Claim Missing Document
Check
Articles

MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX Kristopedus Zonggonau; Haruno Sajati
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.955 KB) | DOI: 10.28989/compiler.v4i1.87

Abstract

The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.
DETEKSI JERAWAT PADA WAJAH MENGGUNAKAN METODE VIOLA JONES Haruno Sajati; Yuliani Indrianingsih; Puspa Ira Dewi Candra Wulan
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (224.202 KB) | DOI: 10.28989/compiler.v5i1.103

Abstract

Acne is a skin disease that most often grow in the face and very disruptive to affect the appearance of a person's face. Viola Jones is one method to help detect acne so someone get information about the state of the face and immediately overcome. Viola Jones Method has three main processes integral image is used to determine whether there is a feature haar particular in an image, the method adaboost machine learning is used to select features haar specific that will be used to adjust the threshold value, and a cascade classifier as the classification of the final determining regions the face in the picture. Testing of 30 samples, the results obtained showed that the method is less accurate Viola Jones is used as a method of detection of acne with results average 25 % the percentage of common acne, blackheads 0 % and 45% of cystic acne. The number of samples used to create xml greatly affect the results of detection.
Uniform Resource Locator (URL) Detection Security System Based on Android Haruno Sajati; Harliyus Agustian; Eko Murdiansyah
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (613.013 KB) | DOI: 10.28989/compiler.v8i1.343

Abstract

The use of the internet, which is currently increasing dramatically, certainly brings the convenience of finding information. The increase in internet usage also eventually gave rise to cybercrime crimes, one of which was by spreading a URL or fake site to steal someone's personal data. The research done is how to build an Android-based application that can detect the security of a URL. The goal is that internet users, especially social media, can avoid cybercrime crime that wants to steal personal data. Making an application uses the Regular Expression method to analyze each line of the Webpage Source Code in the URL based on 8 criteria taken from the World Wide Web Consortium (W3C). The application was then tested with 10 phishing-charged URLs and compared with Kaspersky, McAfee, and AdBlock applications. Based on the results of trials and comparisons, applications that have been made are able to detect 6 or 60% of the 10 URLs. Kaspersky and McAfee applications can detect 70%, while AdBlock only detects 3 or 30% of 10 URLs that contain phishing.
ALGORITMA MASIH MUSLIATUN (MM) UNTUK MENDUKUNG SISTEM OTOMATISASI PENDAFTARAN PRAKTIKUM DENGAN PENGUJIAN PADA JARINGAN KOMPUTER (STUDI KASUS DI STTA YOGYAKARTA) Masih Musliatun; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.016 KB) | DOI: 10.28989/compiler.v2i1.38

Abstract

Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless  effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.
PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST) Demmy Nanda Awangga; Haruno Sajati; Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.762 KB) | DOI: 10.28989/compiler.v2i2.49

Abstract

Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.
PENERAPAN SISTEM KEAMANAN MENGGUNAKAN CRYPTOGRAPHY PADA APLIKASI CHATTING DENGAN MEMODIFIKASI ALGORITMA RIVEST SHAMIR ADLEMAN (RSA) Muttaqin Muttaqin; Haruno Sajati; Nurcahyani Dewi Retnowati
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.434 KB) | DOI: 10.28989/compiler.v3i1.66

Abstract

Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario.  Whereas process testing encryption  and decryption using tools wireshark.
Pendampingan Pengenalan Metode Pengetikan Cepat Menggunakan Microsoft Word Bagi Siswa Kelas 5 SD IT Salsabila Al Muthi’in Yogyakarta Dwi Nugrahenny; Hero Wintolo; Anggraini Kusumaningrum; Sudaryanto Sudaryanto; Haruno Sajati
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 2, No 1 (2019): Januari
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v2i1.406

