0fajarpurnama0 | Publish0x
0fajarpurnama0

0fajarpurnama0

This blog contains all my articles of various categories which I will separate in the future once a category becomes big. This blog along with other online contents are licensed under creative commons attribution customized sharealike (cc-by-sa) where I Fajar Purnama as the creator customized the ShareAlike (sa) license here where you are also allowed to sell my contents but with a condition that you must mention that the free and open version is available here.


First Experience using Loopring.io DEX

30 Apr 2020 3 minute read 1 comment 0fajarpurnama0

Outline About Loopring is currently an Ethereum token. From https://loopring.org, Loopring allows anyone to build high-throughput, non-custodial, orderbook-based exchanges on Ethereum by leveraging Zero-Knowledge Proofs. Loopring is claimed to be se...

Common Ways to Bypass Internet Censorship

28 Apr 2020 3 minute read 0 comments 0fajarpurnama0

Summary   Proxy, vpn, and TOR bypassing censorship illustration. The technical details are in each articles. Bypass Censorship by DNS Simple Animation of DNS. More info in previous article: Bypass Censorship by DNS. Bypass Censorship by Proxy Anim...

Bypass Censorship By TOR

25 Apr 2020 5 minute read 0 comments 0fajarpurnama0

Description The Onion Router (TOR) is an implementation of onion routing by volunteers whom anyone can join because it is free and open source. TOR is mainly used for anonymity, privacy, and alike. For example, journalists who needs to communicate wi...

Bypass Censorship By VPN

22 Apr 2020 11 minute read 0 comments 0fajarpurnama0

Description Virtual private network (VPN) contains the word “private network” and “virtual”. During the time of the writing of this article, a public network is just another term to the Internet while private networks are outside of the Internet. Exa...

Bypass Censorship By Proxy

18 Apr 2020 2 minute read 0 comments 0fajarpurnama0

Description Instead of going straight ahead to the destination address the packets turns around to the proxy server and processed there before going to the original destination. I use it because the connection in my country here doesn’t allow direct...

Bypass Censorship By DNS

17 Apr 2020 3 minute read 0 comments 0fajarpurnama0

Overview Changing the domain name server (DNS) is one of the easiest way. If the contents restriction is by DNS we simply only need to use another DNS, if not then this method cannot be use. Changing DNS on client is also among the most basic because...

Hyperlink Icon

16 Apr 2020 3 minute read 0 comments 0fajarpurnama0

Description Hyperlink icons are icons applied with hyperlinks. When the icon is clicked, the clicker will open the link designated by the creator of the hyperlink icon. The purpose in my opinion is to beautify and simplify links where there is a sayi...

Creative Commons Licenses

12 Apr 2020 6 minute read 0 comments 0fajarpurnama0

Freedom Level Detail Outline Intellectual property refers intangible creations which is usually resulted from the mind and almost always published. For example, articles, images, audios, videos, and games, even this article that you are reading that...

Denial of Service (DOS) on Wifi using Ostinato Linux

10 Apr 2020 1 minute read 0 comments 0fajarpurnama0

I will create a separate software installation page. Install Ostinato packet generator and all updates: http://software.opensuse.org /download.html?project=home:pstavirs:ostinato&package=ostinato I use Ubuntu 12.04 LTS sudo echo 'deb http://download....

Denial of Service (DOS) on Wifi using CommView Windows

9 Apr 2020 2 minute read 0 comments 0fajarpurnama0

In my opinion DOS is hacking which prevents other users from doing activities on the network. Here I will demonstrate DOS on a wifi using CommView for WIFI on Windows. Downloading CommView Download the program first and install. It is recommended on...