Claim Missing Document
Check
Articles

ANALYSIS OF ZEROTIER'S USAGE DURING THE COVID-19 PANDEMIC Stefanus Eko Prasetyo; Frans Hadinata; Haeruddin Haeruddin
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

During this COVID-19 pandemic, most office employees are required to implement health protocols such as washing hands, wearing masks, and social distancing. The application of health protocols in the world of work can be in the form of Work From Home. Work From Home is one way to implement social distancing to reduce the spread of the coronavirus or COVID-19. In this case, employees find it difficult to access office data. For this reason, secure technology such as VPN is needed to connect the office network to the home network so that every employee can access the data in the office. With the hope that these employees can work productively even though they are not in the office. That technology is ZeroTier. ZeroTier is a technology that allows connecting personal devices and other devices without having to be in a close location. Devices also don't have to be connected to the same network to use ZeroTier. The method used in this research is the Network Development Life Cycle. With the results of the research that ZeroTier's extensive scalability and operating system support are quite varied, it is possible for every end-user who has an internet network to connect to the same ZeroTier server network. That way each end-user can communicate directly like being on a local network such as pinging, file sharing, or printer sharing.
IMPROVEMENT WEBSITE SECURITY SYSTEM USING OWASP METHOD Haeruddin Haeruddin; Hermanto Hermanto
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Website service has become a Cross-Platform that is most often used by everyone to get the information they need. Website is a site that is published on the internet and can be accessed by all internet users, so security system is very important to keep the website safe from the threat of hacker attacks. Therefore, it is necessary to test the security of website services. In testing the website security system vb the method used is Open Web Application Security Project (OWASP). OWASP is an open source framework that serves to provide information on security vulnerabilities and recommendations for improvements that can be made to web-based services. This method has become a guide for analyzing and checking the security of a website. With this analysis, we can find out the risk of threats that arise on a website service and make it easier to take preventive actions based on the recommendations that have been obtained
Smart Home Network Desıgn Usıng The Network Development Lıfe Cycle Method Haeruddin Haeruddin; Tiara Tiara
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 1 No 1 (2021): Conference on Management, Business, Innovation, Education and Social Sciences (Co
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this modern era, almost all electronic devices can be connected to a computer network. Not only electronic items such as smartphones, laptops, computers, household appliances can also be connected to a computer network. This is all thanks to the concept of a smart home which allows us to build any device in the home just by talking without supervision, and we can manage it through our closest device. Our life is easier because we do not need to exert much energy anymore. The purpose of this research is how to design and implement a network for a smart home using the Network Development Life Cycle method. This network design is connected to smart home devices such as routers, smart speakers, smart lamps, smart TVs, smartphones, and laptops. The interconnection media used are wired and wireless. The network to be implemented as a security system that is one of the accesses to IoT users and devices and has bandwidth settings so that all devices get bandwidth allocation so that they can be accessed easily
Analisa Perbandingan Fungsi Efektivitas Cloud Management Platform OpenNebula Dan Eucalyptus Haeruddin .; Agusyanto .
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 1 No 1 (2021): Conference on Management, Business, Innovation, Education and Social Sciences (Co
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud Management Platform or CMP have an important role to provide maximum services for management device on premises and virtualization devices at utmost efficiency and under control. There are many types of CMP that can be use in any Cloud Computing Provider. However, choosing the right CMP, can provide accessibility on system management, such as expandability, cost, resource management, system durability and performance produced by the system. This analysis study is using Literature Review method to provide theoretical comparisons through the studies that have been researched by previous researchers. With this research study, Cloud Service Manager can choose the right CMP that suits their needs.
ANALYSIS OF MPLS L3 AND MPLS L2 VPN NETWORK USE DURING THE COVID-2019 PANDEMIC TO SUPPORT WORK FROM HOME Haeruddin Haeruddin; Efendi Efendi
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

