{"id":345,"date":"2012-04-24T02:34:44","date_gmt":"2012-04-23T19:34:44","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=345"},"modified":"2012-04-24T02:34:44","modified_gmt":"2012-04-23T19:34:44","slug":"keamanan-komputer-8","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-8\/","title":{"rendered":"Keamanan Komputer 8"},"content":{"rendered":"<div>\u2022For example, a student with an infected applications disk might infect several other laboratory computers with a virus which, in turn, infects the applications software of other students.<\/div>\n<div>\u2022Software companies have unknowingly distributed viruses with their proprietary software products.<\/div>\n<div>In the mini-computer and &#8230;<\/div>\n<div>\n<div>\u2022Main-frame environment, viruses generally are spread from one computer network to another.<\/div>\n<div>\u2022In late 1988 a Cornell graduate student wrote a costly virus (causing over $ 20 million in damages) that infiltrated 6000 computer on six continents via worldwide computer network.<\/div>\n<\/div>\n<div>Since first appearing in &#8230;<\/div>\n<div>\n<div>\u2022The mid-1980s, viruses have erased bank records, damaged hospital records, destroyed the program in thousands of micro-computers, and even infected part of the systems at NORAD (strategic defense) and NASA.<\/div>\n<div>\u2022Disgruntled employee have inserted viruses in disks that were distributed to customers.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u2022For example, a student with an infected applications disk might infect several other laboratory computers with a virus which, in turn, infects the applications software of other students. \u2022Software companies have unknowingly distributed viruses with their proprietary software products. In the mini-computer and &#8230; \u2022Main-frame environment, viruses generally are spread from one computer network to &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-8\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Keamanan Komputer 8&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-345","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/345"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}