Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Media Computer Science

Comparative Analysis of Wireshark and Windump Software in Network Security Monitoring Julias Sulicdio; Toibah Umi Kalsum; Yode Arliando
Jurnal Media Computer Science Vol 1 No 1 (2022): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (966.917 KB) | DOI: 10.37676/jmcs.v1i1.1901

Abstract

Computer security is an important factor in the world of information technology. Computer network security is currently starting to be in great demand by many people. If viewed from the negative side, there will be more types of intrusion or attacks that can be carried out in a network. The aim of this research is the need for network security monitoring to find out disturbances or threats that occur in a network to minimize intrusion. And the results obtained from this research are wireshark and windump software is able to monitoring attacks on a network and software that is able to analyze in more detail is wireshark while windump for further analysis requires experts to get better results.
Rainfall Prediction In Bengkulu City Fuzzy Logic-Based Yessi Mardiana; Toibah Umi Kalsum; Yoli Andi Rozzi
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2853

Abstract

The purpose of this study is to predict the rainfall in the city of Bengkulu using fuzzy logic . The boundary problem in this research is a fuzzy method used is Fuzzy Method Sugeno , testing was conducted using the software Matlab version 2013a , the data used in this study is the rainfall data from October to December 2015 were taken from the Meteorology , Climatology and Geophysics , the Center for Meteorology , Climatology and Geophysics ( BMKG ) Bengkulu. Of a series of studies conducted with reference to the design of the block diagram of the results obtained in the form of cuara on the day or the future (tomorrow) with Sugeno mentode this is to conduct experiments for 7 days with accuracy levels of over 60%. From 7 days forecasting error occurred as much as 2 days
The Implementation Of Network Management And Security Using Mikrotik And Proxy Server At SMK N 3 Seluma Indra Saputra; Toibah umi Kalsum; Hendri Alamsyah
Jurnal Media Computer Science Vol 3 No 1 (2024): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i1.5422

Abstract

The aim of this research is to carry out computer network management and security at SMK Negeri 3 Seluma by using a proxy device and a sequid proxy server as an external proxy server. The research method used in this research is PPDIO method consisting of Prepare, Plan, Design, Implement, Operate and Optimize. The hardware used to configure network management is Mikrotik Roadboard, while the software used to configure network management and security is Winbox and Squid proxy server. The results of research on the implementation of network management were the formation of a network using a proxy configuration at SMKN 3 Seluma. toward network security, filtering of social media websites and websites suspected of containing viruses can be carried out according to the design and the blocking is successful.