Claim Missing Document
Check
Articles

Found 7 Documents
Search

Aplikasi Mikrotik Dasar Sebagai Pembatasan Bandwidth pada Warung Internet Teranet One di Prabumulih Rahmat Novrianda Dasmen; Kharisma Pangestu; Kevin Saputra
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 1 (2022): Maret 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i1.6270

Abstract

With the development of information technology, the need for the use of the internet is becoming increasingly important in helping daily life. Computer network support equipment is still very much needed. Currently the internet is not only needed to do office work but also to communicate, play games and do school work. Mikrotik has the most important task in building a computer network system. Mikrotik is a computer network hardware that can transmit data to the network. Mikrotik also acts as a liaison between many networks to transfer data from one network to another. Mikrotik is priced at a fairly high price and is still difficult to reach by the general public, so an operating system is formed, namely Mikrotik Router OS. Mikrotik Router OS is a solution for those who need a reliable router only with a personal computer (standalone) with the Mikrotik operating system. The internet cafe (warnet) of Teranet One is experiencing a bandwidth leak problem where users can access the internet without any bandwidth restrictions. Therefore, it takes a bandwidth limitation system using Mikrotik. With this bandwidth limitation system, bandwidth leaks can be overcome and the upload and download speeds of each user can be regulated.
Penerapan Pembatasan User Wi-Fi Pada Kantor Yayasan Patra Mandiri 01 Palembang Rahmat Novrianda Dasmen; Muhamad Dito Nugraha; Adelia Adelia
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 1 (2022): Maret 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i1.6286

Abstract

The need for the use of the internet has become very important in helping daily life along with the development of information technology. Wi-fi (wireless fidelity) has a role in building computer network systems today. Wi-Fi can be defined as a technology that uses electronic equipment to exchange data using radio waves (wireless) through a computer network. Yayasan Patra Mandiri 01 Palembang office has used the Wi-Fi facility but there is no user restriction facility available. This causes frequent lag when accessing the internet. This study aims to limit Wi-Fi users at the Yayasan Patra Mandiri 01 Palembang office and to find out the importance of using a Wi-Fi network in meeting information needs at the Kantor Yayasan Patra Mandiri 01 Palembang office. The user restriction process is carried out by configuring internet protocol (IP) addresses using the dynamic host configuration protocol (DHCP) facility on Mikrotik equipment. The result of this research is that there is a user restriction facility on the Wi-Fi network of the Patra Mandiri 01 Palembang Foundation Office.
PENGUJIAN PENETRASI PADA WEBSITE ELEARNING2.BINADARMA.AC.ID DENGAN METODE PTES (PENETRATION TESTING EXECUTION STANDARD) Rahmat Novrianda Dasmen; Rasmila Rasmila; Tantri Langgeng Widodo; Kundari Kundari; Muhammad Tio Farizky
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9809

Abstract

Bina Darma University is one of the best private campuses that provides a website-based online learning system. With the increasing distribution of information online in the era of the Covid-19 pandemic and the high enthusiasm of students in online learning, it is very important for Bina Darma University to pay attention to the security of the information system website used to protect user data. The goal to be achieved in this research is to implement penetration testing with the Black Box method and the PTES method on the elearning2.binadarma.ac.id website. The PTES method can be used as a standard guide for assessing web-based application security which consists of 5 stages, which consist of information gathering, threat modeling, vulnerability analysis, exploitation, and reporting. At the end of the research, it can be concluded that testing on elearning2binadarma.ac.id was identified as having a loophole in Cross Site Scripting (XSS) which is quite dangerous if it spreads further. The way to handle this gap can be done by checking website vulnerabilities regularly.
Analisis Digital Forensik Recovery File yang Terhapus Menggunakan Tools Autopsy Dengan Metode National Institute Of Justice Rahmat Novrianda Dasmen; Arief Rahman; Anugrah Dwi Putra; Muchlis Saputra
Jurnal Ilmiah Komputasi Vol. 23 No. 2 (2024): Jurnal Ilmiah Komputasi : Vol. 23 No 2, Juni 2024
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32409/jikstik.23.2.3553