From the end of 2019 to 2021 the coronavirus (COVID-19) had hit most countries, the use of information and communication technology as a guide in social distancing restrictions proposed by the government and the health department during the pandemic. The purpose of this study is how to implement and compare the use of MPLS VPN L3 and L2 networks during the COVID-19 period to support the world of education and industry by using implementation parameters, Quality of Service (QoS), security, and scalability. In this research, the method used is the Network Development Life Cycle (NDLC), using several stages, namely analysis, design, implementation, and monitoring. The results of this study provide an overview of the world of education and industry in determining and implementing MPLS technology that suits their needs.
Analisa dan Perancangan Proxy Server dan Catching SSL menggunakan Squid Haeruddin .; Vincent .
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 1 No 1 (2021): Conference on Management, Business, Innovation, Education and Social Sciences (Co
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet telah menjadi sarana pertukaran informasi dan komunikasi yang dapat menunjang produktivitas secara luas, hampir semua instansi terhubung ke layanan internet. Namun dikarenakan alokasi budget yang minim terhadap layanan internet hasil yang diterima tidak maksimal. Proxy server merupakan perantara yang berfungsi sebagai memenuhi permintaan client dengan menggunakan squid di ubuntu server dapat memberikan perfoma akses internet yang lebih baik kepada client. Studi ini menggunakan metode NDLC (Network Development Life Cycle) untuk melakukan perancangan proxy server dan implementasi squid di ubuntu server.
Network Design To Improve Network Quality At Pt. Batam Teknologi Gas Haeruddin Haeruddin; Alzi Alzi
ConCEPt - Conference on Community Engagement Project Vol 1 No 1 (2021): Conference on Community Engagement Project
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network security is currently a very important issue and continues to grow. Development of computer technology, besides causing many benefits also have many bad side. One of them is an attack on computer systems connected to the Internet. As a result of the attack, many computer systems or networks disrupted even be damaged. Given these problems, then as soon as possible we must immediately secure computer networks from attack. Untangle is a Linux distribution that is used as a regulator of tissue. Untangle is an open source first terintegerasi to deal with spam, spyware, viruses, adware, web-filtering and report. Based on Debian Linux with supporting JAVA applications. Untangle Server delivers the ease in securing, controlling and monitoring of computer networks. Ease is a technology that is needed to secure from threats such as viruses and spyware, web access and control over the availability of the report of the Untangle Server to perform a system analysis. Everything is packaged within an interface / GUI (Graphical User Interface). Untangle is very handy and has a full feature in managing and securing the network from LAN to WAN scale.
Rancangan Dan Konfıgurası Jarıngan Pada PT. Samudera Idola Rahayu Haeruddin Haeruddin; Efendi Efendi
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 1 No 1 (2021): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A computer network is a very important requirement in a company, a network that is not managed will reduce the level of security and function of the network. The importance of management on the internet network in an agency so that the network that is created is centralized or well managed. The author uses Mikrotik to manage networks in companies that have 2 different providers and combine networks using a bridge and DHCP server as a configuration that will be applied and if one of the networks has problems, one of the internet providers can be a network backup. The author uses the Network Development Life Cycle (NDLC) method as a network design flow, the stages of the Network Development Life Cycle (NDLC) method that the author uses include several stages such as: Analysis, Design, Implementation, Monitoring the following stages will be the author's stage in designing the network. By using the Network Development Life Cycle (NDLC) method, it can make it easier for the author to determine the stages that will be carried out by the author
Analisa dan Implementasi Controller untuk Device PTMP Menggunakan Cloud UISP pada PT. Bandar Abadi` Haeruddin Haeruddin; Kelvin Kelvin
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 1 No 1 (2021): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A wireless network is a network that uses electromagnetic waves as the transmission medium. Wireless networks have advantages over wired transmission media such as ease of installation, expansion, and lower costs. In wireless networks there are several topologies that are commonly used, namely Point to Point and Point to Multipoint. This topology uses at least 2 devices to transmit data. This in turn makes it difficult to manage devices because of the large number of devices needed. To overcome this issue, the author uses a Controller, namely Cloud UISP to manage all existing PTMP devices. With this device, it enables IT to detect, register and configure PTMP devices all in one place. In designing this network the author uses Network Development Life Cycle (NDLC) method. The results of this implementation make it easier for IT to manage all Ubiquiti PTMP devices in the company.
Implementasi Website Profile Perusahaan JasaKonfig untuk Mendukung Pemasaran Digital Haeruddin Haeruddin; Stefanus Eko Prasetyo; Jemmy Jemmy; Avista Mindy
Madani: Jurnal Pengabdian Masyarakat dan Kewirausahaan Vol 1 No 4 (2023): Juli 2023
Publisher : LPPM Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/madani.v1i4.7717

Abstract

Kemajuan teknologi yang semakin pesat, membuat tren di dunia bisnis juga semakin berkembang, salah satunya yaitu Digital Marketing. Digital Marketing merupakan pemasaran produk atau layanan melalui perangkat elektronik atau internet, menggunakan saluran digital seperti media sosial, email, dan webssite agar terhubung dengan pelanggan. Ini sangat cocok diterapkan pada Jasa Konfig penyedia layanan jasa IT yang ada di Kota Batam. Pada perusahaan ini melayani berbagai macam keluhan yang sedang dialami oleh customer, dan menyediakan berbagai macam layanan, mulai dari service komputer, jaringan dan berbagai macam lainnya yang bertujuan untuk membantu perusahaan mengoptimalkan sistem IT mereka untuk mencapai tujuan bisnis. Digital marketing dapat membatu perusahaan ini agar dapat di kenal oleh masyarakat luas dalam waktu yang cepat. Untuk menerapkan digital marketing salah satu yang harus disiapkan adalah website. Pada kegiatan ini akan di buat website Profile Perusahaan Jasa Konfig, konten website dan Search Engine Optimation (SEO).