Abstract

Teknologi Informasi dan Komunikasi (TIK) pada jaman sekarang sangat dibutuhkan oleh setiap masyarakat baik itu orang dewasa maupun anak-anak. Khusus pada anak-anak, sangat dibutuhkan pelatihan penggunaan perangkat teknologi informasi dan komunikasi agar nantinya anak-anak dapat memanfaatkannya dengan baik. Salah satunya adalah dengan mengenalkan penggunaan aplikasi pengolah kata yaitu Microsoft Word. Microsoft Word adalah aplikasi pengolah kata yang sangat populer pada saat ini, dengan aplikasi tersebut dapat memudahkan kerja manusia dalam melakukan pengetikan surat maupun dokumen lain. Anak-anak dapat diajarkan aplikasi tersebut guna mendukung kesehariannya dalam kegiatan akademik di sekolah. Kegiatan pengabdian pada masyarakat semester ini dititikberatkan dalam bentuk Pendampingan Pengenalan Metode Pengetikan Cepat menggunakan Software Microsoft Word 2010 bagi siswa-siswi kelas 5 di SDIT Salsabila Al Muthi’in Yogyakarta. Diharapkan adanya pedampingan tersebut, siswa/siswi dapat lebih mengetahui tentang bagian-bagian Aplikasi Microsoft Word dan penggunaannya sehingga dapat membantu saat pengerjaan tugas sekolah maupun meningkatkan kreativitas. Hasil dari kegiatan pengabdian yang dilaksanakan memberikan pengalaman dan ketrampilan pada para siswa di SDIT Salsabilla Al-Muthi’in dalam menggunakan aplikasi Microsoft Word 2010.
Pendampingan Pemasaran Produk Menggunakan Instagram Bagi Pelaku Usaha Mikro Kecil Menengah (UMKM) di Kecamatan Pathuk Gunung Kidul . Sudaryanto; Haruno Sajati; Anggraini Kusumaningrum; Dwi Nugraheny; Salam Aryanto; Hero Wintolo
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 3, No 1 (2020): Januari
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v3i1.524

Abstract

Micro, Small, Medium Enterprises (MSME) products in the Pathuk District of Gunung Kidul Regency covering of food, crafts and tourism. The SMEs living in the villages of Pathuk, Salam, Ngoro ngoro, Terbah, Nglanggeran, Semoyo, Pengkok, Putat, Bunder, and Nglegi attended training held at the Office of the Village Cooperation Agency (BKN) Pathuk District. Some participants have products that already have a Food License for Home Industry. The market asistance using Instagram for social media material involved alumni and students from the Adisutjipto College of Information Technology Department. The results in the form of marketing and promotion using Instagram with the hashtag #pkmdepartemeninformatikastta with good criteria results of 27.8%, enough by 61.1% and less good by 11.1%
Pengembangan Kewirausahaan Bagi UP2K-PKK Kelurahan Prawirodirjan Gondomanan Yogyakarta Untuk Mendukung Pemasaran Produk Menggunakan Instagram Salam Aryanto; Sudaryanto Sudaryanto; Haruno Sajati; Anggraini Kusumaningrum; Dwi Nugraheny; Hero Wintolo
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 2, No 2 (2019): Juli
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v2i2.442

Abstract

Pengabdian pada masyarakat ini difokuskan pada ibu-ibu guna Upaya Peningkatan Pendapatan Keluarga PKK (UP2K PKK) yang merupakan salah satu program penanggulangan kemiskinan dengan sasarannya kaum perempuan di Kelurahan Prawirodirjan Kecamatan Gondomanan Kotamadya Yogyakarta Propinsi Daerah Istimewa Yogyakarta. Permasalahan yang dihadapi oleh ibu-ibu Upaya Peningkatan Pendapatan Keluarga PKK (UP2K PKK) diantaranya adalah melakukan inovasi baik produk, kemasan dan jaringan pemasaran. Dari hasil pelatihan dan pendampingan, 75% atau 21 peserta pengabdian masyarakat memiliki kemampuan yang baik dalam teknik pemasaran produknya, dan dari 21 peserta tersebut sebanyak 14% sangat aktif dalam melakukan pemsaran melalui instagram.
Pendampingan Pengolahan Video Menggunakan Software Video Editing bagi Karang Taruna Kecamatan Patuk Kabupaten Gunungkidul Dwi Nugraheny; Haruno Sajati; Salam Aryanto; Anton Setiawan Honggowibowo
E-Dimas: Jurnal Pengabdian kepada Masyarakat Vol 13, No 2 (2022): E-DIMAS
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/e-dimas.v13i2.5853

