Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Compiler

CLUSTERING FILE TERDISTRIBUSI Yenni Astuti; Muhammad Harikem Ali Akbar
Compiler Vol 4, No 2 (2015): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.261 KB) | DOI: 10.28989/compiler.v4i2.90

Abstract

The development of information technology is increasing at this time, certainly makes it easy for users of the technology itself. One of them in transferring files in a distributed manner, there are many types of files that make it difficult admin in selecting and classifying the file and then will be distributed to each - its own servers. By creating a new system that will facilitate Clustering distributed file an admin in file transfer without having to select the files to be distributed, because the system will automatically read from the file types that will be distributed on its own servers - each.
PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING Anggi Sri Septiani Suhendar; Haruno Sajati; Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.818 KB) | DOI: 10.28989/compiler.v2i2.47

Abstract

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.
PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST) Demmy Nanda Awangga; Haruno Sajati; Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.762 KB) | DOI: 10.28989/compiler.v2i2.49

Abstract

Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.
PEMANFAATAN HISTORY PADA BROWSER KOMPUTER UNTUK MENENTUKAN PEMILIHAN WEBSITE ATAU BLOG PADA SEOINDONESIA Ketut Agus Adi Arlina; Yenni Astuti
Compiler Vol 3, No 2 (2014): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (187.771 KB) | DOI: 10.28989/compiler.v3i2.72

Abstract

Seoindonesia is a web based application that is used to boost the ratings visitors of website or blog using Together in Single Connection (TSC) technique. In this software, the selection of blogs or websites that would be raised using a lowest ratings pattern. Website or blogs listed on Seoindonesia opened by random with choosing some websites or blogs that has the lowest ratings. The selection of a websites or blogs randomly, causing discomfort to the user side. One way to access and improve seoindonesia is to use history on the browser. History on the browser is a facility to record and store data of story browsing and use of the internet search history. Utilization history on browser can only be accessed by using the extension. Extensions is a plug-in applications that have a specific function and can be installed on a computer's browser. Web browser noted most frequently visited of history or blog and than sent to the extensions can be used to direct the opening of a new website or blog address in accordance with the categories of the previous website address. Website or a blogsposted by extension,is a member of seoindonesia, so it can increase the number of visitors who will rise the rank, with an increase of 64% (7 points) and 36% (4 points) decreased with the overall function of the test is 11 points in seo alexa rank.Application development by using a browser on computer,able to improve the system seoindonesia on the grouping and categorizing of website or blog.