p-Index From 2021 - 2026
10.627
P-Index
This Author published in this journals
All Journal ITEj (Information Technology Engineering Journals) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat J-Dinamika: Jurnal Pengabdian Kepada Masyarakat Jurnal Mantik Abdimas Toddopuli: Jurnal Pengabdian Pada Masyarakat Community Development Journal: Jurnal Pengabdian Masyarakat Jurnal Kajian Ilmiah Jurnal Informatika Dan Tekonologi Komputer (JITEK) Jurnal Teknologi dan Manajemen Industri Terapan Biner : Jurnal Ilmiah Informatika dan Komputer Madani: Multidisciplinary Scientific Journal JURNAL ILMIAH SAINS TEKNOLOGI DAN INFORMASI Jurnal Penelitian Sistem Informasi Jurnal Sistem Informasi dan Ilmu Komputer Jurnal Kendali Teknik dan Sains International Journal of Smart Systems Kohesi: Jurnal Sains dan Teknologi Educational Insights Jurnal Sains dan Teknologi JI-Tech Jurnal Penelitian Teknologi Informasi dan Sains Saber: Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi DIGIBE: Digital Business and Entrepreneurship Journal Jurnal Riset Teknik Komputer Jurnal Riset Sistem Informasi Venus: Jurnal Publikasi Rumpun Ilmu Teknik Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Uranus: Jurnal Ilmiah Teknik Elektro, Sains dan Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Technology Sciences Insights Journal Jejak digital: Jurnal Ilmiah Multidisiplin Journal of System and Technology Router : Jurnal Teknik Informatika dan Terapan Jurnal Informatika Dan Tekonologi Komputer Jurnal Sistem Informasi dan Ilmu Komputer
Claim Missing Document
Check
Articles

PENGUJIAN PENETRASI JARINGAN MENGGUNAKAN OWASP ZAP DAN SQLMAP UNTUK MENGIDENTIFIKASI KERENTANAN KEAMANAN WEBSITE Rakhmadi Rahman; Fatkhur Razak, Danang
Jurnal Riset Sistem Informasi Vol. 1 No. 4 (2024): Oktober : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/e4rhmk70

Abstract

Web application security is becoming increasingly critical amidst increasing cyber threats that can result in data leakage and other losses. This research aims to identify and exploit security vulnerabilities in a web application using two popular tools, OWASP ZAP and SQLMAP. OWASP ZAP is used to find various vulnerabilities such as Cross-Site Scripting (XSS) and insecure configuration, while SQLMAP is focused on the detection and exploitation of SQL Injection vulnerabilities. Through a series of automated scans and in-depth analysis, this research successfully identified several vulnerabilities with medium and low risk levels. The test results show that both tools are effective in identifying vulnerabilities, providing important insights into mitigation steps that need to be taken to improve web application security. This research also emphasizes the importance of input validation and sanitization, the use of parameterized queries, and security configuration updates as key mitigation measures. The findings are expected to contribute to improved security practices in web application development and reduce the risk against cyberattacks.
Pengembangan Rancangan Aplikasi Hear Talk Me untuk di Gunakan Penyandang Tunarungu Berbasis Sistem Operasi Android Rakhmadi Rahman; Muhammad Aril; Ananda Nabila Putri
Venus: Jurnal Publikasi Rumpun Ilmu Teknik  Vol. 2 No. 5 (2024): Oktober: Jurnal Publikasi Rumpun Ilmu Teknik
Publisher : Asosiasi Riset Ilmu Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/venus.v2i5.482

Abstract

With all respect and gratitude, we express our gratitude to the presence of Allah SWT who has bestowed His grace and grace, so that we can complete a paper entitled "Development of Hear Talk Me Application Design for Deaf People Based on the Android operating system". Shalawat and salam may always be poured out to the Prophet Muhammad SAW, a role model for mankind. This paper describes the development of smarthphone aids that aim to improve accessibility for deaf people. This application is designed using the android operating system to be easily used by users with special needs. The main features included include text to voice translation and vice versa, as well as vibration notifications for incoming calls or messages. With this paper, we hope to create a useful and effective tool for deaf people to be able to access and utilize Smartphone functions maximally, hopefully this paper can provide useful insights and inspire further research in the development of accessibility technology
Integrasi Aplikasi Pemesanan Digital Berbasis Sistem Operasi Android dengan Pembayaran Berbasis Cloud Rakhmadi Rahman; Muhammad Syawal; Saylandra Aulia Ramadhani
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 4 (2024): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v2i4.281

