Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi

ANALISIS DAN IMPLEMENTASI JARINGAN THIN CLIENT MENGGUNAKAN LINUX TERMINAL SERVER PROJECT PADA JARINGAN LAN Hasibuan, Doli; Larosa, Fati Gratianus Nafiri; Simanjuntak, Rico VA
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.417

Abstract

The development of computer technology both in software and hardware is very fast. These two aspects are interrelated with each other and cannot be separated. LTSP, Linux Terminal Server Project is a project started by James A McQuillan as a diskless networking project based on the GNU/Linux operating system. Called a diskless network, because the client is not equipped with a hard disk. All application software and operating systems needed by the client computer are served and managed by the server computer. In this design, a laptop with an Intel processor is used as a server and a PC as a client. LTSP will be integrated into the Linux operating system ubuntu 16.04, and as a provider of diskless thin client service platforms is LTSP (Linux Terminal Server Project). With LTSP, the construction of a diskless network is expected to be more efficient. Diskless network technology is one solution that can be applied in dealing with the problem of investing in computer technology hardware with predetermined specifications.
IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN ALGORITMA BLOWFISH Studi Kasus DI DOTA CAFE Hasibuan, Doli; Naibaho, Jimmy Febrinus; Simanjuntak, Christian P
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.420

Abstract

Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. In everyday life, fraud is often found in important data, one of which is cashier system data. To prevent and overcome this, the concept of network security with the Blowfish Algorithm will be applied. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Unexpected things often occur such as foreign parties who want to enter the system by repeatedly trying the possible username and password, or foreign parties changing the data in the cash register at Dota Café. This system will function to monitor system activity, in this case if the system feels a threat or system disturbance is found.