Abstract

Kawasan wisata Gunungkidul memiliki daya tarik wisata yang sangat tinggi. Jumlah wisatawan mengalami peningkatan yang cukup signifikan setiap tahunnya. Hal ini disebabkan beberapa faktor yang mendukung daya tarik wisata seperti keindahan alam, sarana dan prasarana di lokasi wisata, biaya yang terjangkau, kondisi lingkungan, lokasi yang strategis dan dukungan sistem transportasi. Peningkatan ini dapat meningkatkan pendapatan daerah secara umum dan warga sekitar obyek wisata. Obyek wisata di Gunungkidul sangat beragam seperti wisata pantai, goa, cave, taman bunga, sungai, air terjun, embung, waduk, gunung api purba, dan lain-lain. Obyek-obyek ini dapat dipromosikan oleh Karang Taruna di Patuk Gunungkidul menggunakan media video guna pemasaran obyek wisata. Teknik editing dan teknik impor video diperlukan sehingga terbentuk video utuh yang menarik. Hasil nilai pendampingan untuk kegiatan mengimpor video diperoleh nilai “baik” sama dengan 85%, penilaian “cukup” sama dengan 15% dan untuk penilaian kurang adalah 0%. Sedangkan untuk teknik menggunakan tools editing pada video oleh Karang Taruna di Kecamatan Patuk bahwa penilaian “baik” adalah 69% dan penilaian “cukup” adalah 31%, sedangkan penilaian “kurang” 0%.
Co-Authors . Sudaryanto Afrizal Triantoro Agustian, Harliyus Aldri Frinaldi Alfian Firdaus Anarianto, Donny Andaruwati, Ragil Andaruwati, Ragil Anggi Sri Septiani Suhendar Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Antok Hermawan Anton Honggowibowo Anton Setiawan Honggowibowo Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika Ayuningtyas Astika AyuningTyas, Astika Awangga, Demmy Nanda Bagus Budi Utomo Bambang Sudibya Bambang Sudibya, Bambang Bayu Sugara Brama Ady Sulistiyo Cakra Aminuddin Hamka Candra Wulan, Puspa Ira Dewi Demmy Nanda Awangga Dewi Retnowati, Nurcahyani Dwi Kholistyanto Dwi Nughraheny Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Eko Cahyo Nugroho, Eko Cahyo Eko Murdiansyah Eko Poerwanto Elizabeth Nurmiyati Tamatjita Evi Wahyuningsih Fahlevi, Wildansyah Reza Fakhri Yahya, Muhammad Firdaus, Alfian Freddy Kurniawan Freddy Kurniawan Galih Andita Sukma Galih Dwi Wicaksono Hamka, Cakra Aminuddin HARLIYUS AGUSTIAN Hermawan, Antok Ida Ayu Putu Sri Widnyani Indro Lukito Irawaty, Mardiana Kholistyanto, Dwi Kristopedus Zonggonau Lasmadi, Lasmadi Latumaone, Yulis Robert Leonardo Tampubolon Lukito Edi Nugroho Lukito, Indro Maria Asumpta Deny Kusumaningrum, Maria Asumpta Deny Masih Musliatun Murdiansyah, Eko Musliatun, Masih Muttaqin Muttaqin Nova Adi Suwarso Nughraheny, Dwi Nur Hanifah Nur Hanifah Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nurdin, Riani Nuryatno, Edi Triono Okto Dinaryanto Pamungkas, Dedi Bintang Pujiastuti, Asih Puspa Ira Dewi Candra Wulan Ramdan, Ramdan Ridi Ferdiana Rizki Tanjung Salam Aryanto Setiawan, Yoris Sri Mulyani Sudaryanto Sudaryanto SUDARYANTO SUDARYANTO Sugara, Bayu Suhendar, Anggi Sri Septiani Sukma, Galih Andita Sulistiyo, Brama Ady Suwarso, Nova Adi Tanjung, Rizki Triantoro, Afrizal Utomo, Bagus Budi Wicaksono, Galih Dwi Wildansyah Reza Fahlevi Wintolo, Hero Wiyasa, Ega Ari Yenni Astuti Yenni Astuti, Yenni Yoris Setiawan Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yulis Robert Latumaone Zonggonau, Kristopedus Zulham Zulham