Hariyanto Hariyanto Hariyanto
dosen

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

IMPLEMENTATION OF SECURITY IN DYNAMIC BINARY TRANSLATION Hariyanto Hariyanto Hariyanto
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computers at this time is not an expensive item that only owned by a group of people, but itis a tool that can help in completing one's work. It is worth a secure and protect their datafrom data-interference and virus attacks coming from inside and outside the system. At theend of computer security will play an important role in data security.A dynamic binary translation is a dynamic system in the machine code fragment damage thatmay directly or enclosed diesekusi interpreter software. When mengesekusi interpreters, thestatistics are collected to determine how often these fragments diesekusi and how often takenbranches. Fragments of the most frequently used and transformed in the cache for subsequentexecution. Once the fragment is in the cache, they may be merged with other fragments whenthey were found separately by direction of an unconditional branch. This architecture is usedfor optimizing the dynamic programs, instruments and translational arsitetur intropeksi
IMPLEMENTATION USING DATA SECURITY XOR encryption MODEL ALGORITHM Hariyanto Hariyanto Hariyanto
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The problem of data security is a problem frequently faced by computer users especially ifthe data is communicated with the other computer, where data needs to be protected to avoidabuse by people who are not entitled the data. One of the things that are important in ensuringthe confidentiality of the data is to use encryption techniques. Encryption dalah a process thatchanges a code of conduct that can be understood (plaintext) into a code incomprehensible(not readable / ciphertext)). One method used for the encryption algorithm is the ExclusiveOR logical operators (XOR) the plaintext data which is converted into ASCII code stored inbinary form (ciphertext) so that data can not be read without knowing the decryption key.XOR encryption methods can be implemented through various programs, one of them usingVisual Basic software, allowing you seen changes in the data (encryption) from plaintext intociphertext and decrypt the data through changes back into plaintext.