Claim Missing Document
Check
Articles

Optimalisasi Infrastruktur Jaringan Menggunakan Link Aggregation Control Protocol Dengan Device Cloud Router Switch Subandri Subandri; Zaenal Mutaqin Subekti
Jurnal Informatika: Jurnal Pengembangan IT Vol 4, No 2-2 (2019): Special Issue on Seminar Nasional - Inovasi Dalam Teknologi Informasi & Teknol
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v4i2-2.1866

Abstract

The development of data in a company is getting bigger and requires fast access time. the existence of a system that uses computer networks and internet access to support the activities of the company becomes an important part in the use of infrastructure in the company. Computer networks are accessed by all staff and employees in the building and there are servers and databases that are accessed all the time. In the building part consists of several work processes that simultaneously access to the same network and server. Then each staff and employee will access the same network infrastructure, where the data transfer burden is delegated to only one (1) switch port to connect. This can result in a large burden and network access can be slowed. By providing a configuration to optimize the switch network that adopts the link agro-protocol protocol (LACP) method on the use of network infrastructure so that it can be a solution for overcoming large network loads and slow access. By applying PPDIOO to the infrastructure development method so that the expectations can be achieved in accordance with the desired results
Rancang Bangun Wireless Access Point dengan Capsman dan Mac Mask Access list Zaenal Mutaqin Subekti; Subandri Subandri
Jurnal Informatika: Jurnal Pengembangan IT Vol 4, No 2-2 (2019): Special Issue on Seminar Nasional - Inovasi Dalam Teknologi Informasi & Teknol
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v4i2-2.1878

Abstract

In the era of millennial needs using the internet became the primary needs of everyone, to connect to the internet one of them by connecting through an access point. The problem that occurs is the difficulty of getting legal internet access that is already connected to an access point then moving place or room. Because the number of access point devices installed with SSID (Service Set Identifier) is different for each device that the user needs to log in again to get internet access, and there is no filtering of users who are entitled to use hotspot facilities based on certain devices. With the number of access points being hotspots, this becomes a consideration for network managers to set hotspot passwords or other settings, this is a new challenge for network managers. Therefore, to overcome this problem a wireless access point management system was built that uses centrally using CAPsMAN (Controller Access Point System Manager) and MAC Mask Access Lists as filtering. By using the NDLC (Network Development Life Cycle) method in floating network design.
ANALISIS PENGARUH KOMPENSASI, FASILITAS, LINGKUNGAN KERJA, BEBAN KERJA DAN KEPEMIMPINAN TERHADAP EMPLOYEE ENGAGEMENT MENGGUNAKAN SPSS Muttakin, Mumtaz; Putra, Sabar Hanadwi; Subekti, Zaenal Mutaqin
Jurnal informasi dan komputer Vol 11 No 02 (2023): Jurnal Informasi dan Komputer yang terbit pada tahun 2023 pada bulan 10 (Oktobe
Publisher : LPPM Institut Teknologi Bisnis Dan Bahasa Dian Cipta Cendikia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35959/jik.v11i02.461

Abstract

This study is based on the writer's curiosity, "why there are employees who can survive and work until retirement and why there are new employees join and then resign in a short term?", Then the analysis of the curious followed by studied previous studies to be a reference in this study.The objective of this study is to determine whether the compensation, facilities, work environment, workload and leadership affect to Employee Engagement in the Company. This study is a quantitative descriptive research, the data obtained from the sample of population , then analyzed with the statistical methods and interpreted. The hypothesis test used 98 respondents who gave back the questionnaire for sample from 130 populations. The analytical technique used multiple linear regression with SPSS, and the research results said that there is significant effect of compensation (65%), facilities (68.1%), work environment (53.2%), work load (75%) and leadership (62.7%) partially, and simultaneously affecting 77.8% to Employee Engagement of the Company. The Company is expect to maintain Employee Engagement stability by paying attention to compensation, facilities, work environment, workload, and leadership that becomes the determinant variable of employee engage or not.
RANCANG BANGUN SISTEM PEMBERIAN REWARD DAN PUNISHMENT PADA SISWA SMP ISLAM ALAZHAR 6 Subekti, Zaenal Mutaqin; Sulistyowati, HS; ., Satria; Husin, Ishak; ., Widiyawati; Hafiz, Aliy
Jurnal informasi dan komputer Vol 12 No 01 (2024): Jurnal Informasi dan Komputer yang terbit pada tahun 2024 pada bulan 4 (April)
Publisher : LPPM Institut Teknologi Bisnis Dan Bahasa Dian Cipta Cendikia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35959/jik.v12i01.565