Abstract

Salah satu kasus kejahatan digital yang umum terjadi adalah pencurian data, seperti informasi transaksi hingga data sensitif perusahaan. Pencuri menghapus file untuk menghapus jejaknya. Oleh karena itu, perlu dilakukan pencarian dan mengembalikan data yang terhapus untuk digunakan sebagai bukti digital. Kegiatan ini biasa disebut dengan forensik digital.Flash disk, juga dikenal sebagai USB flash drive, adalah perangkat penyimpanan data portabel tipe NAND yang memiliki port USB internal dan dapat dihubungkan ke Flashdisk merupakan media penyimpanan data yang paling umum digunakan saat ini dan dapat dibawa kemana saja. Flashdisk dapat digunakan untuk berbagai keperluan, antara lain sebagai media alternatif drive CD/DVD-ROM dan sebagai media penyimpanan sistem operasi.Tingkatkan kinerja penyimpanan komputer Anda, buat dan gunakan aplikasi portabel, serta kelola keamanan dan cadangan flash disk.Recovery menggunakan tools autopsy dengan hasil berhasil mengembalikan file berupa 6 berkas DOCX, 6 berkas XLSX, 8 berkas PDF, 6 dan 9 berkas PNG.Dengan keadaan baik dan utuh
Implementasi Tarpit Firewall untuk Optimasi Keamanan Jaringan dengan Metode NIST SP800-86 Pada Ruangan KP Rahmat Novrianda Dasmen; ansyah, Ardi; Timur Dali Purwanto; Marlindawati
Tech-E Vol. 8 No. 2 (2025): TECH-E (Technology Electronic)
Publisher : Fakultas Sains dan Teknologi-Universitas Buddhi Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31253/te.v8i2.3277

Abstract

Network optimization is one of the important aspects that aims to improve the performance, efficiency and reliability of network systems and security on the network, but if the optimization is not carried out effectively it will pose a security threat to the network, one of the real threats is DdoS Attack, DdoS attack is a dangerous attack because this attack can paralyze the network server,  Therefore, optimization needs to be carried out in the KP Room in order to avoid the threat of DdoS attacks, so the initial stage of this research will test the network to find out how optimal the network is in the KP room so that optimization is needed. The research method used is NSIT, which includes collection, examination, analysis, and reporting, the results after the research is carried out where, on the network in the kp room after testing at the examination stage and then by identifying the test results, it can be concluded that the network is not optimal enough against DdoS attacks and connection type attacks which, The optimization step taken is to apply a Tarpit firewall on the router. The implementation of Tarpit Firewall successfully overcomes DdoS attacks by slowing down incoming connections and stopping attacks, thereby improving network security from Port Scanning, DDoS, and Brute force attacks.
Implementation of Hardening for Optimization of Wireless Local Area Network Security Rahmat Novrianda Dasmen; Muhammad Reihan Pratama
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol. 13 No. 1 (2025): Maret 2025
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v13i1.9957

Abstract

Computer networks use two main methods for data transmission, namely wired and wireless networks or what is known as a Wireless Local Area Network (WLAN). In WLAN networks, the security standard usually used is the WiFi Protected Access 2 Pre-Shared Key or WPA2-PSK protocol, which utilizes SSID and password. Despite using security mechanisms such as WPA2-PSK, criminal activities such as intrusion into the network still occur. Therefore, it is necessary to improve the network security system to ensure that the WLAN network is more secure and can minimize potential risks to users. This study aims to improve and optimize the WLAN network security system through vulnerability scanning using the Nessus tool to test the level of security on the WLAN network and the application of hardening methods to strengthen and disguise vulnerabilities on the WLAN network, which includes various security techniques such as applying raw firewalls and firewall filters, limiting ports and services used and disabling services that are not needed to minimize vulnerabilities, disabling the Mikrotik neighbor discovery protocol service on the router, and implementing port knocking as an additional layer of security. The results of the study show that applying vulnerability scanning techniques and hardening methods can help minimize the level of risk of vulnerabilities found and make the resilience of the WLAN network more optimal so as to avoid potential intrusions and threats of attacks.
SIMULASI PERBANDINGAN MANAGEMENT BANDWITDH MENGGUNAKAN TEKNIK QUEUE TREE DAN PCQ Rahmat Novrianda Dasmen; Daud Rusdi; Rasmila
Tech-E Vol. 9 No. 1 (2025): TECH-E (Technology Electronic)
Publisher : Fakultas Sains dan Teknologi-Universitas Buddhi Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31253/te.v9i1.3374

Abstract

The IT services at PSP Pusri Building are equipped with adequate internet network facilities. However, the distribution of bandwidth across the network is uneven, which leads to bandwidth contention among users and consequently slows down internet connections. This issue arises due to the absence of specific upload and download limits for each room, which affects network stability. Managing upload and download speeds is crucial for efficient data transmission, and bandwidth management is needed to address this problem. This study employs an action research methodology, which includes the stages of Diagnosis, Action Planning, Action Taking, Evaluating, and Specifying Learning. The research focuses on improving network performance by implementing bandwidth management. The Per Connection Queue (PCQ) tree and queue techniques are applied to organize data flow based on priority, ensuring better distribution of bandwidth across all rooms. The results of simulations conducted during the bandwidth management application show significant improvement. The implementation effectively reduces the congestion issues in each room by providing an equal distribution of bandwidth. By using these management techniques, the IT services in the PSP Pusri Building can ensure a more stable and efficient network, improving the overall internet experience for users. This approach not only resolves existing bandwidth issues but also serves as a model for future network improvements. The study highlights the importance of careful bandwidth management in maintaining optimal network performance, especially in environments with multiple users and varying data demands.