<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>Isfiblog&amp; Portal Web Isfidev &amp; : General</title>
<link>https://blog.isfidev.com/rss/category/general</link>
<description>Isfiblog&amp; Portal Web Isfidev &amp; : General</description>
<dc:language>id</dc:language>
<dc:rights>Isfidev Developer</dc:rights>

<item>
<title>Python Mastery: From Beginner to Expert Part&amp;2(Object&amp;Oriented Programming)</title>
<link>https://blog.isfidev.com/python-mastery-from-beginner-to-expert-part-2object-oriented-programming</link>
<guid>https://blog.isfidev.com/python-mastery-from-beginner-to-expert-part-2object-oriented-programming</guid>
<description><![CDATA[ This is Part 2 of the Python crash course “Python Mastery: From Beginner to Expert “. If you haven’t read it yet, check it out before continuing. If you’re all caught up, welcome back! In Part 1, we covered all the basic requirements to be on your way to mastering Python. Now, let’s dive deeper [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8ad4cdc74.jpg" length="39213" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:19:10 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Python, Mastery:, From, Beginner, Expert, Part-2Object-Oriented, Programming</media:keywords>
</item>

<item>
<title>Advanced Python Mastery: For the Serious Developer</title>
<link>https://blog.isfidev.com/advanced-python-mastery-for-the-serious-developer</link>
<guid>https://blog.isfidev.com/advanced-python-mastery-for-the-serious-developer</guid>
<description><![CDATA[ This is Part 3 of the Python crash course “Python Mastery: From Beginner to Expert “. If you haven’t read it yet, check it out before continuing. If you’re all caught up, welcome back! In Part 2, we covered all the dive deeper into Object-Oriented Programming (OOP) and got one step closer to becoming a [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8ace9c5c4.jpg" length="30982" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:19:04 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Advanced, Python, Mastery:, For, the, Serious, Developer</media:keywords>
</item>

<item>
<title>Python GUI Programming With Tkinter</title>
<link>https://blog.isfidev.com/python-gui-programming-with-tkinter</link>
<guid>https://blog.isfidev.com/python-gui-programming-with-tkinter</guid>
<description><![CDATA[ Tkinter is a Python library that creates graphical user interfaces (GUIs). It is included with most Python installations and is the standard GUI library for Python. Tkinter provides a simple way to create windows, buttons, labels, and other GUI elements. Here is a Demo of a project we built in this tutorial Source code Tkinter [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8ac80c9a5.jpg" length="63206" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:57 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Python, GUI, Programming, With, Tkinter</media:keywords>
</item>

<item>
<title>A summary of common basic Python errors and how to check them. The easy&amp;to&amp;understand explanation for beginners!</title>
<link>https://blog.isfidev.com/a-summary-of-common-basic-python-errors-and-how-to-check-them-the-easy-to-understand-explanation-for-beginners</link>
<guid>https://blog.isfidev.com/a-summary-of-common-basic-python-errors-and-how-to-check-them-the-easy-to-understand-explanation-for-beginners</guid>
<description><![CDATA[ Hi Python enthusiast!  ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8ac0e76eb.jpg" length="29849" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:50 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>summary, common, basic, Python, errors, and, how, check, them., The, easy-to-understand, explanation, for, beginners</media:keywords>
</item>

<item>
<title>PyQt Mastery: From Beginner to Advanced</title>
<link>https://blog.isfidev.com/pyqt-mastery-from-beginner-to-advanced</link>
<guid>https://blog.isfidev.com/pyqt-mastery-from-beginner-to-advanced</guid>
<description><![CDATA[ This course is for those who want to develop a desktop application using PyQt for the first time and introduces its features and installation methods. It also explains how to create a basic application using PyQt and how to use its various widgets and layouts. We also deep into advanced topics such as signals and [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8aba596c4.jpg" length="51439" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:42 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>PyQt, Mastery:, From, Beginner, Advanced</media:keywords>
</item>

