{"id":1563,"date":"2013-09-30T20:35:13","date_gmt":"2013-09-30T13:35:13","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=1563"},"modified":"2013-12-07T18:14:41","modified_gmt":"2013-12-07T11:14:41","slug":"kuterbi-kamko-3","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2013\/09\/30\/kuterbi-kamko-3\/","title":{"rendered":"Kuterbi Kamko 3"},"content":{"rendered":"<p>Dikatakan bahwa: Workers will focus their energies on providing a myriad of information services. Today it is a bit difficult to imagine a society that may become desperately dependent on certain information services. Bagai mana sistem informasi terkait keamanan komputer di UPT Puskom Unila? URL http:\/\/sso.unila.ac.id\/<\/p>\n<p>Bagai mana kondisi infiltrasi virus di Unila? Masih ingat tentang hancurnya blog server yang biasa dipakai oleh para dosen? Masih ingat ceritera tentang pergantian mail server di Unila? Apa saja tipe virus terbanyak yang mencobai sistem keamanan komputer di Unila? (Selanjutnya bahas Keamanan Komputer 8).<\/p>\n<p>Jika info tentang hal ini sulit diperoleh maka uraian pembahasan dilanjutkan pada urusan penanganan penyadapan komunikasi via internet misalnya surel (surat elektronis), chatting, video conference, dll.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dikatakan bahwa: Workers will focus their energies on providing a myriad of information services. Today it is a bit difficult to imagine a society that may become desperately dependent on certain information services. Bagai mana sistem informasi terkait keamanan komputer di UPT Puskom Unila? URL http:\/\/sso.unila.ac.id\/ Bagai mana kondisi infiltrasi virus di Unila? Masih ingat &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2013\/09\/30\/kuterbi-kamko-3\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kuterbi Kamko 3&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-1563","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/1563"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=1563"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/1563\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=1563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=1563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=1563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}