Claim Missing Document
Check
Articles

Found 13 Documents
Search

Pengenalan NAS (Network Attached Storage) untuk Penyimpanan Data Terpusat pada Paguyuban Kebon Manggis Ika Mei Lina; Gilang Ryan Fernandes
Natural: Jurnal Pelaksanaan Pengabdian Bergerak bersama Masyarakat. Vol. 3 No. 1 (2025): February: Natural: Jurnal Pelaksanaan Pengabdian Bergerak bersama Masyarakat
Publisher : Asosiasi Riset Ilmu Kesehatan Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/natural.v3i1.912

Abstract

Paguyuban is an organization of togetherness in a particular social group. This paguyuban is a family welfare coach that strives not only to educate residents, but also to foster and build families in the mental, spiritual and physical material fields as well as improving the quality of food, clothing, shelter, health, and the environment. Paguyuban Kebon Manggis has so far had difficulty in filing data. Along with the development of the paguyuban kebon mangosteen, the amount of data produced by the paguyuban has also increased. This has an impact on the need for data storage. Therefore, the community service proposal team considered it necessary to provide an understanding of the use of NAS (Network Attached Storage) to make it easier for paguyuban members to manage the increasing data. NAS (Network Attached Storage) servers are built to serve the needs of data files that can be accessed via a local area network with the TCP/IP protocol. This activity was carried out in front of the members of Paguyuban Kebon Manggis which was designed in 2 sessions. The first material was the socialization of the introduction of NAS and the second material was about the implementation of the use of NAS (Network Attached Storage). This PKM activity uses presentation methods, application simulations, and direct practice for participants assisted by the team. Then to make it easier, examples are given and opportunities for questions and answers are opened for PKM participants.
Website Penetration Testing With SQL Injection Technique Using SQLMAP on Termux Gilang Ryan Fernandes; Ika Mei Lina
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2074

Abstract

Websites make it easier for us to find information or do our daily work. Almost all companies have websites, be it company profiles or application websites. With the development of technology, some programmers forget about website security. Websites with security weaknesses can be easily hacked, such as changing appearance to taking essential data. One thing to watch out for is external factors in the form of attacks carried out by hackers using the SQL Injection technique. This technique can find and take all databases stored on the website server. The purpose of this study is so that programmers and companies, in general, can be more careful with this attack so as not to experience losses from both the company and the consumer side. The results obtained in this study show that SQL injection attacks can cause significant losses because they can modify and take over the database on the attacked website. This tool also runs automatically so that laypeople without an understanding of hacking can carry out this attack. Thus, programmers can secure their websites using techniques to secure SQL Injection attacks.
Implementasi Open Source Intelligence (OSINT) dalam Pencarian Lokasi dengan Teknik Phising Ika Mei Lina; Gilang Ryan Fernandes; Fauzan Natsir
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 8, No 5 (2025): Oktober 2025
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v8i5.9860

Abstract

Abstrak − Pertumbuhan teknologi pada era digital saat ini sangat berkembang pesat, dapat dilihat pada kehidupan kita sehari-hari bahwa teknologi menjadi kebutuhan pimer dikarenakan sangat membantu dan berperan serta dalam mempermudah pekerjaan dan komunikasi. Dengan berkembangnya kemajuan teknologi saat ini membuat ancaman cyber semakin banyak. Salah satu ancaman cyber yang sering dijumpai dalah penipuan di sosial media dengan Teknik social engineering. Pelaku penipuan sangat sulit ditangkap dikarenakan mereka menggunakan aplikasi sosial media yang sudah teruji keamanan datanya. Oleh karna itu kesadaran tentang keamanan data dan ancaman cyber perlu dilakukan untuk mengantisipasi hal-hal serupa. Tujuan dari penelitian ini adalah untuk menemukan lokasi penipu menggunakan metode OSINT agar kita dapat menindaklanjuti kepada pihak terkait, dengan begitu kita bisa mengantisipasi dan menemukan lokasi penipu. Teknik ini digunakan untuk membalik keadaan sehingga penipu bisa terkena perangkap dan menemukan lokasinya. Hasil yang didapat dari penelitian ini adalah metode OSINT dengan Teknik phishing dalam menemukan Lokasi target atau penipu menggunakan tools Seeker dapat berjalan dengan baik ketika penipu membuka link yang diberikan untuk dapat menemukan lokasi penipu saat itu.Kata Kunci: Seeker; Termu; Ngrok; OSINT; Phishing; Abstract − The growth of technology in the current digital era is developing very rapidly, it can be seen in our daily lives that technology has become a primary need because it is very helpful and plays a role in facilitating work and communication. With the development of technological advances today, cyber threats are increasing. One of the cyber threats that is often encountered is fraud on social media with social engineering techniques. Fraudsters are very difficult to catch because they use social media applications that have proven their data security. Therefore, awareness of data security and cyber threats needs to be done to anticipate similar things. The purpose of this study is to find the location of the fraudster using the OSINT method so that we can follow up with the relevant parties, so that we can anticipate and find the location of the fraudster. This technique is used to reverse the situation so that the fraudster can be trapped and find his location. The results obtained from this study are the OSINT method with the phishing technique in finding the target location or fraudster using the Seeker tool can work well when the fraudster opens the link provided to be able to find the location of the fraudster at that time. Keywords: Seeker; Termux; Ngrok; OSINT; Phishing;