{"id":4185,"date":"2020-11-24T17:01:03","date_gmt":"2020-11-24T17:01:03","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=4185"},"modified":"2020-11-27T17:03:19","modified_gmt":"2020-11-27T17:03:19","slug":"apa-itu-keyloggers-hacking","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/","title":{"rendered":"Apa itu Keyloggers Hacking ?"},"content":{"rendered":"<p>Keyloggers hacking adalah serangan yang dilakukan dengan cara memantau atau merekam secara diam-diam setiap keystroke yang diketik pada keyboard komputer. Keyloggers (keystroke logger) merupakan salah satu spyware berbahaya. Serangan tersebut dapat digunakan oleh para peretas untuk merekam tombol apa saja yang ditekan oleh user, mengetahui riwayat pencarian, melihat isi chat, secara berkala melakukan screen capture pada layar komputer kalian, dan lain-lain. Serangan ini tentu bisa menjadi ancaman yang serius untuk perusahaan karena peretas dapat mengakses informasi sensitif di perangkat komputer.<\/p>\n<p>Perlu kalian ketahui, keylogger juga digunakan secara legal. Sudah banyak perusahaan yang mengembangkan software dengan fungsi ini untuk memantau aktivitas komputer karyawan. Beberapa orang tua juga memanfaatkan keylogger untuk mengawasi penggunaan internet pada anak-anak mere.<\/p>\n<p>Meskipun memiliki sisi yang berguna, namun bagi peretas teknologi tersebut dimanfaatkan untuk hal buruk. Mereka menggunakannya untuk mencuri informasi pribadi, kredensial login, mengakses data rahasia perusahaan, dan lain-lain. Informasi yang diperoleh dari keyloggers hacking ini kemudian akan mereka jual di dark website atau digunakan untuk melakukan serangan lain yang lebih besar.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keyloggers hacking adalah serangan yang dilakukan dengan cara memantau atau merekam secara diam-diam setiap keystroke yang diketik pada keyboard komputer. Keyloggers (keystroke logger) merupakan salah satu spyware berbahaya. Serangan tersebut dapat digunakan oleh para peretas untuk merekam tombol apa saja yang ditekan oleh user, mengetahui riwayat pencarian, melihat isi chat, secara berkala melakukan screen capture [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[154,8],"tags":[],"class_list":["post-4185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberpanel","category-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apa itu Keyloggers Hacking ? - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apa itu Keyloggers Hacking ? - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"Keyloggers hacking adalah serangan yang dilakukan dengan cara memantau atau merekam secara diam-diam setiap keystroke yang diketik pada keyboard komputer. Keyloggers (keystroke logger) merupakan salah satu spyware berbahaya. Serangan tersebut dapat digunakan oleh para peretas untuk merekam tombol apa saja yang ditekan oleh user, mengetahui riwayat pencarian, melihat isi chat, secara berkala melakukan screen capture [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-24T17:01:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-27T17:03:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?v=1606496584\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Apa itu Keyloggers Hacking ?\",\"datePublished\":\"2020-11-24T17:01:03+00:00\",\"dateModified\":\"2020-11-27T17:03:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/\"},\"wordCount\":170,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584\",\"articleSection\":[\"CyberPanel\",\"Tips\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/\",\"name\":\"Apa itu Keyloggers Hacking ? - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584\",\"datePublished\":\"2020-11-24T17:01:03+00:00\",\"dateModified\":\"2020-11-27T17:03:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584\",\"width\":770,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/tutorial\\\/tips\\\/apa-itu-keyloggers-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apa itu Keyloggers Hacking ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apa itu Keyloggers Hacking ? - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/","og_locale":"id_ID","og_type":"article","og_title":"Apa itu Keyloggers Hacking ? - Hostnic.id","og_description":"Keyloggers hacking adalah serangan