Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : TEKNOLOGI INFORMASI

APLIKASI SISTEM PAKAR DIAGNOSIS KERUSAKAN HARDWARE KOMPUTER DENGAN METODE FORWARD CHAINING Arifin, Samsul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Not all owners and computer technicians can diagnose early damage to computer hardware properly and appropriately. Errors in the diagnosis process will certainly bring harm to the owner of a computer or computer technicians. Based on these facts, researchers designed a diagnostic expert system computer hardware damage, in the hope of this expert system can assist them in diagnosing damage to computer hardware like an expert.In damage to computer hardware, the symptoms appear can not be used to determine the exact damage to computer hardware. These symptoms should be collected and to match each other, so that it can generate the appropriate conclusions. This process is called in an expert system by the method of forward chaining.The process of diagnosis expert system with forward chaining method can work well, the expert system application interface that is easy to use and informative, enabling the user to use and understand the contents of the information submitted in the application of expert system. Keywords : Expert systems, hardware damage, Forward Chaining
MEMBANGUN JARINGAN VIRTUAL PRIVATE NETWORK (VPN) DENGAN METODE TUNNELING MENGGUNAKAN MIKROTIK UNTUK KOMUNIKASI LOKAL DI STMIK PPKIA PRADNYA PARAMITA MALANG Habibi, Ahmad; Arifin, Samsul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 6 NO 2 TAHUN 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

MikroTik RouterOS ™ is the operating system and which can be used to make the computer even become a reliable network routers , includes a comprehensive range of features for network and wireless , one of the reliable features is a VPN ( Virtual Private Network ) .VPN ( Virtual Private Network ) is a way to create a network is " ptivate " and safe to use a public network , such as the Internet . In the world of computer networks known term tunnel , often called a tunneling technique . This technique allows a local network ( private ) associated with other local network , through a public network ( Internet ) . The data to be sent from one local network to another local network will be in the pack ( encapsulation ) by other protocols. Keywords : MikroTik, VPN (Virtual Private Network), Tunneling.
PENGEMBANGAN KEAMANAN SISTEM INFORMASI SST (SELF SERVICE TERMINAL) STMIK PRADNYA PARAMITA MALANG Widarti, Dinny Wahyu; Arifin, Samsul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 7 NO 2 Tahun 2016
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information System Security is essential to ensure the proper functioning of the information system. Weak information system security may result that other people who do not have the right can be entered into the system information without passed the security and perform activities that can damage or destroy data on the information system, even can destroy that information system itself. On one side, security of the information system needs to be improved, like in login process to get into the information system. Login process becames a tool to pave the ways for someone to infiltrate into the information system. There are several ways to do so that login process to be secure, such as anti SQL Injection and Verification login with SMS Gateway. Expected by using the login process with anti SQL Injection and Verification login with SMS Gateway can reduce the occurrence of fraud against Information Systems in STMIK PPKIA Pradnya Paramita Malang. Keywords: Security, Information Systems, and SMS Gateway
APLIKASI PLUGIN TRANSFER DOMAIN DI PT BEON INTERMEDIA Arifin, Samsul; Krisnadita, Yolanda
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 8 NO 1 Tahun 2017
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. Beon Intermedia specializes in hosting and domain services. High reputation requires PT. Beon Intermedia to always work quickly and efficiently. But there are still obstacles in the Domain displacement activity, namely in the recording and checking for Domain transfer activities are still using conventional methods that take up to 7 days workmanship.To solve this problem, so we try a solution for an application / plugin that is embedded in the system in PT. Beon Intermedia. The plugin works automatically and continuously to the process for switching domain, check the status of the transfer and perform notifications. The plugin works in a way to grab the data from the system regristrar to update the progress status of the domain that you want to move. Our results, this plugin goes well, the process of switching domain by using this plugin can cut the time domain displacement of an advanced first 7 days to 4 days, so that the service becomes faster, recorded in the system and to work more efficiently. Keywords: Plugin, Domain Transfer
IMPLEMENTASI SISTEM KEAMANAN JARINGAN MENGGUNAKAN METODE PACKET FILTERING BERBASIS ASA 5520 PADA PT. XYZ Putra, Agung Triwicaksono; Setyowibowo, Sigit; Arifin, Samsul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. XYZ is one of the fourth largest cigarette producers in Indonesia with a market share of 7%. Has more than 40 marketing offices spread throughout Indonesia. Every branch offices have sales that using public internet to upload and download data from headquarter server’s. Constraints faced by PT. XYZ that public server used for upload and download process was down due to attacker from external network, causing disruption to sales team activities. Sales team can’t achieve the target to visit 6427 outlets from total 64980 outlets. The purpose of this research is to develop a network security system environment that able to protect internal servers of PT. XYZ from the threat both internal network and extenal. This study implemented using packet filtering method that applied to CISCO ASA 5520 device. The network security system that already implemented are able to protect the server from unauthorized security threats so it does not interfere sales team's operations. Keywords: Network Security, Packet Filtering, ASA 5520