Abstract

Pendidikan memegang peran sangat penting dalam perkembangan bangsa, sebab melalui sektor pendidikan akan dihasilkan Sumber Daya Manusia (SDM) yang lebih berkualitas dan mampu membangun bangsa dan negara sehingga akan tercapai masyarakat yang adil dan makmur. Dalam pengajaran, seorang guru diharapkan dapat menentukan pendekatan pengajaran yang tepat dalam proses belajar mengajar. Untuk meningkatkan penalaran siswa dalam proses belajar mengajar perlu juga diciptakan suatu pendekatan yang dapat meningkatkan perhatian siswa terhadap materi pelajaran. Permasalahannya adalah bagaimana membujuk siswa atau peserta didik untuk berusaha mengembangkan semangat belajarnya supaya mendapatkan prestasi yang optimal. Diantara yang dapat dijadikan solusi terhadap masalah demikian adalah dengan menggunakan metode reward (penghargaan) dan punishment (pelanggaran) metode pembelajaran yang digunakan untuk mempengaruhi seseorang untuk meningkatkan prestasi belajar. Metode ini sudah banyak yang mengenal. Awalnya teori ini menjadi landasan untuk dunia pekerjaan, tetapi akhir-akhir ini digunakan pula dalam dunia pendidikan. Metode reward dan punishment diharapkan siswa dapat semakin terdorong untuk meningkatkan kemauan, kesadaran belajarnya sehingga prestasi belajar dan kesadaran atas pelanggaran siswa dapat diperbaiki. Sehingga peneliti membuat system Reward dan punishment yang diberikan berupa poin-poin kecil yang nantinya dapat diakses melalui web sekolah yang dapat di pantau oleh orang tua siswa . Penelitian ini memberi solusi terhadap masalah demikian dengan menggunakan metode reward (penghargaan) dan punishment (pelanggaran) metode pembelajaran yang digunakan untuk mempengaruhi seseorang untuk meningkatkan prestasi belajar. Poin reward dan punishment akan dikumpulkan melalui aplikasi yang akan dibuat, jika pelanggaran siswa mencapai point tertinggi maka orang tua siswa mendapat notifikasi pemanggilan melalui sms, aplikasi yang akan dibuat dapat diakses orang tua siswa untuk melihat jumlah reward dan punistmen siswa.
Penerapan Limit Akses Browsing Internet pada saat Jam Kerja di PT XYZ Mutaqin Subekti, Zaenal; Mukiman, Kikim; Fikri Adluwal Fadhil, Ahmad; Asyrofi, Muhammad
Jurnal Teknologi Terpadu Vol 7 No 1: Juli, 2021
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jtt.v7i1.342

Abstract

One of the engineering companies located in the Cikarang area has a rule that every employee is not allowed to access the internet through a browser during working hours, i.e., from 08.00 AM to 12.00 AM and 1.00 to 5.00 PM, only during break time which is between 12.00 AM until 1.00 PM, employees are allowed to access the internet through a browser. The company can apply this rule by implementing its policies on router firewalls to be followed by all employees thoroughly. This research will analyze and implement the process of configuring the router firewalls for the applied case. The first stage of this research starts from analyzing the software and hardware requirements, analyzing the network topology designs, implement the company's policies on firewall configuration, and the last stage is by doing the testing. From this implementation, we get the results that all users cannot access the internet through a browser except for authorized users. These results are applied based on the company's rules and policies proposed above that employees only able to access the internet through a browser during break time and before and after working hours.
PENERAPAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) UNTUK MENENTUKAN JURUSAN YANG TEPAT BAGI SISWA MADRASAH ALIYAH NEGERI Satria; Wirawan, Abie; Husin, Ishak; Ilham Ramdhani, Adhitya; Sulistyowati, HS; Mutaqin Subekti, Zaenal
Antivirus : Jurnal Ilmiah Teknik Informatika Vol 18 No 2 (2024): November 2024
Publisher : Universitas Islam Balitar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35457/antivirus.v18i2.3935

Abstract

One in the field of services and services. Make-up services exist to meet the make- up needs of various events, helping women to be more confident and special on their special days. In Bekasi, there is one facial makeup artist who offers her services, namely Syifa Beauty. However, in terms of marketing, this service still uses manual methods, so promotions and information obtained by potential customers are limited. The information system for make-up service providers is designed as a meeting medium for make-up service providers and potential customers with the help of technology. The purpose of this system is to facilitate Make-Up service providers in carrying out promotions and to reduce promotional costs. The system will display examples of service results, prices, and group them into several categories so that potential customers will be free to explore and determine the services they will order. Therefore, a system was developed that can assist the ordering process for customers and provide information on the services provided by Syifa Beauty. The method used in this research was observation and interviews. The system development method used is Rapid Application Development (RAD) using the PHP programming language and Mysql and UML databases as the design process. This research produces a system that can order makeup services via the website and can see what services are provided and the prices of each makeup service available at Syifa Beauty
Integrasi Firewall Untuk Meningkatkan Keamanan Akses Ssh Pada Ubuntu Server 20.04 Subekti, Zaenal Mutaqin; Mukiman, Kikim; Ramdani, Ramdani; Sulistyowati, H.S.; Suryadi, Muhamad Dedi; Jaya, Iwan
Power Elektronik : Jurnal Orang Elektro Vol 14, No 1 (2025): POWER ELEKTRONIK
Publisher : Politeknik Harapan Bersama Tegal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/polektro.v14i1.8717

