cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Magazine
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 3 Documents
Search results for , issue "Vol 6, No 1 (2006): Sikomtek" : 3 Documents clear
BANDWTIH MANAGEMENT USING "XXX" BANDWIDTH MANAGEMENT WAN ISP IN Aqwam Rosadi Kardian
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Often found that the process of communication and information access data on each userconnected to the BTS was slow, this was due to bandwidth capacity (Line Data) that alreadyexists is not sufficient (over load). Yet when used in accordance with the needs of theexisting bandwidth is sufficient, because of this necessary action to avoid an excessive use ofbandwidth to each user, so that a large bandwidth is used more optimal, efficient and achievethe QOS (Quality Of Service)
IMPLEMENTATION USING DATA SECURITY XOR encryption MODEL ALGORITHM Hariyanto Hariyanto Hariyanto
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The problem of data security is a problem frequently faced by computer users especially ifthe data is communicated with the other computer, where data needs to be protected to avoidabuse by people who are not entitled the data. One of the things that are important in ensuringthe confidentiality of the data is to use encryption techniques. Encryption dalah a process thatchanges a code of conduct that can be understood (plaintext) into a code incomprehensible(not readable / ciphertext)). One method used for the encryption algorithm is the ExclusiveOR logical operators (XOR) the plaintext data which is converted into ASCII code stored inbinary form (ciphertext) so that data can not be read without knowing the decryption key.XOR encryption methods can be implemented through various programs, one of them usingVisual Basic software, allowing you seen changes in the data (encryption) from plaintext intociphertext and decrypt the data through changes back into plaintext.
SECURITY ENCAPSULATING PAYLOAD IP SECURITY PROTOCOL IN AS Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today's world of information about crime on the Internet computer network, such as attacks,especially viruses, worms, Trojans, Denial of Service (DoS), Web defacement, hijackingsoftware, up to the problem of theft of credit card more often adorned the pages of massmedia. Crime in the world of computers continues to increase in line with the developmentand advancement of science and technologies in this field. This challenge is actually alreadyappeared since the beginning. Encapsulating security payload (ESP) is a protocol used inInternet Protocol Security (IPSec) and in addition the Authentication Header (AH) is anotherprotocol which is a service that provides confidentiality, and authentication.In this article will discuss about the encapsulating protocol IPsec Security as a service.

Page 1 of 1 | Total Record : 3