institute
Tartificialntelligence_presentation.pptx
What is a Computer? Input Devices /output devices
A novel scalable deep ensemble learning framework for big data classification...
Univ-Connecticut-ChatGPT-Presentaion.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Hindi spoken digit analysis for native and non-native speakers
Assigned Numbers - 2025 - Bluetooth® Document
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Bulletproofing your account palcomtech

  • 1. Bulletproofing Web 2.0 Seminar Vaksincom 2013 Palcomtech - Palembang
  • 4. Latest Trend in Internet • More interactive • Social Media • Too many services that need to identify its users. • Security expert recommend to change password regularly  users tend to use one password. • Hacker got one password  all in.
  • 6. Threat to your account •Bruteforce •Phishing •Trojan CAPTCHA WebProtection
  • 8. How to be Safe • • • • Kombinasi password yang unik. Password berbeda untuk setiap layanan. Ganti password secara reguler. Gunakan password manager seperti KeePass Password Safe www.keepass.info (gratis) untuk manajemen kredensial. • Hindari login dari komputer publik. • Proteksi komputer dari antivirus yang terupdate yang mendeteksi keylogger / trojan. • Aktifkan Login Verification TFA.
  • 9. The Dark Side on Internet • NSA Surveilance • What is SSL
  • 11. How long to crack 2048 bit • Implemented by Google by the end of 2013 • Implemented by Yahoo on Q1 2013
  • 13. KeePass Password Safe • • • • • • • • Copy and Paste to prevent keylogger Password creator combination Only remember 1 password Encripted database Multi Platform Free Translation to Indonesia Supported by Vaksin.com
  • 15. Why G Data • Antivirus with most award. https://www.gdatasoftware.co.uk/about-g-data/awards.html • Best Position in Virus Bulletin RAP Quadrant. • Local support by Vaksin.com. • Made in Germany.
  • 16. TAO