Japan Soloventure Series : Itinerary Solo Travel 14 Hari di Jepang โ€‹

โ€œDonโ€™t call it a dream, call it a plan.โ€

Perencanaan sebuah perjalanan adalah kunci untuk memaksimalkan waktu kita di suatu tempat. Pada tulisan ini saya ingin berbagi itinerary perjalanan solo trip saya di Jepang selama 14 hari yang telah saya lakukan beberapa waktu yang lalu yaitu dari tanggal 27 Januari ~ 10 Februari 2019. Itinerary ini juga penting untuk pengajuan visa karena memang merupakan salah satu syarat yang diperlukan. Penampakan dokumen yang harus diisi seperti gambar dibawah ini :

Ini adalah trip ke-2 saya di negara matahari terbit ini, karena itulah saya berani untuk sendiri. Trip pertama saya kesini itu tahun 2017 lalu bersama 4 orang teman saya. Mengapa 14 hari? Continue Reading


Japan Soloventure Series : 14 Hari Menjelajah Jepang dengan JR Pass

” Beware of little expenses, a small leak will sink a great ship ” ~ Benjamin Franklin

Setelah saya menyelesaikan perjalan solo saya di Jepang selama 14 hari beberapa waktu lalu, banyak teman-teman yang menanyakan pada saya bagaimana transportasi di sana? apakah susah? bukannya shinkansen mahal? ajak-ajak dong Yud. dan yang paling banyak, “Olehh-oleeehhh…” ๐Ÿ˜‚๐Ÿ˜‚

Jepang adalah salah satu negara di dunia yang memiliki sistem MRT/Metro paling canggih dan rumit di dunia. Tidak percaya? silahkan lihat peta jalur MRT/Metro di kota Tokyo berikut ini :
tokyometromap

Puluhan jalur kereta dengan kode warnanya masing-masing saling bertemu di station-station tertentu tentunya cukup membingungkan bagi orang yang masih awam ๐Ÿ˜ฎ. Ini baru sistem yang berada di kota Tokyo, masih ada sistem kereta di kota-kota yang lainnya Continue Reading


How to Setup OpenVPN ~ Part 2

For you who haven’t read the part 1 of this post click here.

OK, in the previous post i had explained the server side configuration on how to setup the OpenVPN on CentOS. In this post I’ll try to explain on how to setup the client and test the VPN if it is working or not.
Lets get started then..

1. Make a new user for the vpn client.

useradd [username]

then give it a password. (note. password is always invisible when entered to the terminal)

passwd [username]

a

2. Next, we need to download the ca.crt file from the server. I’ll use WinSCP to download the file.
open your winscp and enter the needed credentials
b

the left window is our local files, and the right window is the server files. Point the right window to /etc/openvpn/easy-rsa/2.0/keys Continue Reading


How to Setup OpenVPN ~ Part 1

So, got a brand new VPS and want to create a VPN server in it? Then you are in a right place. In this post I’ll try to explain how to create a VPN Server with OpenVPN on a VPS with CentOS 6.x 32 bit installed.

1. Remote your vps using putty(windows) or terminal(linux) with the ip-address, username and password provided by your vps seller.
1

2. Install epel and remi , use command below

## Remi Dependency on CentOS 6 and Red Hat (RHEL) 6 ##
rpm -Uvh http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm

## CentOS 6 and Red Hat (RHEL) 6 ##
rpm -Uvh http://rpms.famillecollet.com/enterprise/remi-release-6.rpm

2

3. Check if tun/tap is active by issuing this command

cat /dev/net/tun

If tun is active then you should see this:

cat: /dev/net/tun: File descriptor in bad state

5

4. Make sure you have these packages installed: Continue Reading


Authentication ~ Someone Who You Are

This is the most secure authentication method ever. Why, because its utilize yourself, your body parts as the tool to authenticate yourself. This method was created because people was starting to forget their password, and losing their stuff for the authentication. Currently this method is only implemented in a large and sensitive corporation to prevent something or someone from the outside to access their assets. Some body parts that usually used for this kind of authentication are face, retina, fingerprint, voice, or even DNA.


Attackers will likely having difficulty to bypass this authentication method. If the authentication need to scan the fingerprint of the owner, the attacker must either steal the finger or the fingerprint of the owner. Whereas stealing the finger without Continue Reading


Pages:12345678