Claim Missing Document
Check
Articles

Found 17 Documents
Search

ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR) Hidayat, Arif; Saputra, Ismail Puji
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (754.776 KB) | DOI: 10.31598/jurnalresistor.v1i2.323

Abstract

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.
IMPLEMENTATION VOICE OVER INTERNET PROTOCOL (VOIP) AS A COMMUNICATION MEDIA BETWEEN UNIT AT UNIVERSITY MUHAMMADIYAH METRO Arif Hidayat; Ismail Puji Saputra
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.665 KB) | DOI: 10.56327/ijiscs.v2i2.603

Abstract

VOIP (Voice over Internet Protocol) is the theology that makes the intranet network even the internet to be able to do voice communications remotely directly. Analog voice signals, such as those heard when communicating on the phone is converted into digital data and transmitted over the network in the form of data packets in real time. In VoIP communications, the user makes a phone connection through a terminal in the form of a PC or a regular telephone (smartphone). With telephones using VoIP, many benefits can be taken include: 1) in terms of cost obviously cheaper than traditional phone rates, 2) network-free, if the internet network is broken VOIP can still be used with notes connected to wifi or wired network, 3) maintenance costs can be pressed due to voice and network data apart, so IP Phone  added, moved and changed. In this research, VOIP is implemented at UM Metro. UM Metro has 3 campuses (Campus 1, Campus 2 and Campus 3) are different areas of location, but still in one City. The result of Voice Over Internet Protocol (VOIP) as communication media between units at UM Metro shows the result of 85, 7% (Strongly Agree) and 14, 3 (Agree), it can be concluded with the existence of VOIP   is very feasible for use as a medium of communication.
ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR) Arif Hidayat; Ismail Puji Saputra
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol. 1 No. 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/jurnalresistor.v1i2.323

Abstract

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.
CHROOT SISTEM OPERASI LINUX UBUNTU PADA HARDDISK BETYPE LINUX LVM (STUDI KASUS: WARNET SAJID.NET SAMBIKARTO, LAMPUNG TIMUR, INDONESIA) Arif Hidayat; Ismail Puji Saputra; Dani Anggoro
JIKI (Jurnal llmu Komputer & lnformatika) Vol 3 No 1 (2022): JIKI Juli 2022
Publisher : Universitas Muhammadiyah Metro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24127/jiki.v3i1.2374

Abstract

Chroot adalah sebuah perintah yang memanfaatkan GNU/Linux Live untuk melakukan pengendalian atau masuk dalam sistem yang ada di komputer. Sebagai contoh apabila ingin masuk ke dalam sistem operasi linux ubuntu namun tidak mengetahui passwordnya atau bahkan lupa passwordnya maka jalan terakhir yaitu bisa menggunakan chroot. Teknik chroot ini juga dapat dilakukan oleh seseorang yang sedang menginvestigasi data digital server linux. Sebenarnya banyak teknik untuk untuk melakukan in investigasi dan chroot ini merupakan salah satu dari teknik yang bisa digunakan. Pada penelitian ini disimulasikan pada sistem operasi linux ubuntu server 14.0. Kemudian software yang digunakan untuk melakukan chroot yaitu Sistem Operasi SLAX 64 bit. Hasil dari penelitian ini yaitu ujicoba kemampuan sistem operasi slax dalam melakukan aksi chroot pada sistem operasi linux ubuntu server 14.04. Dapat disimpulkan bahwa aksi chroot menggunakan OS SLAX terbukti dapat melakukan pengendalian atau masuk dalam sistem operasi linux ubuntu server 14.04. Selain itu juga dengan aksi chroot tersebut dapat melakukan pergantian password user root pada linux ubuntu server.
IMPLEMENTASI CLOUD COMPUTING SEBAGAI RADIUS SERVER PADA JARINGAN INTERNET ROUTER MIKROTIK Ismail Puji Saputra; Ridwan Yusuf; Usep Saprudin
Journal Computer Science and Information Systems : J-Cosys Vol 1, No 2 (2021): J-Cosys - September 2021
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2328.484 KB) | DOI: 10.53514/jc.v1i2.67

Abstract

Banyaknya pengguna internet pada suatu tempat atau instansi menimbulkan sebuah antrian yang menyebabkan sulitnya pengguna dalam mengakses internet. Berdasarkan masalah tersebut penulis mengimplementasikan cloud computing sebagai radius server pada jaringan internet dengan menggunakan Router MikroTik sebagai alat manajemen bandwith, RADIUS (Remote Authentication Dial-In User Service) server akan dibangun didalam server Ubuntu dengan memanfaatkan service cloud computing dari AWS (Amazon WEB Service), selain sebagai RADIUS server, Dengan adanya RADIUS server yang dibangun dengan cloud computing dan Router MikroTik stabilitas jaringan internet pada suatu tempat atau instansi menjadi lebih baik dan proses manajemen pengguna menjadi mudah.
Bot Monitoring Jaringan Pada BMT Mentari Lampung Timur Menggunakan Mikrotik Dan API Telegram Arif Hidayat; Ismail Puji Saputra; Ari Bowo
JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) Vol 5, No 3 (2022): JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)
Publisher : STMIK Pringsewu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jtksi.v5i3.1291

Abstract

Network notifications are very much needed by the network technical team. In addition, network notifications function to provide information to the technical team to find out the current condition of the server or router which is under the supervision of the technical team so that if the server is down, it can be handled quickly. The research method used is DIO Network Lifecycle. DIO Network Lifecycle is a network design method or commonly referred to as a network service life cycle designed to support network development. The research phase begins with design, implementation and operation. The research output produced is in the form of BOT monitoring of the BMT Mentari Lampung Timur network using Mikrotik and the Telegram API.
EFEKTIVITAS CLOUDFLARE GATEWAY DALAM MEMBATASI AKSES PORNOGRAFI SERTA PENGARUHNYA PADA KETERSEDIAAN BANDWIDTH Puji Saputra, Ismail
International Research on Big-Data and Computer Technology: I-Robot Vol 8, No 1 (2024): April
Publisher : UNIVERSITAS DHARMA WACANA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53514/ir.v8i1.526