<item>
<title>The Complete Beginner’s Guide to Hugface LLM Tools</title>
<link>https://blog.isfidev.com/the-complete-beginners-guide-to-hugface-llm-tools</link>
<guid>https://blog.isfidev.com/the-complete-beginners-guide-to-hugface-llm-tools</guid>
<description><![CDATA[ Hugging Face is an AI research laboratory and one-stop platform creating a community between academics, researchers, and enthusiasts. Within a very short period, Hugging Face has built quite a significant presence within the field of AI ​​itself. Significant investments by major companies like the tech giants Google, Amazon, and Nvidia have boosted this AI startup, [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8ab291d31.jpg" length="47822" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:35 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>The, Complete, Beginner’s, Guide, Hugface, LLM, Tools</media:keywords>
</item>

<item>
<title>Top 7 Open&amp;Source LLMs for 2024 and Their Uses</title>
<link>https://blog.isfidev.com/top-7-open-source-llms-for-2024-and-their-uses</link>
<guid>https://blog.isfidev.com/top-7-open-source-llms-for-2024-and-their-uses</guid>
<description><![CDATA[ Understand how the best open-source LLMs are on the verge of taking generative AI to new dimensions to provide unprecedented model transparency, customization, and innovation—and why these models are fast positioned as indispensable tools for developers and researchers. LLMs Drive the Generative AI Revolution: These AI systems, based on transformers, process human language and are [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8aab2bbb4.jpg" length="78511" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:25 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Top, Open-Source, LLMs, for, 2024, and, Their, Uses</media:keywords>
</item>

<item>
<title>Complete  Python Ebook  From Basic To Advanced</title>
<link>https://blog.isfidev.com/complete-python-ebook-from-basic-to-advanced</link>
<guid>https://blog.isfidev.com/complete-python-ebook-from-basic-to-advanced</guid>
<description><![CDATA[ Topics covered In this eBook : This e-book contains in-depth Python notes for all skill levels. This book has inception chapters on the basics of Python, data types, operators, and control structures. Thereafter, it covers advanced subjects like functional programming, decorators, and generators. Detailed sections are also provided on OOP, class, object, inheritance, polymorphism, and [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8aa1a5e1b.jpg" length="72884" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:19 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Complete, Python, Ebook, From, Basic, Advanced</media:keywords>
</item>

<item>
<title>Complete C++ Handwritten Notes From Basic to Advanced</title>
<link>https://blog.isfidev.com/complete-c-handwritten-notes-from-basic-to-advanced</link>
<guid>https://blog.isfidev.com/complete-c-handwritten-notes-from-basic-to-advanced</guid>
<description><![CDATA[ Topic Covered in this Notebook C++ is one of the most powerful and influential programming languages, and it is very good at developing fast and efficient software. System software, game development, and real-time processing-oriented programs are the main areas of deployment of C++. The main reasons to learn C++ revolve around performance since it often [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8a9ae3433.jpg" length="72620" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:11 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Complete, C, Handwritten, Notes, From, Basic, Advanced</media:keywords>
</item>

<item>
<title>Complete HTML Handwritten Notes</title>
<link>https://blog.isfidev.com/complete-html-handwritten-notes</link>
<guid>https://blog.isfidev.com/complete-html-handwritten-notes</guid>
<description><![CDATA[ Topic Covered in This Note HTML stands for HyperText Markup Language and is the skeleton of the web. It’s the standard language used to create web pages. Think of HTML as the structure of a building; it lays out the framework that gives your content a place to live. At its core, HTML uses tags [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202410/image_870x580_670d8a92ccb0f.jpg" length="60668" type="image/jpeg"/>
<pubDate>Tue, 15 Oct 2024 03:18:04 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Complete, HTML, Handwritten, Notes</media:keywords>
</item>

<item>
<title>Google just launched a new AI and has already admitted at least one demo wasn’t real</title>
<link>https://blog.isfidev.com/google-just-launched-a-new-ai-and-has-already-admitted-at-least-one-demo-wasnt-real</link>
<guid>https://blog.isfidev.com/google-just-launched-a-new-ai-and-has-already-admitted-at-least-one-demo-wasnt-real</guid>
<description><![CDATA[ Google recently unveiled Gemini, its latest suite of powerful AI models, but the tech giant is already under fire for allegedly misleading claims about its performance. In an op-ed by Bloomberg, concerns were raised about the accuracy of a video demonstration presented by Google during the announcement of Gemini. The hands-on video showcased Gemini’s impressive [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03f928326.jpg" length="59390" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:48:05 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Google, just, launched, new, and, has, already, admitted, least, one, demo, wasn’t, real</media:keywords>
</item>

