Aspriyono , Hari
Unknown Affiliation

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

The Implementation Of Internet Small Computer System Interface (ISCSI) Protocol Based On Linux Centos As External Storage On Windows Gustardi, Rion; Sari , Herlina Latipa; Aspriyono , Hari
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 1 (2022): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i1.791

Abstract

This study aims to build a router in a computer network using a proxy, implement an external proxy server on a mikrotik router and implement caching on a local network. In this study, the action research method will be used, where the action research method can provide an overview of the stages of research that the writer needs, because the writer requires an analysis or diagnosis of the system that is currently running. The results of this study indicate that an external proxy server using clearOS linux with the squid application can be applied to a proxy router with a transparent proxy, so that clients to connect to the internet network at PT. Mega Maju Perkasa Bengkulu City must pass a proxy server first. The caching system can store caches of sites accessed by clients, from the tests that have been carried out there are data reports with 50 cache hits and 11% cache stored. In addition, the application of an external proxy server on the proxy router does not reduce the quality of service on network at PT. Mega Maju Perkasa Bengkulu City
Network-Based Text Message Security System Using the Data Encryption Standard (DES) Algorithm Simanjuntak, Horas Aryanto; Aspriyono , Hari; Rohmawan , Eko Prasetiyo
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1042

Abstract

UPT. Puskom as practicum manager has the responsibility to provide facilities including applications needed for each course. In this research, the development of a network-based text security system was carried out by implementing one of the cryptographic algorithms that had been packaged into an application so that students could find out the encryption and decryption processes of the Cryptographic algorithm, namely the Data Encryption Standard (DES) Algorithm. A network-based text message security system using the Data Encryption Standard (DES) Algorithm was built using the Visual Basic .Net Programming Language and SQL Server database. The security system built can help keep messages sent secret from the sender to the recipient of the message through the DES algorithm. The encryption process can be carried out by the user who will send a text message to the intended user, who can open the encryption form and select the intended user, the encrypted message will be stored in the database. Meanwhile, decryption can be done by users who receive text messages by opening the decryption form and displaying the messages sent by the message sender. Based on the tests that have been carried out, it can be concluded that the application is capable of encrypting and decrypting text messages using the DES algorithm.
Wifi Network Security Analysis Using Scanning Signal Method In Excellent School Pearl Of The Mother Of Bengkulu City Alamta, Fahmi; Aspriyono , Hari; Rohmawan , Eko Prasetyo
Jurnal Komputer Vol 1 No 1 (2022): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v1i1.6

Abstract

The purpose of this study is to analyze the security of the WiFi network in Mutiara Bunda extraordinary school, in order to determine the level of security, analyze the network speed. and add network security using mikrotik using Firewall and WiFi hotspot features. The research method used is the Signal Scanning method, namely moving activities in a certain area, mapping Access Point for statistical purposes. The author conducts a network security analysis using two stages of testing, the first stage is to do a login test, try to break into WiFi using the Dummper application, then to analyze the signal strength using the InSSIDer and Vistumbler applications, and use the K-Mac application to test the security of the network, The author also draws conclusions, and adds network security, namely the firewall and WiFi hotspot features using Mikrotik, then the author performs the second testing phase, the stages are the same as the first testing phase,and draws conclusions. The advice from the author is for the agency to be able to maintain and always update network security, so that it can run and be maintained properly
Penggunaan Metode Active Directory Dan Privileges Pada Jaringan Komputer Untuk Penyimpanan Data Central Pada SMA Muhammadiyah 1 Bengkulu Armansyah, Yody; Khairil; Aspriyono , Hari
Jurnal Komputer Vol 2 No 1 (2023): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v2i1.63

Abstract

The use of Active Directory and Privileges Methods on Computer Networks for central data storage at SMA Muhammadiyah 1 Bengkulu is made using Samba Server, where files will be stored in folders on the server, and direct users to access the folder in order to process documents that have been stored in the folder. In the application of Active Directory, the server has installed the samba ad-dc service (Activer Directory Domain Controller) with the hostname smamuhammadiyah1.bengkulu.lan and the server IP Address 192.168.0.2 which can be accessed by each clientBased on tests carried out with server and client specifications found at SMA Muhammadiyah 1 Bengkulu, it can be concluded that the file storage process can be done well as expected, and if the file storage has a large size, then the storage process takes a long time.
The Implementation Of Ui/Ux (User Interface/User Experience) For Improving Educational Websites: Case Study At Sma Negeri 1 Central Bengkulu Armeliansyah, Yadi; Aspriyono , Hari; Farisy , Ahmad Arib Al
Jurnal Komputer Indonesia Vol. 4 No. 2 (2025): Desember
Publisher : LPPJPHKI Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jki.v4i2.959

Abstract

Advances in information technology have encouraged educational institutions to improve their digital services, including through educational websites. SMA Negeri 1 Cental Bengkulu already has an official website, but there are still issues with its appearance and user experience. This study aims to implement UI/UX to improve the appearance and user experience of the website to make it more informative, accessible, and attractive. The approach used is qualitative with the Design Thinking method through the stages of problem identification, wireframe design, prototyping, and testing. The design developed also accommodates the needs of users from students, teachers, and parents. The writer’s suggestion is that the implementation of UI/UX be applied comprehensively as a more effective medium for information and learning at SMA Negeri 1 Central Bengkulu.