I take part focussed in the mobile development of jasaprogrammer one of top IT services in indonesia. Have been handled so many project on there, sometimes must going out of town for meeting with client & vendor, if deal then we work as remotely and report progress periodically. Mostly work and experienced on mobile development (exactly android development). Really happy and enjoying that maybe it's my way to life, life as software engineer, everyday run and debug code.
Mobile Developer:
Enhanced application aesthetics and functionality, ensuring positive end-user experiences by implementing modern and versatile material design.
Experienced framework application development.
Has a good understanding of MVC design & OOP.
Strong analytical ability and problem solving skills.
Familiar with software development stack (Machine Learning, unit test, revision control, cont build, LAMP & Database technology stack etc.)
Fullstack programmer, (Actually most work on mobile development but sometimes i must configure all of development environment, like manage web API, server host,web backend, web frontend for product introduction,etc feels cool and very love doing that.)
English Passive.
Technical Blog - http://creatorbe.github.io - it's how im convert machine language to human readable
Development Blog - http://creatorb.github.io - A part of my project
Public Activity - My Recent Link
Public Repository (https://github.com/creatorb) - just a collection for tutorial i'm written.
Penetration Test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as end-users’ adherence to security policies. I'm interesting look at the performance, using manual or automated technologies to systematically compromise servers, endpoints, web applications, wireless networks, network devices, mobile devices and other potential points of exposure. Once vulnerabilities have been successfully exploited on a particular system. Yay! attempt to use the compromised system to launch subsequent exploits at other internal resources, specifically by trying to incrementally achieve higher levels of security clearance and deeper access to electronic assets and information via privilege escalation, very interested and have been explored. I am also a big fan of Cycling but have been long time not to do it. Apart of explore new thing activities I like to play Football, keep continuing Reading,Writing and Blogging, and on some separate Open-Source projects.