yang dilakukan dengan cara memantau atau merekam secara diam-diam setiap keystroke yang diketik pada keyboard komputer. Keyloggers (keystroke logger) merupakan salah satu spyware berbahaya. Serangan tersebut dapat digunakan oleh para peretas untuk merekam tombol apa saja yang ditekan oleh user, mengetahui riwayat pencarian, melihat isi chat, secara berkala melakukan screen capture [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/","og_site_name":"Hostnic.id","article_published_time":"2020-11-24T17:01:03+00:00","article_modified_time":"2020-11-27T17:03:19+00:00","og_image":[{"width":770,"height":422,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?v=1606496584","type":"image\/png"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Apa itu Keyloggers Hacking ?","datePublished":"2020-11-24T17:01:03+00:00","dateModified":"2020-11-27T17:03:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/"},"wordCount":170,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584","articleSection":["CyberPanel","Tips"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/","url":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/","name":"Apa itu Keyloggers Hacking ? - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584","datePublished":"2020-11-24T17:01:03+00:00","dateModified":"2020-11-27T17:03:19+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584","width":770,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/apa-itu-keyloggers-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Apa itu Keyloggers Hacking ?"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/keylogging.png?fit=770%2C422&ssl=1?v=1606496584","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-15v","jetpack-related-posts":[{"id":4194,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/tips-menghindari-keyloggers-hacking\/","url_meta":{"origin":4185,"position":0},"title":"Tips Menghindari Keyloggers Hacking","author":"Nanda Anubis","date":"2020-11-27","format":false,"excerpt":"Tips Menghindari Keyloggers Hacking : Menerapkan autentikasi dua faktor untuk semua akun yang Anda miliki. Autentikasi dua faktor akan memberikan perlindungan ganda pada akun Anda. Ketika Anda mengaktifkan autentikasi dua faktor, sistem akan mengirimkan satu kode untuk masuk ke dalam sistem. Kode tersebut hanya bisa digunakan satu kali sehingga peretas\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/what-is-a-keylogger.jpg?fit=970%2C430&ssl=1%3Fv%3D1606497365&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/what-is-a-keylogger.jpg?fit=970%2C430&ssl=1%3Fv%3D1606497365&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/what-is-a-keylogger.jpg?fit=970%2C430&ssl=1%3Fv%3D1606497365&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/what-is-a-keylogger.jpg?fit=970%2C430&ssl=1%3Fv%3D1606497365&resize=700%2C400 2x"},"classes":[]},{"id":4188,"url":"https:\/\/www.hostnic.id\/blog\/berita\/jenis-jenis-keyloggers-hacking\/","url_meta":{"origin":4185,"position":1},"title":"Jenis &#8211; Jenis Keyloggers Hacking","author":"Nanda Anubis","date":"2020-11-25","format":false,"excerpt":"Terdapat dua jenis keyloggers, yaitu software keyloggers dan hardware keyloggers. Keyloggers hacking dalam bentuk hardware jarang digunakan karena teknik tersebut memerlukan akses fisik ke perangkat korban untuk memanipulasi keyboard. Berbeda dengan keyloggers software yang lebih mudah diinstal pada perangkat korban. Software keyloggers termasuk dalam kelompok produk perangkat lunak yang melakukan\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5735,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/jaga-keamanan-website-anda-dengan-materi-terbaik-dan-terbaru\/","url_meta":{"origin":4185,"position":2},"title":"Jaga Keamanan Website Anda Dengan Materi Terbaik Dan Terbaru!","author":"Monic","date":"2023-07-18","format":false,"excerpt":"Hostnic.id - Keamanan website merupakan hal yang sangat penting untuk dijaga. Dalam era digital yang semakin berkembang ini, ancaman keamanan terhadap website semakin meningkat. Oleh karena itu, penting bagi pemilik website untuk selalu memperbarui dan meningkatkan keamanan website mereka. Dengan menggunakan materi terbaik dan terbaru mengenai keamanan website, pemilik website\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Jaga