Skip to main content

Posts

Showing posts from November, 2015

kode VBA untuk membuka Password Protect Workbook Excel

Jika Anda pernah lupa password untuk salah satu lembar kerja excel Anda Yang bisa membuat anda Frustasi ??   Berikut saya share kode VBA untuk membuka Password Protect Workbook Excel   Sub PasswordBreaker() 'Breaks worksheet password protection. Dim i As Integer, j As Integer, k As Integer Dim l As Integer, m As Integer, n As Integer Dim i1 As Integer, i2 As Integer, i3 As Integer Dim i4 As Integer, i5 As Integer, i6 As Integer On Error Resume Next For i = 65 To 66: For j = 65 To 66: For k = 65 To 66 For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66 For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66 For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126 ActiveSheet.Unprotect Chr(i) & Chr(j) & Chr(k) & _ Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _ Chr(i4) & Chr(i5) & Chr(i6) & Chr(n) If ActiveSheet.ProtectContents = False Then MsgBox "One usable password is " & Chr(i) & Chr(j) & _

Zimbra Admin Error : Diffie-Hellman key in Server Key Exchange handshake message

Ketika Membuka zimbra admin , muncul error seperti dibawah ini : Secure Connection Failed An error occurred during a connection to Server Zimbra. SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. (Error code: ssl_error_weak_server_ephemeral_dh_key)     The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.     Please contact the website owners to inform them of this problem. ketika saya menggunakan Firefox Ver 42. Berdasarkan penjelasan dari support Mozilla , ini semacam celah keamanan SSL. saat firefox update aplikasi tersebut meningkatkan keamanan celah Diffie-Hellman Diffie–Hellman key exchange (D–H) [nb 1] is a specific method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle.[1][2] D–H is one of the earliest practical examples of public key exchange implemented within the f