Abstract

Technological developments in the digital world have now begun to increase the use of operating systems such as Android which are often used on electronic devices such as smartphones and tablets, penetrating various fields of human life. The use of these devices is essential in facilitating various tasks, especially digital ordering and transactions. This integration provides better transaction protection, more effective usage, and benefits and convenience. Cloud computing makes it easy and efficient to integrate digital ordering applications into payment systems. Observations show that these integrations provide user convenience and purchase trends, assist marketing strategies, and generate more accurate business decisions. If carefully developed and implemented, this integration has great potential to change the way business is done in the digital age.
Meningkatkan Responsivitas Pada Sistem Operasi Android Melalui Implementasi Algoritma Penjadwalan Mutakhir Rakhmadi Rahman; Shalza Naya Dwi Fortuna; Redo Triansyah; Muhammad Akbar Fahrezi
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 3 (2024): September : Router : Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Profesi Telekomunikasi dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i3.146

Abstract

This research aims to analyze the performance of various CPU scheduling algorithms in increasing the responsiveness of the Android operating system. Using algorithms such as First Come First Served (FCFS), Shortest Job First (SJF), Shortest Remaining Time First (SRTF), and Round Robin, this study evaluates the advantages and disadvantages of each in terms of average waiting time, throughput, and power consumption. Research methods include literature study, algorithm selection and implementation, as well as data testing and analysis. The research results show that choosing the right scheduling algorithm can increase system efficiency and responsiveness, as well as provide recommendations for Android operating system developers and the application developer community. It is hoped that these findings will help in determining the optimal solution for improving the performance of the Android operating system.
Strategi Manajemen Memori pada Sistem Operasi Android untuk Smartphone Kelas Menengah Tri Putra Aditya; Aisyah Aisyah; Rakhmadi Rahman
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 3 (2024): September : Router : Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Profesi Telekomunikasi dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i3.165

Abstract

In the context of rapidly evolving mobile technology, memory management has become an important aspect that determines the efficiency and effectiveness of Android operating systems, particularly on mid- range smartphones. The objective of this research is to identify, analyze and develop memory management strategies that can improve the performance of the Android operating system on resource-constrained devices. Using an experimental approach, this study evaluates various memory management techniques, including the use of optimized caches, memory compression, and page replacement algorithms, to determine the most effective combination to improve system responsiveness and performance. The results show that the implementation of appropriate memory management strategies can significantly improve operating system performance and user experience while extending battery life. These findings provide valuable information for application developers and device manufacturers to optimize their products for mid-range smartphone competition.
Pengembangan Sistem Operasi Debian 12 Dengan Kemampuan Pembelajaran Interaksi Pengguna Untuk Peningkatan User Experience Rahman, Rakhmadi; Muhammad Arham Arsyad; Stepani
Jurnal Teknologi dan Manajemen Industri Terapan Vol. 3 No. 3 (2024): Jurnal Teknologi dan Manajemen Industri Terapan
Publisher : Yayasan Inovasi Kemajuan Intelektual

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55826/jtmit.v3i3.467

Abstract

Sistem operasi (OS) adalah perangkat lunak sistem yang mengelola sumber daya perangkat keras dan perangkat lunak serta bertindak sebagai penghubung bagi program komputer. Debian, pertama kali dikembangkan oleh Ian Murdock pada tahun 1993, merupakan OS berbasis paket perangkat lunak bebas dan terbuka. Penelitian ini berfokus pada pengembangan Debian 12 dengan kemampuan pembelajaran dari interaksi pengguna untuk meningkatkan pengalaman pengguna (user experience). Metode yang digunakan mencakup pengumpulan data log sistem secara real-time, penerapan algoritma Decision Tree untuk analisis data, serta evaluasi performa melalui pengujian sistem. Data log interaksi pengguna dikumpulkan, diproses, dan dianalisis menggunakan model pembelajaran mesin untuk memprediksi serta menyesuaikan pengaturan sistem secara dinamis. Hasil awal menunjukkan bahwa sistem ini memiliki potensi besar dalam meningkatkan pengalaman pengguna secara signifikan dan dapat diterapkan di berbagai platform dan perangkat lunak lain, membuka peluang bagi inovasi dalam pengembangan sistem adaptif yang responsif terhadap kebutuhan pengguna.
Development of an Operating System Supporting Intelligent Predictions and Recommendations Rahman, Rakhmadi; Apriliyani, Alya Wulan; Ibrahim, Siti Nur Azizah
ITEJ (Information Technology Engineering Journals) Vol 9 No 1 (2024): June
Publisher : Pusat Teknologi Informasi dan Pangkalan Data IAIN Syekh Nurjati Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24235/itej.v9i2.127