Keamanan Website Anda","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/KW-13.jpeg?fit=842%2C452&ssl=1%3Fv%3D1689674549&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/KW-13.jpeg?fit=842%2C452&ssl=1%3Fv%3D1689674549&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/KW-13.jpeg?fit=842%2C452&ssl=1%3Fv%3D1689674549&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/KW-13.jpeg?fit=842%2C452&ssl=1%3Fv%3D1689674549&resize=700%2C400 2x"},"classes":[]},{"id":5662,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/sebutkan-dampak-shared-hosting-terkena-hack-temukan-solusinya-di-sini\/","url_meta":{"origin":4185,"position":3},"title":"Sebutkan Dampak Shared Hosting Terkena Hack: Temukan Solusinya Di Sini","author":"Monic","date":"2023-07-13","format":false,"excerpt":"Hostnic.id\u00a0- Terkena hack pada shared hosting dapat memberikan dampak yang sangat merugikan bagi website Anda. Selain mengganggu kinerja website dan menurunkan reputasi bisnis Anda, serangan hacking juga dapat menyebabkan kehilangan data penting dan informasi pribadi pengguna. Jika website Anda digunakan untuk transaksi online, serangan hacking dapat mengakibatkan pencurian data pembayaran\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Shared Hosting Terkena Hack","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/SHOS.jpeg?fit=602%2C299&ssl=1%3Fv%3D1689249303&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/SHOS.jpeg?fit=602%2C299&ssl=1%3Fv%3D1689249303&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/SHOS.jpeg?fit=602%2C299&ssl=1%3Fv%3D1689249303&resize=525%2C300 1.5x"},"classes":[]},{"id":3984,"url":"https:\/\/www.hostnic.id\/blog\/berita\/apakah-malicious-software-berbahaya\/","url_meta":{"origin":4185,"position":4},"title":"Apakah Malicious Software Berbahaya?","author":"Nanda Anubis","date":"2020-09-15","format":false,"excerpt":"Sebagian orang beranggapan bahwa anti virus, digunakan untuk memproteksi komputer dari serangan virus. Sangat benar, tapi selain virus terdapat juga hal lain (perangkat lunak) yang sama bahayanya dengan virus, bahkan lebih berbahaya dari virus. Dalam dunia keamanan komputer, virus dikategorikan sebagai malware (malicious software) yang artinya perangkat lunak yang berbahaya.\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1%3Fv%3D1600961610&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1%3Fv%3D1600961610&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1%3Fv%3D1600961610&resize=525%2C300 1.5x"},"classes":[]},{"id":8634,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/pengertian-firewall-definisi-dan-peran-dalam-keamanan-jaringan\/","url_meta":{"origin":4185,"position":5},"title":"Pengertian Firewall: Definisi dan Peran dalam Keamanan Jaringan","author":"Monic","date":"2023-10-21","format":false,"excerpt":"Hostnic.id -\u00a0Dalam era digital ini, keamanan jaringan komputer menjadi hal yang sangat penting. Dengan semakin kompleksnya ancaman keamanan yang ada, perlu adanya langkah-langkah untuk melindungi sistem dan data dari serangan. Salah satu solusi yang banyak digunakan adalah firewall. Dalam artikel ini, kita akan membahas secara lengkap tentang pengertian firewall, definisi,\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Pengertian Firewall: Definisi dan Peran dalam Keamanan Jaringan","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/3-6.png?fit=851%2C491&ssl=1%3Fv%3D1697891466&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/3-6.png?fit=851%2C491&ssl=1%3Fv%3D1697891466&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/3-6.png?fit=851%2C491&ssl=1%3Fv%3D1697891466&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/3-6.png?fit=851%2C491&ssl=1%3Fv%3D1697891466&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=4185"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4185\/revisions"}],"predecessor-version":[{"id":4187,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4185\/revisions\/4187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/4186"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=4185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=4185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=4185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}