<item>
<title>NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks</title>
<link>https://blog.isfidev.com/nkabuse-malware-exploits-nkn-blockchain-for-advanced-ddos-attacks</link>
<guid>https://blog.isfidev.com/nkabuse-malware-exploits-nkn-blockchain-for-advanced-ddos-attacks</guid>
<description><![CDATA[ A newly identified cyber threat named NKAbuse is making waves in the digital security landscape, employing a decentralized, peer-to-peer network protocol called NKN (New Kind of Network) as a conduit for its malicious activities. Russian cybersecurity firm Kaspersky disclosed in a recent report that the malware harnesses NKN technology for seamless data exchange between peers, [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03f4a6092.jpg" length="119361" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:48:00 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>NKAbuse, Malware, Exploits, NKN, Blockchain, for, Advanced, DDoS, Attacks</media:keywords>
</item>

<item>
<title>New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks Worldwide</title>
<link>https://blog.isfidev.com/new-javascript-malware-targeted-50000-users-at-dozens-of-banks-worldwide</link>
<guid>https://blog.isfidev.com/new-javascript-malware-targeted-50000-users-at-dozens-of-banks-worldwide</guid>
<description><![CDATA[ In a recent cyber onslaught, a newly discovered JavaScript malware has unleashed a wave of attacks on over 40 financial institutions worldwide, compromising the online banking credentials of more than 50,000 users. Unearthed by IBM Security Trusteer in March 2023, this sophisticated campaign utilizes JavaScript web injections to infiltrate popular banking applications, posing a substantial [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03f00fb8f.jpg" length="58546" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:55 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>New, JavaScript, Malware, Targeted, 50, 000, Users, Dozens, Banks, Worldwide</media:keywords>
</item>

<item>
<title>Microsoft Takes Swift Action to Thwart Malicious Exploitation of MSIX App Installer Protocol</title>
<link>https://blog.isfidev.com/microsoft-takes-swift-action-to-thwart-malicious-exploitation-of-msix-app-installer-protocol</link>
<guid>https://blog.isfidev.com/microsoft-takes-swift-action-to-thwart-malicious-exploitation-of-msix-app-installer-protocol</guid>
<description><![CDATA[ In response to the increasing threat posed by multiple malicious actors, Microsoft announced on Thursday that it is once again taking measures to disable the ms-appinstaller protocol handler by default. This decision comes in the wake of its exploitation by threat actors to facilitate the widespread distribution of malware. The Microsoft Threat Intelligence team revealed [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03eb362b1.jpg" length="112213" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:50 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Microsoft, Takes, Swift, Action, Thwart, Malicious, Exploitation, MSIX, App, Installer, Protocol</media:keywords>
</item>

<item>
<title>FTC Enforces Strict Measures Against InMarket for Unauthorized Sale of Precise User Location Data</title>
<link>https://blog.isfidev.com/ftc-enforces-strict-measures-against-inmarket-for-unauthorized-sale-of-precise-user-location-data</link>
<guid>https://blog.isfidev.com/ftc-enforces-strict-measures-against-inmarket-for-unauthorized-sale-of-precise-user-location-data</guid>
<description><![CDATA[ The U.S. Federal Trade Commission (FTC) continues its rigorous crackdown on data brokers, taking decisive action against InMarket Media by prohibiting the sale or licensing of precise location data without explicit user consent. This settlement follows allegations that the Texas-based company, InMarket, failed to inform or seek consent from consumers before utilizing their location information [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03e5f2975.jpg" length="113695" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:45 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>FTC, Enforces, Strict, Measures, Against, InMarket, for, Unauthorized, Sale, Precise, User, Location, Data</media:keywords>
</item>

<item>
<title>“The mother of all breaches”: 26 billion records found online</title>
<link>https://blog.isfidev.com/the-mother-of-all-breaches-26-billion-records-found-online</link>
<guid>https://blog.isfidev.com/the-mother-of-all-breaches-26-billion-records-found-online</guid>
<description><![CDATA[ In a staggering revelation, cybersecurity experts have uncovered a colossal cache of over 26 billion exposed records online, branding it as the “mother of all breaches.” Contrary to conventional breaches, this massive dataset doesn’t stem from a solitary security incident but rather represents an amalgamation of multiple breaches, often orchestrated by data enrichment entities. The [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03e13859a.jpg" length="75586" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:40 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>“The, mother, all, breaches”:, billion, records, found, online</media:keywords>
</item>