Abstract

This Study discusses the development of an intelligent operating system feature that supports smart prediction and recommendations using artificial intelligence (AI) capabilities within the Linux operating system. The study aims to integrate AI-driven features into Linux to enhance user productivity and efficiency by providing relevant application recommendations based on user behavior patterns. The implementation involves data collection of application usage, training machine learning models for application recommendations, and integrating these features into the Linux environment. The project utilizes Python for scripting, employing libraries such as psutil, pandas, scikit-learn, and joblib for data handling and machine learning tasks. The results demonstrate successful implementation of the AI-driven recommendation system, enhancing user interaction and productivity within the Linux operating system
Design and Implementation of Network Security Systems on Virtualized Networks Syam, Akmal Baharuddin; Rahman, Rakhmadi
ITEJ (Information Technology Engineering Journals) Vol 9 No 2 (2024): December
Publisher : Pusat Teknologi Informasi dan Pangkalan Data IAIN Syekh Nurjati Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24235/itej.v9i2.128

Abstract

This report, entitled "Design and Implementation of Network Security Systems on Virtualized Networks," was prepared to fulfill the final assignment of the Network Security course at the Bacharuddin Jusuf Habibie Institute of Technology (ITH). This research aims to design, implement and identify network security vulnerabilities in a virtualization environment using Proxmox Virtual Environment (Proxmox VE) in VirtualBox. The research results show that Proxmox VE in VirtualBox is less successful in optimizing software-hardware resources by implementing security mechanisms such as firewalls, encryption, IDS/IPS, VPN, and IAM. Even though it has several shortcomings, Proxmox VE has proven to be effective in managing virtual networks safely and efficiently when carried out outside of VirtualBox. This research also provides practical experience for students in implementing and identifying network security vulnerabilities, preparing them for real-world challenges.
Utilization of Google Workspace as a Productivity and Collaborative tool in supporting Active, Innovative, and Creative Learning at SMAN 3 Parepare DA, Alvian Tri Putra; Rosmiati, Rosmiati; Tunnisa, Khaera; Maratuttahirah, Maratuttahirah; Rahman, Rakhmadi; Pusung, Noel Ivander; Razak, Danang Fatkhur; Hakim, Nur Fadillah; Nurhalizah, Siti; Fatwa, Syafira; Apriliyani, Alya Wulan
ABDIMAS: Jurnal Pengabdian Masyarakat Vol. 6 No. 2 (2023): ABDIMAS UMTAS: Jurnal Pengabdian Kepada Masyarakat
Publisher : LPPM Universitas Muhammadiyah Tasikmalaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35568/abdimas.v6i2.3122

Abstract

Community service activities that will be carried out at SMAN 3 Parepare are community service activities that will be carried out based on problems in partner schools, namely in the teaching and learning process where teachers provide material and assignments by explaining directly to students without any media and learning technology. A learning process like this can reduce student enthusiasm for learning, so learning objectives cannot be adequately achieved. The purpose of this service activity is to provide an introduction and training to teachers and students regarding Google Workspace for Education, which has advantages such as having virtual classes, online absences, implementing online video streaming/face-to-face learning, being able to assess student assignments directly, availability of facilities which can assist students and teachers in terms of uploading and downloading lesson materials and projects, providing discussion forum facilities, as a simple and flexible tool to increase the effectiveness of collaboration between teachers and students and as a comprehensive solution in the use of technology for teachers to be able to develop professionally, work efficiently, teaching interactively by utilizing Google Workspace for Education for learning, and being able to increase student learning enthusiasm to encourage academic integrity to support active, innovative and creative learning.
Pengujian Penetrasi Jaringan Lokal dengan Metasploit Framework Fadhil Aditya; Andi Mahrani; Rakhmadi Rahman
Jejak digital: Jurnal Ilmiah Multidisiplin Vol. 1 No. 4 (2025): JULI (Edisi Spesial)
Publisher : INDO PUBLISHING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63822/sht2dr90

