Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Compiler

PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB Zuliana Zuliana; Hero Wintolo; Bambang Sudibya
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (142.647 KB) | DOI: 10.28989/compiler.v2i2.58

Abstract

Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
PERANCANGAN KEAMANAN SISTEM MENGGUNAKAN ALGORITMA HONEYPOT PADA APLIKASI KRS ONLINE (STUDI KASUS : SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO) Yoris Setiawan; Haruno Sajati; Bambang Sudibya
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (160.53 KB) | DOI: 10.28989/compiler.v2i2.56

Abstract

Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm.