{"id":3984,"date":"2020-09-15T15:29:55","date_gmt":"2020-09-15T15:29:55","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=3984"},"modified":"2020-09-24T15:35:18","modified_gmt":"2020-09-24T15:35:18","slug":"apakah-malicious-software-berbahaya","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/berita\/apakah-malicious-software-berbahaya\/","title":{"rendered":"Apakah Malicious Software Berbahaya?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3985\" data-permalink=\"https:\/\/www.hostnic.id\/blog\/berita\/apakah-malicious-software-berbahaya\/attachment\/malware\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&amp;ssl=1?v=1600961610\" data-orig-size=\"640,489\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"malware\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&amp;ssl=1?v=1600961610\" class=\"size-full wp-image-3985 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?resize=640%2C489&#038;ssl=1\" alt=\"\" width=\"640\" height=\"489\" srcset=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?w=640&amp;ssl=1 640w, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?resize=300%2C229&amp;ssl=1 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>Sebagian orang beranggapan bahwa anti virus, digunakan untuk memproteksi komputer dari serangan virus. Sangat benar, tapi selain virus terdapat juga hal lain (perangkat lunak) yang sama bahayanya dengan virus, bahkan lebih berbahaya dari virus. Dalam dunia keamanan komputer, virus dikategorikan sebagai malware (malicious software) yang artinya perangkat lunak yang berbahaya. Selain virus, perangkat lunak yang juga termasuk dalam kategori malware adalah backdoor, spyware, dan lain-lain.<\/p>\n<p><strong>Backdoor<\/strong><br \/>\nBackdoor jika diartikan ke dalam bahasa Indonesia, maka artinya adalah pintu belakang. Biasanya backdoor hadir bersamaan dengan aplikasi atau sistem yang kita instalkan. Tujuannya adalah agar si pelaku dapat mengakses ke dalam komputer dan menjalankan perintah pada komputer sesuai dengan yang dia inginkan. Tidak jarang bahkan backdoor ditemui pada produk-produk yang dijual oleh perusahaan-perusahaan besar, seperti yang pernah dilaporkan ditemukan pada Windows OS, Sony\/BMG CD, dan pada Samsung Android.<\/p>\n<p><strong>Spyware (spy software)<\/strong><br \/>\nSpyware adalah jenis malware yang biasanya digunakan oleh pelaku kejahatan untuk memantau nama pengguna dan kata sandi, memantau informasi transaksi online, dan memantau aktivitas korban untuk dikirimkan kepada pelaku. Spyware pada umumnya melakukan hal demikian secara otomatis, tanpa sepengetahuan pengguna, namun tak jarang juga ada spyware yang dapat dikontrol oleh pelaku.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sebagian orang beranggapan bahwa anti virus, digunakan untuk memproteksi komputer dari serangan virus. Sangat benar, tapi selain virus terdapat juga hal lain (perangkat lunak) yang sama bahayanya dengan virus, bahkan lebih berbahaya dari virus. Dalam dunia keamanan komputer, virus dikategorikan sebagai malware (malicious software) yang artinya perangkat lunak yang berbahaya. Selain virus, perangkat lunak yang [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3985,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[85,4,8,82],"tags":[],"class_list":["post-3984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-berita","category-teknologi","category-tips","category-website"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apakah Malicious Software Berbahaya? - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apakah Malicious Software Berbahaya? - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"Sebagian orang beranggapan bahwa anti virus, digunakan untuk memproteksi komputer dari serangan virus. Sangat benar, tapi selain virus terdapat juga hal lain (perangkat lunak) yang sama bahayanya dengan virus, bahkan lebih berbahaya dari virus. Dalam dunia keamanan komputer, virus dikategorikan sebagai malware (malicious software) yang artinya perangkat lunak yang berbahaya. Selain virus, perangkat lunak yang [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-15T15:29:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-24T15:35:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?v=1600961610\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"489\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Apakah Malicious Software Berbahaya?\",\"datePublished\":\"2020-09-15T15:29:55+00:00\",\"dateModified\":\"2020-09-24T15:35:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/\"},\"wordCount\":194,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malware.png?fit=640%2C489&ssl=1?v=1600961610\",\"articleSection\":[\"Berita\",\"Teknologi\",\"Tips\",\"Website\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/\",\"name\":\"Apakah Malicious Software Berbahaya? - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malware.png?fit=640%2C489&ssl=1?v=1600961610\",\"datePublished\":\"2020-09-15T15:29:55+00:00\",\"dateModified\":\"2020-09-24T15:35:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malware.png?fit=640%2C489&ssl=1?v=1600961610\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malware.png?fit=640%2C489&ssl=1?v=1600961610\",\"width\":640,\"height\":489},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/apakah-malicious-software-berbahaya\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apakah Malicious Software Berbahaya?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apakah Malicious Software Berbahaya? - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/","og_locale":"id_ID","og_type":"article","og_title":"Apakah Malicious Software Berbahaya? - Hostnic.id","og_description":"Sebagian orang beranggapan bahwa anti virus, digunakan untuk memproteksi komputer dari serangan virus. Sangat benar, tapi selain virus terdapat juga hal lain (perangkat lunak) yang sama bahayanya dengan virus, bahkan lebih berbahaya dari virus. Dalam dunia keamanan komputer, virus dikategorikan sebagai malware (malicious software) yang artinya perangkat lunak yang berbahaya. Selain virus, perangkat lunak yang [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/","og_site_name":"Hostnic.id","article_published_time":"2020-09-15T15:29:55+00:00","article_modified_time":"2020-09-24T15:35:18+00:00","og_image":[{"width":640,"height":489,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?v=1600961610","type":"image\/png"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Apakah Malicious Software Berbahaya?","datePublished":"2020-09-15T15:29:55+00:00","dateModified":"2020-09-24T15:35:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/"},"wordCount":194,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1?v=1600961610","articleSection":["Berita","Teknologi","Tips","Website"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/","url":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/","name":"Apakah Malicious Software Berbahaya? - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1?v=1600961610","datePublished":"2020-09-15T15:29:55+00:00","dateModified":"2020-09-24T15:35:18+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1?v=1600961610","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1?v=1600961610","width":640,"height":489},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/apakah-malicious-software-berbahaya\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Apakah Malicious Software Berbahaya?"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1?v=1600961610","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-12g","jetpack-related-posts":[{"id":3979,"url":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/","url_meta":{"origin":3984,"position":0},"title":"Mobile Malware","author":"Nanda Anubis","date":"2020-09-14","format":false,"excerpt":"Mobile Malware atau Mobile Malicious Software merupakan perangkat lunak berbahaya yang menyerang perangkat mobile Anda seperti smartphone maupun tablet dengan tujuan untuk merusak sistem operasi atau aplikasi dan\/atau mencuri data pribadi maupun data perbankan anda. Demi keamanan transaksi perbankan dengan perangkat mobile Anda, pastikan : Melakukan instalasi anti-virus\/anti-malware yang handal\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1%3Fv%3D1600794115&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1%3Fv%3D1600794115&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1%3Fv%3D1600794115&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1%3Fv%3D1600794115&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1%3Fv%3D1600794115&resize=1050%2C600 3x"},"classes":[]},{"id":3840,"url":"https:\/\/www.hostnic.id\/blog\/berita\/infeksi-virus-komputer\/","url_meta":{"origin":3984,"position":1},"title":"Infeksi Virus Komputer","author":"Nanda Anubis","date":"2020-08-18","format":false,"excerpt":"Virus komputer merupakan ancaman yang berbahaya dan merugikan pengguna karena sekali menginfeksi akan sangat membahayakan file data yang ada didalamnya. Kenali jenis - jenis virus yang dapat menginfeksi komputermu. 