{"id":170,"date":"2024-08-10T12:42:12","date_gmt":"2024-08-10T12:42:12","guid":{"rendered":"https:\/\/fahru.id\/?p=170"},"modified":"2024-08-10T13:59:59","modified_gmt":"2024-08-10T13:59:59","slug":"this-is-just-reference","status":"publish","type":"post","link":"https:\/\/fahru.id\/?p=170","title":{"rendered":"this is just reference"},"content":{"rendered":"\n<p>here i thought these links would be useful someday later on, maybe after sometime, i dont know.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-digichina wp-block-embed-digichina\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"5XNVrGL2x8\"><a href=\"https:\/\/digichina.stanford.edu\/work\/translation-cybersecurity-law-of-the-peoples-republic-of-china-effective-june-1-2017\/\">Translation: Cybersecurity Law of the People\u2019s Republic of China (Effective June 1, 2017)<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Translation: Cybersecurity Law of the People\u2019s Republic of China (Effective June 1, 2017)&#8221; &#8212; DigiChina\" src=\"https:\/\/digichina.stanford.edu\/work\/translation-cybersecurity-law-of-the-peoples-republic-of-china-effective-june-1-2017\/embed\/#?secret=5XNVrGL2x8\" data-secret=\"5XNVrGL2x8\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">You might need this when the time is right<\/figcaption><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.dataguidance.com\/legal-research\/guide-data-protection-design-ict-systems\">https:\/\/www.dataguidance.com\/legal-research\/guide-data-protection-design-ict-systems<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>some words related to log analysis: \nhttps:&#47;&#47;medium.com\/@enyel.salas84\/intro-to-log-analysis-958e28673f51\n\nrelated to networking tools: \nhttp:\/\/networktools.nl\/\nhttps:\/\/dnschecker.org\/\nhttps:\/\/intodns.com\/\nhttps:\/\/github.com\/edoardottt\/awesome-changethistoh4CK3r-search-engines\nhttps:\/\/urlscan.io\nhttps:\/\/github.com\/lissy93\/web-check\nhttps:\/\/webcheck.101.my.id\/\n<a href=\"https:\/\/ebpf.io\/\">https:\/\/ebpf.io\/<\/a>\nhttps:\/\/0xffsec.com\/handbook\/information-gathering\/subdomain-enumeration\/#google-dorking\n\nrelated to government services:\nhttps:\/\/www.digitalidsystem.gov.au\/\nhttps:\/\/www.dta.gov.au\/\nhttps:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-security-documentation\n<blockquote class=\"wp-embedded-content\" data-secret=\"0y7vAtWpeW\"><a href=\"https:\/\/www.networkbachelor.com\/activedc\/\">Active-Active Data Center Design<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Active-Active Data Center Design&#8221; &#8212; Network Bachelor\" src=\"https:\/\/www.networkbachelor.com\/activedc\/embed\/#?secret=TAmLftCfOB#?secret=0y7vAtWpeW\" data-secret=\"0y7vAtWpeW\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\nhttps:\/\/www.bssn.go.id\/gov-csirt-indonesia\/\nhttps:\/\/www.bssn.go.id\/panduan-keamanan\/\n\nrelated to virtualization:\nhttps:\/\/www.linkedin.com\/pulse\/embracing-freedom-migrating-from-vmware-openshift-ben-silverman-wzx8c\/\n\nrelated to dns or iana or icann:\nhttps:\/\/www.iana.org\/domains\/root\/db\n\nrelated to GIX:\nhttps:\/\/www.de-cix.net\/\nhttps:\/\/www.peeringdb.com\/ix\/210\nhttps:\/\/www.ixpmanager.org\/\nhttps:\/\/www.ams-ix.net\/ams\nhttps:\/\/bgpwatch.cgtf.net\/#\/dashBoard\n\nhttps:\/\/landscape.cncf.io\/\nhttps:\/\/github.com\/Hack-with-Github\/Awesome-H4king<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>here i thought these links would be useful someday later on, maybe after sometime, i dont know. https:\/\/www.dataguidance.com\/legal-research\/guide-data-protection-design-ict-systems<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-170","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/fahru.id\/index.php?rest_route=\/wp\/v2\/posts\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fahru.id\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fahru.id\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fahru.id\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fahru.id\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=170"}],"version-history":[{"count":8,"href":"https:\/\/fahru.id\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/fahru.id\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/fahru.id\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fahru.id\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fahru.id\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}