<item>
<title>Parrot OS 6.0 Unveiled: Latest Ethical Hacking Distro Introduces Linux 6.5 and Raspberry Pi 5 Compatibility</title>
<link>https://blog.isfidev.com/parrot-os-60-unveiled-latest-ethical-hacking-distro-introduces-linux-65-and-raspberry-pi-5-compatibility</link>
<guid>https://blog.isfidev.com/parrot-os-60-unveiled-latest-ethical-hacking-distro-introduces-linux-65-and-raspberry-pi-5-compatibility</guid>
<description><![CDATA[ Parrot Security has officially launched Parrot OS 6.0, marking the latest iteration of its Debian-based security-focused distribution tailored for ethical hacking and penetration testing enthusiasts. Highlighting a commitment to providing a sophisticated yet user-friendly environment, Parrot OS 6.0 debuts nearly a year after its predecessor, Parrot OS 5.2. Drawing from the foundations of the Debian [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03dc5eae4.jpg" length="58083" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:35 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Parrot, 6.0, Unveiled:, Latest, Ethical, Hacking, Distro, Introduces, Linux, 6.5, and, Raspberry, Compatibility</media:keywords>
</item>

<item>
<title>Apple Unveils Pkl: A Revolutionary Open&amp;Source Configuration Language</title>
<link>https://blog.isfidev.com/apple-unveils-pkl-a-revolutionary-open-source-configuration-language</link>
<guid>https://blog.isfidev.com/apple-unveils-pkl-a-revolutionary-open-source-configuration-language</guid>
<description><![CDATA[ Apple has just introduced a groundbreaking addition to the world of programming languages with the launch of Pkl, an innovative open-source “embeddable configuration language.” This move aims to streamline configuration tasks, ranging from simple to complex, and from ad-hoc to repetitive. Unveiled on February 1, 2024, with its initial version labeled 0.25, Pkl comes with [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03d72a59a.jpg" length="133009" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:29 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Apple, Unveils, Pkl:, Revolutionary, Open-Source, Configuration, Language</media:keywords>
</item>

<item>
<title>2 Million Affected by SQL Injection and XSS Data Breach</title>
<link>https://blog.isfidev.com/2-million-affected-by-sql-injection-and-xss-data-breach</link>
<guid>https://blog.isfidev.com/2-million-affected-by-sql-injection-and-xss-data-breach</guid>
<description><![CDATA[ In a recent cyber onslaught, a notorious threat group, dubbed ‘ResumeLooters’, has orchestrated a massive data breach affecting over two million individuals. Employing sophisticated tactics including SQL injection and cross-site scripting (XSS) attacks, the group infiltrated 65 legitimate job listing and retail websites. The primary targets of the attacks were concentrated across the Asia-Pacific (APAC) [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03d13fe2d.jpg" length="111426" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:23 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Million, Affected, SQL, Injection, and, XSS, Data, Breach</media:keywords>
</item>

<item>
<title>Malicious Ads Exploit macOS Users, Unleashing Stealer Malware</title>
<link>https://blog.isfidev.com/malicious-ads-exploit-macos-users-unleashing-stealer-malware</link>
<guid>https://blog.isfidev.com/malicious-ads-exploit-macos-users-unleashing-stealer-malware</guid>
<description><![CDATA[ Reports reveal a surge in malicious ad campaigns targeting Apple macOS users, unleashing two distinct strains of stealer malware, notably Atomic Stealer, in a bid to pilfer sensitive data. Recent investigations by Jamf Threat Labs have unveiled a concerning trend of infostealer attacks specifically aimed at macOS users. These attacks employ various tactics to infiltrate [...] ]]></description>
<enclosure url="http://blog.isfidev.com/uploads/images/202404/image_870x580_660f03cbd38b1.jpg" length="53910" type="image/jpeg"/>
<pubDate>Fri, 05 Apr 2024 09:47:19 +0700</pubDate>
<dc:creator>ahmadsofyan</dc:creator>
<media:keywords>Malicious, Ads, Exploit, macOS, Users, Unleashing, Stealer, Malware</media:keywords>
</item>

</channel>
</rss>