Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Media Computer Science

The Implementation Of Modern Cryptography On Document Data Security Triza Randes Syafutra; Khairil Khairil; Eko Suryana
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2742

Abstract

The aspect of data security has become a very important aspect of an information system. Many people start looking for ways to secure data or information, because global computing has become insecure and often escapes the attention of computer users and is starting to become a very serious issue. So, we need a way to secure confidential and important data. One of the cryptography methods that can be used is the RSA method. The RSA algorithm is one of the most popular public key algorithms used and is still used today. The strength of this algorithm lies in the exponential process, and factoring a number into 2 prime numbers which until now has taken a long time to factorize. The implementation of the system used the Visual Basic 2010 programming language and the method used in this research is an applied research method. Where the results of the tests that have been carried out are obtained where the RSA Algorithm can provide additional security to the document, this is because the text data owned by the user will be encrypted and replaced with a row of numbers that does not represent the contents of the original data.
Security System Implementation And Monitoring Networks At Sma N 10 City Of Bengkulu Refki Iqromullah; Khairil Khairil; Eko Suryana
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4431

Abstract

One of the systems to be able to carry out network security and monitoring can use a firewall and Graphana with the Ubuntu Server Linux operating system. In running the security system and monitoring the network using a firewall and Graphana it is supported by several other tools or applications such as Apache2, PHP and MySQL. So by using a security system and network monitoring can use a firewall and grafana can monitor and network security, where every activity in accordance with the settings given is carried out by grafana, then from the monitoring results an analysis will be carried out which activities are allowed and which are not allowed. Furthermore, from the results of this analysis, restrictions will be made using a firewall. Linux ubuntu server 20.04 is an open source operating system, the Linux ubuntu server 20.04 operating system is very good as a server for running security systems and monitoring networks, you can use firewalls and graphana because it doesn't require high hardware specifications and can also be obtained free of charge because it is open. sources.
Android-Based Cryptography Applications Using The Rail Fence Cipher Algorithm Raden Diky Zailani; Khairil Khairil; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4569

Abstract

Android-based cryptographic applications using the rail fence cipher algorithm are made using the Java programming language (AndroidStudio), the PHP programming language (JSON File Web Service) and the MySQL database. This application has a url link for storing PHP files and message data in the database, while the url link is http://railfencecipher.my.id/. An Android-based cryptographic application using the rail fence cipher algorithm has been uploaded to Google Playstore by entering the rail keyword fence cipher. An android-based cryptographic application using the rail fence cipher algorithm can be used to assist communication between the two parties, both the sender and the recipient of the message. In addition, this application has implemented a rail fence cipher algorithm that is used to maintain the confidentiality of the message stored in the application's database. The records in the message body column in the database are in random form, therefore they cannot be read. This of course makes the application maintain the confidentiality of the messages sent, because there is a process of scrambling (encryption) of the message. Based on the results of the tests that have been carried out, the functionality of the android-based cryptographic application using the rail fence cipher algorithm runs well as expected and the message sent between the recipient and the sender is kept confidential because the message is encrypted.
Designing A Computer Network Monitoring System With Sms Notification Using The Dude Riki Irawansyah; Khairil Khairil; Rizka Tri Alinse
Jurnal Media Computer Science Vol 3 No 1 (2024): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i1.5327

Abstract

One system that can monitor networks with notifications in the form of SMS is using The Dude. This network monitoring system with SMS Notification aims to enable network admins to know the condition of the network wherever they are.In monitoring the network, the dude can do it based on the IP address entered, the dude is open source, that is, it is one of the software or tools built into the proxy, in the installation process the dude does not require a large storage space. When monitoring the Dude's network, the indicator will display green, which is on and red, which is off. To monitor the Dude's network, it will be based on the IP Address of each device connected to the network.The Dude can carry out network monitoring on the SMA N 6 South Bengkulu computer network in the form of notifications of devices being on or off. The results of the monitoring will be sent in the form of a notification to the admin's cellphone in the form of an SMS. To send an SMS notification, the dude takes +/- 2 minutes. The time for sending this SMS notification is calculated based on the condition of the device being on or off until the notification is received or received. on HP.