Abstract

Keamanan akses jaringan pada server merupakan isu krusial di era digital. Salah satu titik rawan adalah layanan Secure Shell (SSH), yang jika tidak dikonfigurasi dengan tepat, dapat menjadi celah serangan. Penelitian ini bertujuan untuk merancang sistem keamanan akses SSH pada Ubuntu Server 20.04 melalui integrasi firewall menggunakan Uncomplicated Firewall (UFW). Metodologi yang digunakan adalah eksperimental dengan pendekatan analisi kebutuhan, design sistem, implementasi konfigurasi, dan pengujian untuk melakukan analisis keamanan. Hasil pengujian menunjukkan bahwa penggunaan firewall secara selektif untuk IP dan port dapat secara signifikan mengurangi potensi akses ilegal. Studi ini menyimpulkan bahwa integrasi firewall memberikan penguatan signifikan terhadap keamanan layanan SSH dan layak diadopsi sebagai praktik standar dalam pengelolaan server.
Rancang Bangun Prototype Sistem Informasi Membership Gym Berbasis Website Adam, Willy; Subekti, Zaenal Mutaqin; ., Ramdani; Maryati, Mami; ., Widyawati; Wulandari, Sekar; Primadayanti, Andyani Indah
Power Elektronik : Jurnal Orang Elektro Vol 14, No 2 (2025): POWER ELEKTRONIK
Publisher : Politeknik Harapan Bersama Tegal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/polektro.v14i2.9075

Abstract

Olahraga merupakan ilmu terapan yang terpengaruh oleh adanya teknologi untuk mendukung aktivitas olahraga. Banyak inovasi baru dalam perkembangan teknologi yang luas diberbagai macam disiplin ilmu. Tempat fitness atau biasa juga disebut Gym adalah salah satu tempat olahraga yang sebagian orang kunjungi. Pada Natural Fitness Center terdapat kendala pada perusahaan ini masih sangat konvensional, misalnya dalam transaksi pembayaran, perpanjangan Member, pendaftaraan atau pendataan Member membutuhkan waktu yang lama dalam prosesnya. Untuk pembayaran masih menggunakan cash atau tunai, pendaftaran disana juga masih menggunakan microsoft excel sehingga membutuhkan waktu yang lama jika ada customer yang ingin melakukan pendaftaran Membership. Metode Prototype merupakan metode pengembangan sistem dimana hasil analisa perbagian sistem langsung diterapkan kedalam sebuah model tanpa menunggu seluruh sistem selesai. Hasil yang diperoleh dalam penelitian ini adalah sistem informasi Membership berbasis Website yang diharapkan dapat membantu pihak pengelola dalam mempermudah administrasi Membership dengan cepat.
Implementasi Security Information and Event Management (SIEM) Wazuh Untuk Deteksi Malware Zaenal Mutaqin Subekti; Mami Maryati; Suhadi; Subandri; Sabar Hanadwiputra; Danniswara Putra Patria
Prosiding SISFOTEK Vol 9 No 1 (2025): SISFOTEK IX 2025
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the development of ICT (Information and Communication Technology), cybersecurity threats to companies are becoming increasingly complex and diverse, one of which is malware that can attack endpoint devices such as computers/laptops and servers in companies. An effective approach in dealing with these challenges is to implement a SIEM (Security Information and Event Management) system that is able to monitor, analyze, and respond to security incidents in real-time by implementing an endpoint security monitoring system using the Wazuh platforsm in a structured corporate network environment. The method used in this study is the PPDIOO Method (Prepare, Plan, Design, Implement, Operate, Optimize). As a stage starting with (a) prepare is used to analyze needs, (b) plan to design IP addresses, (c) design to design network topology, (d) implement, namely implementing SIEM with wazuh installation and configuration by setting Path scanning warning malware files, (e) operate to monitor and test wazuh, (f) optimize to make modifications to improve system performance. The results of this study are that the test that has been carried out wazuh as much as 1 time can detect malware on one endpoint device and On the Wazuh dashboard, an alert notification appears that the desktop endpoint received a real-time malware attack numbering one and malware warning notifications are sent to telegram bots so that users are immediately aware, this shows that wazuh can be used to analyze, monitor and respond to security incidents
PENGAMANAN AKSES JARAK JAUH JARINGAN INTERNET RUMAH DENGAN TEKNOLOGI VPN BERBASIS VPS Domo Pranowo Kuswandono; Zaenal Mutaqin Subekti
Jurnal Teknologi Informasi dan Digital Vol. 2 No. 2 (2024): Teknologi Informasi dan Digital
Publisher : LPPM Universitas Bani Saleh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.65624/tridi.v2i2.60

