Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Transformatika

Implementation And Analysis High Availability Network File System Based Server Cluster Chaerul Umam; L. Budi Handoko; Ghulam Maulana Rizqi
Jurnal Transformatika Vol 16, No 1 (2018): July 2018
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v16i1.841

Abstract

Server is a computer system that provides the kind of service in a computer network. One of the functions of the server is as data storage. Computers servers with high availability values are generally referred to as High Availability (HA) Server. HA enables a server can be operational in a sustainable manner for long periods of time. Now, HA has been combined with a cluster technique known as High Availability Clusters or failover cluster. In this research the author intends to apply, analyze, and implement a network file server that has a high availability of service. Researchers used a pacemaker as cluster resource management, Corosync as cluster messaging service and DRBD for the synchronization of data if a failover occurs and measured network performer cluster file system that does have a high availability service. The result is a network file system or the availability of the cluster has a value of 99.998% availability, which means it has a High Availability. The server network file system failover cluster meets the conditions, which, if the primary server (master) dies it will be replaced by a slave server.
Purwarupa Sistem Pemilihan Umum Elektronik dengan Pemanfaatan Protokol Ethereum pada Teknologi Blockchain Arianto, Eko; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 19 No. 1 (2021): July 2021
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v19i1.2746

Abstract

The development of information technology has penetrated various areas. This is driven by improved service, rapid increase in information needs and decision making. General elections that are held every time always leave problems about securities and speed of recapitulation. This is because the process is done in the traditional way. This research tries to apply blockchain technology to the e-Voting system security engineering process so that it creates a votes recapitulation process that is fast, accurate and accompanied by transparency values to maintain the reliability of the existing vote and maintain the confidentiality of the vote data being transacted. Transparency and confidentiality of voter data is a fundamental value in general elections or voting that must exist. Seeing this, blockchain technology deserves to be applied because the principles that needed can be met by applying this technology to the e-Voting system.
Analisa Forensik Kontainer Podman Terhadap Backdoor Metasploit Menggunakan Checkpointctl Sya'bani, Hafiidh Akbar; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 21 No. 2 (2024): Januari 2024
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v21i2.8109

Abstract

Container systems are type of virtualization technology with isolated environment. The isolated environment in container system does not make cyber attacks impossible to occur. In this research, containers in which a cyber incident occurred were forensically tested on the container's memory to obtain digital evidence. The forensic process is carried out using standards from NIST framework with the stages of collection, examination, analysis and reporting. The forensic process begins by performing a checkpoint on the container to obtain information from the container's memory. In Podman the checkpoint process is carried out on one of the containers and will produce a file in .tar.gz form, where this file contains the information contained in the container. After the checkpoint process is complete, forensics is then carried out by reading the checkpoint file using a tool called checkpointctl. Forensic results showed that the container was running a malicious program in the form of a backdoor with a PHP extension.