1. Companion virus Companion virus merupakan virus yang menganggu data pribadi milik korban, virus ini sangat susah untuk terdeteksi antivirus dan\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=525%2C300 1.5x"},"classes":[]},{"id":2186,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/scan-file-website-dengan-virus-scanner-di-cpanel\/","url_meta":{"origin":3984,"position":2},"title":"Scan file website dengan virus scanner di cpanel","author":"Nanda Anubis","date":"2019-05-13","format":false,"excerpt":"Berikut cara cara untuk scan virus maupun shell backdoor website menggunakan virus scanner di cpanel. Login akun cpanel lalu pada bagian advance cari menu \" virus scanner \". Jika sudah di klik maka muncul seperti ini dan pilih untuk lokasi direktory yang akan di scan. Lalu jika sudah klik scan\u2026","rel":"","context":"dalam &quot;Linux&quot;","block_context":{"text":"Linux","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2019\/05\/scan.jpg?fit=1200%2C189&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2019\/05\/scan.jpg?fit=1200%2C189&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2019\/05\/scan.jpg?fit=1200%2C189&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2019\/05\/scan.jpg?fit=1200%2C189&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2019\/05\/scan.jpg?fit=1200%2C189&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6725,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/penyebab-malware-mengenal-ancaman-dan-cara-mengatasinya\/","url_meta":{"origin":3984,"position":3},"title":"Penyebab Malware: Mengenal Ancaman Dan Cara Mengatasinya!","author":"Monic","date":"2023-08-29","format":false,"excerpt":"Hostnic.id -\u00a0Hello, readers! How are you? Welcome to this insightful article that aims to shed light on the causes of malware and how to effectively combat this threat. In today's interconnected world, the presence of malware poses a significant risk to individuals and organizations alike. By understanding the origins and\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"Penyebab Malware: Mengenal Ancaman Dan Cara Mengatasinya!","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/M.png?fit=586%2C291&ssl=1%3Fv%3D1693294734&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/M.png?fit=586%2C291&ssl=1%3Fv%3D1693294734&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/M.png?fit=586%2C291&ssl=1%3Fv%3D1693294734&resize=525%2C300 1.5x"},"classes":[]},{"id":3909,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/ketahui-penyebab-website-diserang-malware\/","url_meta":{"origin":3984,"position":4},"title":"Ketahui Penyebab Website Diserang Malware","author":"Nanda Anubis","date":"2020-08-31","format":false,"excerpt":"Beberapa pesan error yang kerap muncul ada pada daftar di bawah ini: Deceptive site ahead This site has been marked as a phishing site The site ahead contains malware Berbagai macam serangan hack, mulai dari serangan sederhana hingga berbahaya, dapat menyebabkan kesalahan seperti di atas. Parahnya lagi, malware dapat menyebar\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=525%2C300 1.5x"},"classes":[]},{"id":145,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/menkominfo-sebut-12-institusi-di-indonesia-terserang-wannacry\/","url_meta":{"origin":3984,"position":5},"title":"Menkominfo Sebut 12 Institusi di Indonesia Terserang Wannacry","author":"Ari Sigit","date":"2017-05-21","format":false,"excerpt":"Menteri Komunikasi dan Informatika Rudiantara menyebut sebanyak 12 institusi di Indonesia sistem perangkatnya terserang virus ransomware WannaCry, yang sebelumnya menginfeksi setidaknya 200 ribu komputer di seluruh dunia. \"Laporan yang kami terima ada sekitar 12 institusi yang masuk dan terkonfirmasi, namun bisa saja itu lebih,\" kata Rudiantara, usai pidato di acara\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2017\/05\/ransomware-1.png?fit=1200%2C628&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2017\/05\/ransomware-1.png?fit=1200%2C628&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2017\/05\/ransomware-1.png?fit=1200%2C628&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2017\/05\/ransomware-1.png?fit=1200%2C628&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2017\/05\/ransomware-1.png?fit=1200%2C628&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=3984"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3984\/revisions"}],"predecessor-version":[{"id":3986,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3984\/revisions\/3986"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/3985"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=3984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=3984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=3984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}