Abstract

Teknologi informasi dan komunikasi data berbasis internet telah berkembang dengan pesat. Akses dan pemanfaatannya berkembang untuk melakukan transfer data tanpa harus memiliki IP public sendiri (dedicated) terhadap server fisik di rumah. Dengan berkembangnya sistem komputasi awan (virtual cloud system) dibutuhkan akses data jarak jauh yang aman. Sedangkan untuk mengakses jaringan yang ada dirumah dibutuhkan IP public. IP Public yang diberikan ISP (Internet Service Provider) kepada pelanggan pribadi biasanya menggunakan IP public dinamic sehingga tidak mudah untuk melakukan akes koneksi yang tetap. Mempertimbangkan hal diatas perlu adanya jalur khusus yang digunakan untuk mengamankan data yang penting atau bersifat pribadi melalui jaringan internet dengan IP public stastis, melalui pemanfaatkan teknologi VPS (virtual Private server) untuk membangun jalur pribadi rumah. Dalam penelitian ini penulis memanfaatkan jenis komunikasi virtual ini memanfaatkan teknologi VPS untuk mendapatkan IP Public statis yang akan digunakan antara perorangan dengan media internet. Dalam tulisan ini akan diulas aspek-aspek implementasi pengendalian sumber daya jaringan rumah dengan akses jarak jauh dengan memanfaatkan Virtual Private Server (VPS), Virtual private network L2TP (VPN) dan router yang ada di komputasi awan, Cloud Hosted Router (CHR) untuk memanfaatkan IP Public static. Sehingga mempermudah mengontrol dan mengatur jaringan sebagai solusi jaringan rumah pintar (smart home) untuk komunikasi jarak jauh yang aman meskipun hanya memiliki IP Public dinamic.
Co-Authors ., Adi Suwarno ., Subandri ., Widiyawati ., Widyawati Adam, Willy Adhitya Ilham Ramdhani Adhitya Ilham Ramdhani Adi suwarno Adiansyahroni, Indra Aditya Ramadhan Ahmad Fikri Adluwal Fadhil Ahmad Fikri Adluwal Fadil Ajeng Sri Widyasih Aldi Pari, Riki Aprizal, Yarza Arifin, Iman Nur Asyrofi, Muhammad Budi Budi Chandra Kirana Daka Nanda Nurjannah Danniswara Putra Patria Domo Pranowo Kuswandono Eko Marwanto Putro Esmi Imrohatun Fazar Sidik Fikri Adluwal Fadhil, Ahmad Firmansyah, Iqbal Galih Rakasiwi Hafiz, Aliy Hary Nugroho Haryono Haryono HENDRA SETIAWAN Hidayatullah Hidayatullah Ilham Fani Ramadhan Ilham Ramdhani, Adhitya Indriani Iqbal Firmansyah Irmanto Budiman Ishak Husein Ishak Husin Ishak Husin, Ishak Jaya, Iwan Kikim Mukiman Kikim Mukiman Linda Marlinda Mami Maryati Maryati, Mami Muhamad Dedi Suryadi Muhamad Dedi Suryadi Muhamad Lutfi Sulthon Auliya Sulistyono Muhammad Asyrofi Muhammad Dedi Suryadi Muhammad Nur Mukiman, Kikim Muttakin, Mumtaz Nanang Durachman Primadayanti, Andyani Indah putra, Sabar Hanadwi Rahayu, Ratna Rahmawati Rahmadi Rahmadi Rahmadi . Rahmadi Rahmadi Ramdani . Ramdani Ramdani Rezki H Kapri Ricky Ardiansyah Riki Aldi Pari Rinanti . Rizky Kurniawan Roni Eka Putra S.Kom., M.Kom, Iwan Jaya, Sabar Hanadwiputra SATRIA Satria Satria . Satria Satria Sekar Wulandari Sidik, Fazar STMIK, Author Super Subandri Subandri Subandri Subandri Subandri Subandri Suhadi Sulistyowati, H.S. Sulistyowati, HS Suroso, Amat Suryadi, Muhamad Dedi Suryadi, Muhamad Dedi Susanto, Ferry Verawati Verawati Warsudi . Widia Murni Wijaya Widiyawati Widiyawati Widiyawati Wirawan, Abie