Claim Missing Document
Check
Articles

Found 17 Documents
Search
Journal : PELS (Procedia of Engineering and Life Science)

Implementation of Regular Expressions for CLI and WEB-based Backdoor Scanners Nikko Enggaliano Pratama; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 1 No 1 (2021): Proceedings of the 1st Seminar Nasional Sains 2021
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (694.159 KB) | DOI: 10.21070/pels.v1i1.834

Abstract

The author realizes that in this era, information systems are increasingly developing, there are so many system developers who can develop great and useful applications. But not many of these developers care about data security issues or information systems. The more an application that is running and is also being developed will have an impact along with the increasing number of cybercrime or hacktivists attacking the application or a server. The actors not only carried out attacks and then ignored the servers, many of them left a backdoor, to facilitate future actions. Many of the information system developers do not understand what a backdoor is and what a backdoor looks like, because many of the backdoor is developed with complicated techniques or with common syntax that the developer considers reasonable. Here the author developed a backdoor scanner application that can run on any OS, Windows or Unix with the same results, and can run in CLI (Command Line Interface) or in Web mode. Testing of the backdoor scanner application has been carried out by various elements ranging from government, private sector and the Open Source community who can still detect all tested backdoors with 100% accuracy even though the results issued are still False Positive. The backdoor tested is a backdoor that has been developed and has been in circulation before or is called a well-know backdoor.
Android-Based Private Course Application Lukman Harun Iskandar; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 1 No 1 (2021): Proceedings of the 1st Seminar Nasional Sains 2021
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (264.639 KB) | DOI: 10.21070/pels.v1i1.861

Abstract

At this time technology has developed rapidly, without exception in the field of education. One of the technological developments in education is tutoring. Many students still need tutoring or private lessons to improve their abilities and meet the set passing grade standards. In addition, the catching power of each child in receiving subject matter at school is different so that not all are able to understand the material using offline or online methods. The purpose of this application is to make it easier and help the difficulties experienced by students and teachers to connect with each other and carry out private lessons. This application uses the method of observation and literature study. The method of making this application is the SDLC (System Development Life Cycle) prototype model. The expected results from making this application are so that teachers and students can connect with each other and carry out course activities easily according to the criteria desired by both parties. From this application students can choose based on the level of education and subjects they want to take and the rates offered by the teacher. Students and teachers can also choose the place of learning they want, such as studying at home, on video cameras or at the teacher's place.
Web based Information system for selling spare parts and custom bicycle frames (Case Study Of The Surabaya Minion Shop) muhammad Hendra Oktaviano; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 1 No 2 (2021): Proceedings of the 2nd Seminar Nasional Sains 2021
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (959.216 KB) | DOI: 10.21070/pels.v1i2.1053

Abstract

The purpose of this research is to design and produce an Online Shop application that is a Web that can provide information on goods data related to the sale of spare parts and custom frames that they are looking for. The research method used is the waterfall method, while the techniques for data collection use observation and interview techniques. The spare part data is obtained from visiting from shop to shop and the shop itself. The result of this research is to make it easier for customers to find the spare parts they want and to make more and more bicycle enthusiasts, especially onthel mini bikes, use them.
Design And Build Mesh Topology At Muhammadiyah University M. Arsyil Adhi’im; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 1 No 2 (2021): Proceedings of the 2nd Seminar Nasional Sains 2021
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (564.528 KB) | DOI: 10.21070/pels.v1i2.1128

