cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Magazine
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol 5, No 2 (2005): Sikomtek" : 6 Documents clear
CONCEPT OF PROTECTION AGAINST COMPUTER VIRUSES AND DETECTION PERFORMANCE Trojan trojan virus Maria Sri Wulandari
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer security is not considered important by many people apparently can take a big lossfor that person. If further research proved many things - things that can threaten data -personal data through computer media. There is now a lot of programs - programs that aremalicious as viruses, worms, trojans and other when infecting our computer system mayresult in losses for us. Trojan Horse or better known as the "Trojan" in the computer system ispart of a digital infection whose presence is not expected by the owner of the computer.Trojan consisting of the functions of unknown purpose, but in broad outline has destructiveproperties.Trojans go into a computer over a network is inserted at the time by surfing with physicalmedia. Trojan does not take effect directly as well as computer viruses, but the potentialhazards can be far greater than computer viruses. Trojans can be activated and controlledremotely or by timer. Remote control as the Remote Administration Tools, which is theserver version will be controlled by the attacker through his version of the client. Many thingscan be done by an attacker if the victim's computer that has been controlled. Certain unusualports open trojan indicate active events.Handling Trojan can be done in two ways, n
CARD READER RISTYAWATI RISTYAWATI RISTYAWATI
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of electronic world-sized chips are currently produced many havebeen implemented in a card-card technology that will replace the previously used magneticdata. With the addition of the processor chip in a data card allows card data to further processthe data contained in it so many additional features such as additional data security featuresand other applications become increasingly easy to do.Card Reader Technology has entered a new phase, with a starting number of applications thatare built based card reader resulted in a lot of hardware manufacturers to produce devicescard reader, but to get the card reader is still to be imported. Also generally Card Reader onthe market still need a computer card reader because it was designed for a variety ofapplications that need to be flexible with the application to be built by the consumer.
Implementation of Encryption Techniques on Computer Networks For Data Security In Review of reliability Maria Maria Ulfa
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Issues of security and confidentiality of data is one important aspect of information systems.In this case, is closely related to how important such information and data sent and receivedby a person of interest. Information will be no longer useful in the middle of the road whenthe information was intercepted (dihecker) by people who are not responsible or eligible. Inthis paper we discuss about the security of data in a computer network system usingencryption techniques (encryption) PGP (Pretty Good Privacy) are reviewed in terms ofreliability. PGP is used to encode a file so that only the intended person or the owner re-filesthat can describe and create digital signatures.In this proposal also exemplified how to use PGP as a reliable security systems, engineeringand implementation of PGP encryption in PGP in the digital signature. PGP is also used tosecure e-mail sent or received by users. [1]
PROJECTION ANALYSIS OF CHANGES IN FIXED ASSETS grouping LISTED ON COMPUTER ACCOUNTING Ministerial decree BASED No.KMK138/KMK.03/2002. HERU HERU SUHARJO
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The policy changes in the grouping of Fixed Assets will be an obstacle for Accountants and taxpayers to analyze the projections pencataatn, particularly the application of Computer Equipment pencataan calculations. While the goals to be reach of this paper is: To determine changes in the grouping of Fixed Assets by application of recording fixed assets, especially Computer calculations are based on the Decree of the Minister of Finance KMK 138/KMK..03/2002. The method used to compare the analysis with the method of calculating the projection of a straight line and declining balance method. As a result of this discussion, because the value of obsolete and value the benefits of Fixed Assets Computers so quick to encourage policy changes in the grouping of Fixed Assets, the Fixed Assets Computer need penyesuaikan groupings.
DATA STORAGE PROJECT ON THE LINE WEB-BASED Linda Wahyu Widianti
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data storage is the most important things done because it is a way for archiving files. Data storage is also a documentation of all activities will be oriented on the use and processing. In terms of data storage can not only be done on a computer or data storage across local network only, but in the current world development technology that is growing and the mobility of its users to follow the development of data storage can be done online. It is intended to facilitate the users to be able to store data anywhere, anytime. Will fully understand the performance of its users to be able to continue to work as closely as possible without knowing, time and place. So this is where the role of information technology is actually in use. With web media, it would not only be used for media publications, but also able to be used for storing data online.
Secure Socket Layer Virtual Private Network (SSL VPN) Eriek Eriek Orlando
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In a fast moving business environment today, a company needs a means of communicationthat has wide coverage and high levels of availability. SSL VPN is a solution using theinternet that already available. Compared to networks or frame relay leased lines, SSL VPNsuse existing infrastructure on the Internet for exchanging data between a corporateheadquarters and branch offices.

Page 1 of 1 | Total Record : 6