Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Transformatika

Implementation And Analysis High Availability Network File System Based Server Cluster Chaerul Umam; L. Budi Handoko; Ghulam Maulana Rizqi
Jurnal Transformatika Vol 16, No 1 (2018): July 2018
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v16i1.841

Abstract

Server is a computer system that provides the kind of service in a computer network. One of the functions of the server is as data storage. Computers servers with high availability values are generally referred to as High Availability (HA) Server. HA enables a server can be operational in a sustainable manner for long periods of time. Now, HA has been combined with a cluster technique known as High Availability Clusters or failover cluster. In this research the author intends to apply, analyze, and implement a network file server that has a high availability of service. Researchers used a pacemaker as cluster resource management, Corosync as cluster messaging service and DRBD for the synchronization of data if a failover occurs and measured network performer cluster file system that does have a high availability service. The result is a network file system or the availability of the cluster has a value of 99.998% availability, which means it has a High Availability. The server network file system failover cluster meets the conditions, which, if the primary server (master) dies it will be replaced by a slave server.
Purwarupa Sistem Pemilihan Umum Elektronik dengan Pemanfaatan Protokol Ethereum pada Teknologi Blockchain Arianto, Eko; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 19 No. 1 (2021): July 2021
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v19i1.2746

Abstract

The development of information technology has penetrated various areas. This is driven by improved service, rapid increase in information needs and decision making. General elections that are held every time always leave problems about securities and speed of recapitulation. This is because the process is done in the traditional way. This research tries to apply blockchain technology to the e-Voting system security engineering process so that it creates a votes recapitulation process that is fast, accurate and accompanied by transparency values to maintain the reliability of the existing vote and maintain the confidentiality of the vote data being transacted. Transparency and confidentiality of voter data is a fundamental value in general elections or voting that must exist. Seeing this, blockchain technology deserves to be applied because the principles that needed can be met by applying this technology to the e-Voting system.
Analisa Forensik Kontainer Podman Terhadap Backdoor Metasploit Menggunakan Checkpointctl Sya'bani, Hafiidh Akbar; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 21 No. 2 (2024): Januari 2024
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v21i2.8109

Abstract

Container systems are type of virtualization technology with isolated environment. The isolated environment in container system does not make cyber attacks impossible to occur. In this research, containers in which a cyber incident occurred were forensically tested on the container's memory to obtain digital evidence. The forensic process is carried out using standards from NIST framework with the stages of collection, examination, analysis and reporting. The forensic process begins by performing a checkpoint on the container to obtain information from the container's memory. In Podman the checkpoint process is carried out on one of the containers and will produce a file in .tar.gz form, where this file contains the information contained in the container. After the checkpoint process is complete, forensics is then carried out by reading the checkpoint file using a tool called checkpointctl. Forensic results showed that the container was running a malicious program in the form of a backdoor with a PHP extension.
Co-Authors ., Muslih Abdus Salam, Abdus Abdussalam Abdussalam Abu Salam Abu Salam Acun Kardianawati Ade Surya Ramadhan Adelia Syifa Anindita Aisyah, Ade Nurul Aisyatul Karima Aisyatul Karima Ajib Susanto Al zami, Farrikh Alzami, Farrikh Andi Danang Krismawan Ardytha Luthfiarta Ari Saputro Ari Saputro, Ari ARIANTO, EKO Ariya Pramana Putra Ariyanto, Noval Budi Harjo Budi, Setyo Cahaya Jatmoko Chaerul Umam Chaerul Umam Chaerul Umam Chaerul Umam Chaerul Umam Christy Atika Sari De Rosal Ignatius Moses Setiadi Eko Hari Rachmawanto Elkaf Rahmawan Pramudya Erwin Yudi Hidayat Erwin Yudi Hidayat Etika Kartikadarma Fauzi Adi Rafrastara Fikri Firdaus Tananto Fikri Firdaus Tananto Filmada Ocky Saputra Firman Wahyudi, Firman Ghulam Maulana Rizqi Guruh Fajar Shidik Hafiidh Akbar Sya'bani Hanif Setia Nusantara Hanny Haryanto Hasan Aminda Syafrudin Hendy Kurniawan Herfiani, Kheisya Talitha Irfannandhy, Rony Irwan, Rhedy Isinkaye, Folasade Olubusola Izza Khaerani Ja'far, Luthfi Junta Zeniarja Karima, Nida Aulia Khafiizh Hastuti Khafiizh Hastuti Lucky Arif Rahman Hakim Maulana Ikhsan Megantara, Rama Aria Mira Nabila Mira Nabila Muhammad Jamhari Muslih Muslih Muslih Muslih Nurhindarto, Aris Ocky Saputra, Filmada Oki Setiono Pulung Nurtantio Andono Raihan Yusuf Rama Aria Megantara Ramadhan Rakhmat Sani Reza Pahlevi, Mohammad Rizky Rizqy, Aditya Rofiani, Rofiani Saputra, Filmada Ocky Saputri, Pungky Nabella Sarker, Md. Kamruzzaman Sendi Novianto Silla, Hercio Venceslau Soeleman, M Arief Sya'bani, Hafiidh Akbar Umi Rosyidah Valentino Aldo Wellia Shinta Sari Wildanil Ghozi