Abstract

Internet merupakan kebutuhan utama dalam sebuah organisasi. Namun, kebutuhan akan internet tidak selalu sebanding dengan bandwidth yang tersedia. Bandwidth yang terbatas harus diawasi untuk mencegah penyalahgunaan, seperti akses ke konten pornografi. Penelitian ini bertujuan untuk mengevaluasi efektivitas Cloudflare Gateway dalam memblokir situs pornografi dan dampaknya terhadap penggunaan bandwidth. Metode penelitian dilakukan dengan mengimplementasikan DNS Cloudflare Gateway ke dalam router Mikrotik, menguji pemblokiran terhadap 10 situs pornografi terpopuler, dan menghitung perbedaan penggunaan bandwidth sebelum dan sesudah implementasi. Hasil penelitian menunjukkan bahwa Cloudflare Gateway berhasil memblokir 100% situs yang diuji dan menurunkan penggunaan bandwidth sekitar 1,197%. Penelitian ini juga menemukan bahwa penggunaan internet pada objek yang diuji cukup sehat (tidak menyalahgunakan internet untuk pornografi). Sebaliknya, jika penurunan bandwidth sangat signifikan, hal ini mungkin mengindikasikan tingkat penyalahgunaan internet untuk pornografi yang tinggi pada objek yang diuji.
IMPLEMENTATION VOICE OVER INTERNET PROTOCOL (VOIP) AS A COMMUNICATION MEDIA BETWEEN UNIT AT UNIVERSITY MUHAMMADIYAH METRO Arif Hidayat; Ismail Puji Saputra
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i2.603

Abstract

VOIP (Voice over Internet Protocol) is the theology that makes the intranet network even the internet to be able to do voice communications remotely directly. Analog voice signals, such as those heard when communicating on the phone is converted into digital data and transmitted over the network in the form of data packets in real time. In VoIP communications, the user makes a phone connection through a terminal in the form of a PC or a regular telephone (smartphone). With telephones using VoIP, many benefits can be taken include: 1) in terms of cost obviously cheaper than traditional phone rates, 2) network-free, if the internet network is broken VOIP can still be used with notes connected to wifi or wired network, 3) maintenance costs can be pressed due to voice and network data apart, so IP Phone  added, moved and changed. In this research, VOIP is implemented at UM Metro. UM Metro has 3 campuses (Campus 1, Campus 2 and Campus 3) are different areas of location, but still in one City. The result of Voice Over Internet Protocol (VOIP) as communication media between units at UM Metro shows the result of 85, 7% (Strongly Agree) and 14, 3 (Agree), it can be concluded with the existence of VOIP   is very feasible for use as a medium of communication.
Bot Monitoring Jaringan Pada BMT Mentari Lampung Timur Menggunakan Mikrotik Dan API Telegram Arif Hidayat; Ismail Puji Saputra; Ari Bowo
JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) Vol 5, No 3 (2022): JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)
Publisher : Institut Bakti Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jtksi.v5i3.1291

Abstract

Network notifications are very much needed by the network technical team. In addition, network notifications function to provide information to the technical team to find out the current condition of the server or router which is under the supervision of the technical team so that if the server is down, it can be handled quickly. The research method used is DIO Network Lifecycle. DIO Network Lifecycle is a network design method or commonly referred to as a network service life cycle designed to support network development. The research phase begins with design, implementation and operation. The research output produced is in the form of BOT monitoring of the BMT Mentari Lampung Timur network using Mikrotik and the Telegram API.
Implementasi Samba Server untuk Sharing Data Center pada Lab Komputer Universitas Muhammadiyah Metro Prabowo, Danang; Hidayat, Arif; Saputra, Ismail Puji
Jurnal Teknik Informatika UNIKA Santo Thomas Vol 5 No. 2 : Tahun 2020
Publisher : LPPM UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17605/jtiust.v5i2.949

Abstract

Dalam penyelenggaraan kegiatan pendidikan Laboratorium Komputer UM metro telah memiliki dukungan jaringan Teknologi Informasi, Selain itu bahkan sudah menerapkan teknologi internet dan intranet baik di tingkat kampus pusat maupun kampus cabang. Meski demikian, inisiatif pengembangan fasilitas infrastruktur baru selalu dituntut dalam mengembangkan system TI-nya baik di kampus pusat maupun kampus cabang dengan 3 lokasi tempat yang berbeda. Perlunya pengembangan datacenter pada lab Komputer UM Metro yang difungsikan sebagai wadah untuk berbagi data dari server Lab Komputer. Data-data yang bisa dishare misalkan master-master aplikasi installer, aplikasi paket repository, master ISO system operasi, dan dapat dijadikan sarana untuk transfe file dari pengguna ke Server. Penelitian ini menghasilkan Samba Server Untuk Sharing Data Center Pada Lab Komputer Universitas Muhammadiyah Metro. PC Samba Server dapat memfasilitasi dan menjembatani pengguna untuk menyediakan file/ data sharing center yang aman agar terhindar dari virus mengingat manajemennya menggunakan OS Linux Ubuntu. Samba Server dapat diterapkan menggunakan authentikasi yang terdaftar (dengan kata lain hanya user yang terdaftar yang diijinkan masuk ke dalam data center tersebut dan mengakses semua data yang disediakan).