Ilham Faisal
Universitas Harapan Medan, Indonesia

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Pelatihan Wondershare Filmora 9 Untuk Peningkatan Promosi UMKM profile Lab.Scarpe di Bandar Khalipah, Kec. Percut Sei Tuan, Kabupaten Deli Serdang, Sumatera Utara Haida Dafitri; Nur Wulan; Rachmat Aulia; Ilham Faisal; Adelia Atmaja
Jurnal TUNAS Vol 4, No 1 (2022): Edisi November
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jtunas.v4i1.84

Abstract

One of the determinants of the success of UMKM is the importance of promotion. Promotion can be done conventionally by making brochures, flyers or banners but can also be done digitally through mass media. Making a promotional video for UMKM profiles is one of the ways to promote to the public by utilizing digital promotions in the form of videos. In the new normal era, promotions in the digital field are in great demand, and services without leaving the house are an alternative that will be chosen by the public. This research is intended to introduce an UMKM in order to promote these UMKM digitally to help increase sales in order to improve the economy after the Covid-19 pandemic. Making an interesting UMKM Video Profile is one of them by using the Wondershare Filmora 9 video editor application, but unfortunately the owner and workers in the field of UMKM do not know the use and utilization of these applications. For this reason, the writer and the team were asked to provide training in making UMKM profiles with the Wondershare Filmora application. It is hoped that this training can help UMKM owners and workers provide ideas in making interesting and interactive UMKM video profiles so that later they can increase revenue and sales of UMKM Lab Scarpe Products in Bandar Khalipah, Percut Sei Tuan District, Deli Serdang Regency, North Sumatra. The training was carried out such as providing information and the use of Wondershare Filmora 9, in making UMKM video profiles.
Pemanfaatan Firewall dan Metode Queue Tree Sebagai Traffic Filtering Akses Pengguna Jaringan Internet ilham Faisal; T.M. Diansyah
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 1 (2024): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i1.323

Abstract

The use of internet networks that are not monitored and controlled with policies will certainly cause violations. Violations can include prohibited access, theft, and excessive bandwidth usage. Such as accessing sites that require bandwidth usage when opening online videos, games, downloading videos and so on. If in an office or workspace there are several computer users who do this, then other computers will experience problems with access to work. This research analyzes the use of firewalls in performing traffic filtering on the internet network with a focus on Layer 7 protocol filters. This research is expected to provide practical guidance for organizations or companies in making the right decisions regarding the use of Layer 7 protocol filters in their organization's network security strategy. In addition, the test results provide valuable insights for network administrators to optimize firewall configuration and improve internet access control as well as protection against network security threats. The test results show that the average traffic limit successfully implemented using Layer 7 protocol filters is approximately 14.5%. This result reflects the firewall's ability to distinguish and block certain applications or services running over the same application protocol.
Manajemen Pencegahan Serangan Jaringan Wireless Dari Serangan Man In The Middle Attack Tengku Mohd Diansyah; Ilham Faisal; Dodi Siregar
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 1 (2023): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i1.134

Abstract

Currently, wireless networks are very widely used to communicate because wireless networks are very fast and communicate without using cables, by using this wireless it turns out that there are weaknesses or security gaps due to irresponsible people illegally such as looking for backdoor gaps to infiltrate and attack aspects of authenticity. If a crime occurs, how to prevent the crime or attack. In this article, the possibility of an attack with the type of attack carried out is a man in the middle attack from this attack experiment will be carried out 5 times the attack experiment in this experiment the calculation of QoS (Quality of Service) is carried out, namely calculating how much packet loss and the results obtained in this attack experiment with the calculation of packet loss as much as 0.291% loss, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss which means this attack successfully attacks wireless communication. To prevent this attack activity, first know the technique of how the attack runs on a wireless network, using ettercap on linux times.