Abstract

Local network security is a vital component in maintaining the integrity and confidentiality of data in information systems. This study aims to identify and evaluate the vulnerability of the Windows 7 operating system through penetration testing using the Metasploit Framework. The method used is an experiment with attack si mulation in a controlled virtual environment. The test target is a Windows 7 system that has not received the MS17-010 security patch and still activates the SMBv1 protocol. The EternalBlue exploit (CVE-2017-0144) is used to exploit the vulnerability. The test results show that the exploitation was successful, marked by the acquisition of Meterpreter shell access to the target system, as well as the ability to retrieve system information and desktop screenshots. These findings confirm that systems that have not been updated are highly vulnerable to remote code execution attacks. This study recommends the application of security patches, disabling SMBv1, and configuring firewalls as crucial mitigation steps. The results of this study are expected to be a reference in the practice of evaluating local network security, especially in infrastructure that still uses old operating systems.
Co-Authors A.Nurul Sairah Abdul Khalik Hartono Abdullah Abdullah Abdullah B Abdullah B Abriel Yosua Nathanael Leksona Achmad Haikal Fikri Adinda Aulia Rahmi Adwah , Farah Diyanah Afiqah Ahmad, Muhammad Adhi Fahriansyah Aisyah Aisyah Akmal Baharuddin Syam Al-Amin, Muh. Alif Imran Alif, Muh. Alvian Tri Putra Darti Akhsa Alya Putri Rahmadani Alya Wulan Apriliyani Amanda Putri Heryanti Amin, Widyah Putri Auliya Ananda Nabila Putri ANANTA, ASTI Andi Aulia Safirah Andi Maharani Andi Mahrani Anita Septiani Mustamin Antoni, Wahyudi Anugra, Ayu Anugrah Dwi Ansarna Apriliyani, Alya Wulan Arfika Amalia Suryadi Arthanty, Annisa Aspiani Putri Ashilah Aulia Rahmi, Adinda Awal Ramadhan Nasrun Azzahra, Maryam Baharuddin, Siti Hajar Barik Alfito, Ramadan Chintami Darti Akhsa, Amaliah Danang Fatkhur Razak Darti Akhsa, Alvian Tri Putra Dermawan, Rufaida Desvi Dwicki, Dwicki Herlambang Egi Fahrezi Iswan Eka Tanduklangi Fadhil Aditya Fanilda Damayanti Fathin Alwan Tahir Fathuresqi, Fathuresqi Fatkhur Razak, Danang Fatwa, Syafira Fikri, Achmad Haikal Furqan, M Furqan Ramadhanu Ghazali, M. Chaerul Ghina R.S Odja Gina Latifa Akmal Haikal Fikri, Achmad Hakim, Nur Fadillah Hamuddin, Humaera Haslinda Haslinda Hikma, Nurul I, Ikbal Ibrahim, Siti Nur Azizah Imamulkhair, Muhammad Januar Fahrisal Jesica Septiani Manurung Julistio Fadjar Anugrah Sao Kelsia Nelsia Khaera Tunnisa, Khaera Khalifah, Nur Ayu Khumaedi Khumaedi Kuncahya, Figra Dwi Kustanto , Prio Lia Kamila Kulsum Lukman Hakim Lukman Hakim M Furqan Ramadhanu M Yahtadi M. Faiz Ilyas Mar'atuttahirah, Mar'atuttahirah Maratuttahirah Maratuttahirah, Maratuttahirah Marwa Dinda Muchtar Mar’atuttahirah Mar’atuttahirah, Mar’atuttahirah Meiana Sahabuddin Meyrani R Moh. Farel Muh. Al Amin Muh.Daffa Nashwan Rasya Muhammad Akbar Fahrezi Muhammad Alfarizky Yusuf Muhammad Alfian Muhammad Arham Arsyad Muhammad Aril Muhammad Dirga Sopan Muhammad Hasyim Rusmin Muhammad Syawal Muhammad Yusuf Dzaky .J Mulyadi Mulyadi Murtafia Murtafia Nabilah Ramadhani Wowong Najwa, Hafizhah Natasya taslim Noel Ivander Pusung Nugrah Surya Pratama Nur Afiat Nur Azisah Basir Nur Fadillah Hakim Nurfaida Nurfaida Nurfauzi, Muhammad Aqmal Nurhalisah Ramli Nurhalizah, Siti Nurislamiyah Nurislamiyah Nurul Salsabillah Ome, Paulus Jemianus Pusung, Noel Ivander Putri Balqis Putri Dyananda Luqman Putri, Ananda Nabila Rahman, Aldi Fatur Rahmat Eka Putra R Palaloi Ramadhan, Syam Syahru Ramadhani, Alya Rasya, Muh. Daffa Nashwan Razak, Danang Fatkhur Redo Triansyah Reski Septiawan Retno Helviani Revan, Muh Rina Rina Rosmiati Rosmiati Rosmiati Rosmiati Safikah, Nur Saylandra Aulia Ramadhani Septian Rheno Widianto Sesa, Velita Rante Shalza Naya Dwi Fortuna Siti Nurhalizah Stepani Surianti, Besse Suryabuana, Andi Sahra Suryadi, Arfika Amalia Syaddad, Muhammad Shadiq Dzakwan Syafira Fatwa Syafira Fatwa Syam, Akmal Baharuddin Syifa Tri Agusriani taslim, natasya Tri Aditya, Muh Tri Putra Aditya Umi kalsum, Umi kalsum V, Viandra Wahyu Anwar Wildana, Andi Putri Wildana wulan, alya Yonatan Rannu Zahirah, Andi Riah Zulfattah, Abdul Khaliq