Ardi Jonias Fortuna - Welcome to my blog

How to Improve Your Qualys SSL Server Test Score and Get A+ in SSL Labs

How to Improve Your Qualys SSL Server Test Score and Get A+ in SSL Labs

If you are trying to understand how to improve your Qualys SSL Server Test score, you are in the right place. Qualys SSL Server Test, often referred to as SSL Labs, is one of the most widely used public tools for checking how well a website is configured for HTTPS and TLS. A lot of admins care about getting an A or A+ because it is an easy, visible way to validate that their SSL/TLS setup is modern, secure, and free from obvious mistakes.
Build It vs Break It: Why Vibe Coders Keep Shipping Apps That Are Easy to Hack

Build It vs Break It: Why Vibe Coders Keep Shipping Apps That Are Easy to Hack

There is a pattern that keeps playing out. A developer or vibe coder builds an app in a short amount of time, deploys it publicly, gets traction on social media, and then a while later someone replies - the database got leaked. Not because the developer was incompetent. Not because the technology stack was bad. But because one thing kept getting skipped when the focus was entirely on speed: security.
Subdomain Takeover via AWS Elastic Beanstalk

Subdomain Takeover via AWS Elastic Beanstalk

Subdomain takeover is a vulnerability that’s often underestimated, yet carries significant real-world impact. This article covers a real case of subdomain takeover via AWS Elastic Beanstalk - from the core concept and exploitation steps, to detection and prevention. What Is Subdomain Takeover? Subdomain takeover (also known as domain takeover or domain hijacking) is a vulnerability that occurs when a domain or subdomain has an active DNS record, but the third-party service it points to has …
Anti-Gacor: Prevention and Protection Against Online Gambling Slot Injection on Websites

Anti-Gacor: Prevention and Protection Against Online Gambling Slot Injection on Websites

Introduction In recent years, online gambling content injection attacks have surged significantly. Known by some groups as “slot gacor injection” or “judol (judi online/online gambling) attacks”, these have become one of the most disruptive threats for website administrators in Indonesia. Countless government agency websites, universities, and trusted institutions have fallen victim. This article provides a comprehensive overview: what slot gacor is, how these attacks …
Dynamic IP Denylisting with NGINX Plus and fail2ban

Dynamic IP Denylisting with NGINX Plus and fail2ban

This article is based on the original NGINX blog post by Liam Crilly of F5, published September 19, 2017. You may not realize it, but your website is under constant threat. If it’s running WordPress, bots are trying to spam you. If it has a login page, there are brute-force password attacks. You may also consider search engine spiders as unwanted visitors. Defending your site from unwanted, suspicious, and malicious activity is no easy task. Web application firewalls are effective tools …
Collection of Best and Fastest DNS Servers 2026

Collection of Best and Fastest DNS Servers 2026

DNS (Domain Name System) is a system that translates domain names into IP addresses so it becomes one of the foundations of the Internet. Without DNS, we must access websites using IP numbers directly and memorize each IP Addresses we want to visit. By using the right DNS we can maximize our Internet connection to become faster, not visible to the eye but the speed difference is usually measured in milliseconds.
What Is Infatica P2B Network? How to Remove Infatica from Windows

What Is Infatica P2B Network? How to Remove Infatica from Windows

What Is Infatica P2B Network? Infatica P2B Network is a service from the Infatica company that operates using a peer-to-business (P2B) model. This means: your device can be used as a proxy network node, where a small portion of your internet bandwidth is “shared” with the Infatica network or users of the service. It is commonly used for: Web scraping Market research Testing website access from various locations Data collection by companies Is Infatica Dangerous? Infatica is known as part of a …
How to Generate Wildcard SSL Let's Encrypt with Certbot DNS Challenge (Complete Guide)

How to Generate Wildcard SSL Let's Encrypt with Certbot DNS Challenge (Complete Guide)

Introduction A wildcard SSL certificate allows you to secure all subdomains with just one certificate, for example “*.example.com”, “subdomain.example.com”. With the help of Let’s Encrypt, we can obtain a free and automated SSL/TLS Certificate using Certbot through the DNS challenge method. However, keep in mind that the certificate is not valid for domain names using sub-subdomains such as sub.sub.example.com. This method is very suitable if you have setups like: …
Critical RCE in WordPress Plugin (900K+ Installations): Detection & Mitigation

Critical RCE in WordPress Plugin (900K+ Installations): Detection & Mitigation

Summary A WordPress plugin with more than 900,000 active installations is reported to have a Remote Code Execution (RCE) vulnerability with critical severity. This vulnerability allows attackers to execute arbitrary code on the target server under certain conditions. Given the large installation scale, the potential for mass exploitation is very high. Technical Impact A Remote Code Execution (RCE) vulnerability in a WordPress installation is one of the most critical vulnerability categories …
Passwords Alone Are Not Enough!

Passwords Alone Are Not Enough!

Every 39 seconds, one cyber attack occurs somewhere in the world1. Many internet users still rely on passwords as the only protection for their accounts, even though this is very risky. Therefore passwords alone are not enough and Two Factor Authentication (2FA) can save you from account theft. Why Passwords Alone Are Not Enough? Passwords are often easy to guess, reused across many sites, or even leaked through phishing attacks and major data breaches such as those that happened at Facebook, …