Abstract

With the capacity of the Muhammadiyah University of Sidoarjo campus in 3 places and the use of the internet at the largest University in Sidoarjo and continues to grow every year, it becomes an obstacle if there is an internet blackout on one of the networks in one of the campuses with data on the use of Network Topology. So that buildings at universities that are quite vulnerable can be connected and exchange information locally quickly without worrying about an off condition at one of the internet network sources, wireless hardware has been developed which is a core component of a wireless mesh network that promises high flexibility, reliability, and performance. The concept used in communication is the same between nodes, but there are some differences that are owned by having an academic background and focusing on device users, mobility, and capabilities in the form of implementing wireless technology which is one solution for providing telecommunications infrastructure that can be deployed easily. fast. In this study, the use of the Wireless Mesh Point-To-Point topology system in order to overcome network conditions on one of the networks at the University in particular experienced an off/outage condition.
Indihome's New Post Activation Control Application Based On Website With Telegram Features Mochamad Rifqi Aminudin; Arif Senja Fitrani; Mochamad Alfan Rosid; Sumarno
Procedia of Engineering and Life Science Vol 2 (2021): Proceedings of the 3rd Seminar Nasional Sains 2021
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (731.637 KB) | DOI: 10.21070/pels.v2i0.1150

Abstract

Development of an application to control the activation of new indihome pairs at PT. Telkom Sidoarjo is a necessity that needs to be realized in order to support the performance of helpdesk employees in the process of activating indihome services. In developing the application, a method is needed to be able to design and build applications to meet expectations. Long polling method is one method used to get updates on bots. With the long-polling method, the server will periodically check to the bot whether there are incoming messages. If there is an incoming message, the server will execute based on the request message sent by the user. If there is no message then the server condition is idle (idle). Based on the results of planning, making and testing applications that have been carried out. It was concluded that the Indihome New Install Activation Control Application can input customer data via the SIKPRO bot, check order progress status and the Helpdesk can update order status and provide order feedback through the SIKPRO website. Bots can refuse order requests in case of double requests with the same registration number. Supervisors and Team Leaders can also recap the indihome service activation data based on daily and monthly periods
Web-Based Digital Marketing Application for Sales of Sacrificial Animals in Kandang Qurban Ganggang Panjang Village, Sidoarjo Silvie Nur Millah; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 2 No 2 (2022): Proceedings of the 4th Seminar Nasional Sains 2022
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21070/pels.v2i2.1212

Abstract

Technological advances in various fields of technology encourage the emergence of various new innovations that have a very positive impact on the world of trade. With the number of internet users increasing day by day, it opens up opportunities for entrepreneurs to develop their business through mobile phones. Like cattle and goats which are in great demand by the public for religious purposes or for consumption, the demand for these animals increases as the Eid al-Adha holiday approaches. In 2019, beef consumption was 18,913,246 tons while goat meat was 8,608,121 tons. However, in buying and selling activities, cattle breeders still use simple information media so that they are not optimal. Therefore, to support the sales process, a web-based information system is needed. Customers will find it easier to access the information they need at any time regarding prices, conditions, and maintenance. This application is made using the waterfall method starting from analysis, design, coding, testing, to maintenance. With these problems, the authors examine the existing problems, namely "Digital Marketing Applications in Increasing Web-Based Livestock Sales in Kandang Qurban Ganggang Panjang Village, Sidoarjo. The results of this study are a web-based application with stock, search, ordering and product purchasing facilities.
Techniques For Testing Website Security Using The Escaping Metacharacter Method Aditya Wira Utama; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 2 No 2 (2022): Proceedings of the 4th Seminar Nasional Sains 2022
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21070/pels.v2i2.1223

