Benalu's Son-in-law Turns Out to be a Genius Hacker

Benalu's Son-in-law Turns Out to be a Genius Hacker
41. AlfaStudio



The four additional members are Ahmad from Indonesia as database administrator, Gonzalez from Spain as network engineer, Chris from the UK as system analyst, and Feliks from Russia as designer. The four of them are the people of choice of Mr. Arya and all of them are experienced in making applications and the like.


While running the project, Stefan studied and tested for himself some software commonly used by programmers generally to create an application in the operating system android, ios, and windows, such as Adobe Flash Builder, Adobe, Android Studio, Netbeans, Apache Cordova, React Native, and more.


After understanding everything, Stefan developed his own software called AlfaStudio, which is much better and easy to use. Programming languages that can be used for this software are Java, C++, PHP, and others.


In AlfaStudio, programmers do not need to look for other plugins, all IDE tools and features are fully integrated in one software. In addition, this software has several features that are a mainstay such as, instant run, intelligence code editor, emulator, and layout editor that speeds up the coding process.


“This software provides different rendering components for ios and android,” beber Stefan to all its members.


“How long have you been making AlfaStudio?” ask Theo in wonder.


“Three days. Two nights I don't sleep,” reply Stefan.


AlfaStudio can only be operated by Team 18. Therefore, Stefan creates a special server or server that can only be entered by certain users, namely he with seven members only.


“Process authentication with two methods, namely biometric authentication and token-based authentication, in an effort to maintain security. On authorization, I will give access to you in accordance with their respective tasks,” said Stefan quite clearly.


Token-based authentication usually follows a four-step process. First, the user logged in with these two methods. Second, verification, which is authentication, determines that the user's credentials are correct. Third, the system issues a token and gives it to the user. Fourth, the token is held by the user to authenticate without credentials going forward again.


In data handover, Stefan always be careful in maintaining security so that the data sent is not leaked in the hands of irresponsible parties. Therefore, Stefan uses encryption and decryption of data using symmetric cryptographic methods or private keys.


“I have operated more than five software, this time it feels comfortable and good to work. I salute AlfaStudio,” praise Ahmad smile sumringah.


“Excellent! We can combine more than a thousand existing applications into one application only.” Felix.


“One application that most features will be slow is usually fit to use, while AlfaStudio guarantees its output application will still run optimally.” Gonzales.


“AlfaStudio will make it easier for application projects in the future,” said Chris while giving a thumbs up.


\=\=\=>>>0<<<\=\=\=


After meeting a manager, Stefan and Theo are suddenly confronted by Alan and Liam on the stairs. No matter how these two people attack with a psychological war.


“Hei people who have had concussions! Where else would you like to look?” ledek Alan throbbed, both pairs of eyebrows linked.


“Theo, you now seem to be a snicker in this office,” burles Liam while snorting.


So Stefan plunged his gaze right into Alan's eye seeds. “I've told you before, Alan. Lickers are ambitious people who do not have the capacity, want the position by elbowing colleagues and seducing superiors. Unfortunately, I'm not such a cheap person.”


Theo started to get emotional. He glared at their faces while grinning. “It is precisely the tops that seduce us. In fact, the fellow who nudged us. And remember, we have the capacity. Not like you guys!” The harder Theo chewed his gum, then restored his messy curly hair.


Alan ruffled his waist, as if he could not accept. “Basic the most memory lost!”


Stefan. “By the way are you ha?” yell, ride the apoplexy.


Stefan looked back and continued to give a sharp look to Alan. All this time he was patient. But, it seems that Alan continues to provide intimidation. It was as if he did not dare to do something. If the talk and attitude does not work, Stefan inevitably attacks by air and network. Just look at it later.


\=\=\=>>>0<<<\=\=\=


To melt the mood of Stefan, especially during the last few days busy working on the project, Theo invites Stefan to return to his home. 


“Hei, Stephen! You know Stephanie's been watching you?” open Theo while giggling.


Stefan jerks. “Now, I don't know. Notice what it looks like?” ask her back, while putting her ears together nicely.


Theo patted the eel, then leaned his back against the sofa. “Gosh! He was different every day, giving attention. Are you insensitive ha?”


“I'm too busy with work. After all, how could he be related to me?”


“We all know who you are, Stefan.”


Theo moves in and invites Stefan into his room. Although this was the second time, Stefan was still stunned to see this entire room. For a Theo whose appearance is sometimes messy is very inappropriate if this room is his.


All computer devices with excellent specifications. There are three screens on the table there that work just fine. Internet networks that speed. All these facilities are enough to be a programmer from home, but strangely Theo prefers to work with a team.


“Please if you want to try!” bargain Theo while throwing his index finger at a computer device, then he threw his body on the mattress.


Stefan knew that Theo's computer could not be used immediately because it was locked. It didn't take long, fiddling for a second, all systems were on. Screen's alive.


“Thank you. I happen to have a little task,” cried Stefan.


Theo instantly got up and gaped at his mouth. “Hah? Seriously? How can you?” Theo.


“Sophisticated also computer! Use SigmaX for cyber-security. Unfortunately, it is still version 0.4. Update lah!”


“Truly free. Now pay. No money yet,” tepis Theo and then lay his body back.


“I used to think the program could only be used for personal use. It turns out that over time many also wear. So fitting the release of version 0.7, I have already patented it and started marketing it.”


Stefan cooperates with AlfaTech in the sale of SigmaX programs. With that Stefan gets extra income.


After manipulating the user, even using Theo's servers, Stefan would send the rootkit and embed it in Alan's computer in revenge for the psywar attack.


A few minutes later, Stefan was able to scout and take over Alan's computer. The firewall of the computer is very weak. Stefan knows the activity there. If you want, easily steal important files or delete them.


For the time being Stefan only gave a firm warning to Alan by making the front view of the computer screen at his home, with the words: Stop doing psywar if you do not want your secret to be revealed all!