Abstract

Information has become a very important need and has even become a basic need in this day and age. Much of the information available is confidential and not everyone has access to that information. CrossSite Scripting is a type of injection attack against a site by relying on weaknesses from the website or the user itself. Attackers try to steal data, confidentiality and website structure with certain commands through code scripting which is very contrary to the principles of information system security. So that the basic principles of information system security can be fulfilled, it is necessary to conduct research with the aim of finding loopholes and the effect of certain treatments for CrossSite Scripting attacks on websites under controlled conditions and closing the vulnerability gaps of the website. The research was conducted using the escaping metacharacter method which functions to convert special characters into HTML format. This method also functions as a filter on input so that the script that is injected by the user will not be executed by the browser and will be considered as normal input. From the results of the study, it shows that by entering certain characters or words as a rule (filter) which is the hallmark of the xss script, a pattern will be obtained which can later be used as a determinant of whether the input is really an ordinary string or script injection. The research contribution to be achieved is the importance of doing penetration testing on an information system for Agencies, Institutions and Companies, to always be able to recognize, analyze and respond to attacks on information systems and provide security and comfort to users of the information system.
Animal Recognition Application Based on Food Type Using Android Based Augmented Reality Dona Ardiansyah; Ade Eviyanti; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 2 No 2 (2022): Proceedings of the 4th Seminar Nasional Sains 2022
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21070/pels.v2i2.1227

Abstract

Augmented reality (AR) is a technology with the concept of combining the dimensions of the real world with the dimensions of the virtual world that is displayed in real time. Augmented reality is not like virtual reality which replaces the real world augmented reality only adds and complete this ,this is done by drawing there-dimensional object on the marker, which is a pattern that is unique and can be recognized by its application this method often called the single marker and 3D method tracking objects smartphones allowed the development of augmented reality applications easily inexpensively and can be accessed by many users augmented reality can be utilized in various fields for example for the means of developing children’s education by playing and learning using augmented reality such as using a smartphone as learning medium by using augmented reality android based reality with a marker object to bring up 3d animal objects as a medium for learning and introducing animals bases on the type of food.
Application Design “Xanthe Original Distro” Web Based to Increase Sales Value Satria Hidayahtullah; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 2 No 2 (2022): Proceedings of the 4th Seminar Nasional Sains 2022
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21070/pels.v2i2.1245

Abstract

Xanthe Original distributions have quite a number of buyers or members, in this case, the main focus that will be evaluated is how to process online and offline sales of original Xanthe products. Online sales of original Xanthe products are still required to contact the original Xanthe distribution via WhatsApp to ask for stock, product details, product prices, and product delivery costs, so members or buyers must wait first until the distribution party replies to the WhatsApp chat, while in offline sales Xanthe products originals are required to come to the original Xanthe distro, and the problem that often occurs when buyers come directly to the distribution is that the product they want to buy is out of stock. The purpose of designing this application is to produce an effective and efficient sales application on the Xanthe Original distribution. The research used in completing this sales application is observation, interviews, and documentation carried out at the Xanthe Original Distro Sidoarjo. This sales application is made using the PHP Native programming language and MySQL as the database. The results of the research on this sales application are that the distribution party can manage goods data, category data, expedition data, member data, and computerized sales data. This application is expected to make it easier for members to buy original Xanthe products because product orders and product payments are made online, and there is no need to come to the store.
Configuring Load Balancing and Failover Using a Mikrotik Router on RT RW NET (Case Study: Dusun Klatakan Dayurejo) Muhammad Muzayyin; Arif Senja Fitrani
Procedia of Engineering and Life Science Vol 2 No 2 (2022): Proceedings of the 4th Seminar Nasional Sains 2022
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21070/pels.v2i2.1293

Abstract

The internet is something that is absolutely needed by every human being, as a result network administrators will implement various alternatives to meet user needs. The administrator will add an ISP line to be able to use the internet smoothly and easily. In fact, administrators often use an ISP's gateway line. This causes traffic inequality on the network when the number of users connected to the ISP line is much more. In the implementation of this final project, a load balancing and connection was made using 2 ISPs. The method used is the load balancing and failover method which is implemented using a mikrotik routerboard on the RT RW NET Dusun Klatakan network. With these two methods, all requests are based on the client that will enter the router that has been configured using the previous load balancing and failover method, so that the router will set the path based on the client through ISP 1 or ISP 2 in order to be able to back up each other's internet connections. The test results show the occurrence of equal access to access in a balanced way, so that there is no overload at one ISP.