cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Magazine
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 39 Documents
Secure Socket Layer Virtual Private Network (SSL VPN) Eriek Eriek Orlando
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In a fast moving business environment today, a company needs a means of communicationthat has wide coverage and high levels of availability. SSL VPN is a solution using theinternet that already available. Compared to networks or frame relay leased lines, SSL VPNsuse existing infrastructure on the Internet for exchanging data between a corporateheadquarters and branch offices.
BANDWTIH MANAGEMENT USING "XXX" BANDWIDTH MANAGEMENT WAN ISP IN Aqwam Rosadi Kardian
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Often found that the process of communication and information access data on each userconnected to the BTS was slow, this was due to bandwidth capacity (Line Data) that alreadyexists is not sufficient (over load). Yet when used in accordance with the needs of theexisting bandwidth is sufficient, because of this necessary action to avoid an excessive use ofbandwidth to each user, so that a large bandwidth is used more optimal, efficient and achievethe QOS (Quality Of Service)
IMPLEMENTATION USING DATA SECURITY XOR encryption MODEL ALGORITHM Hariyanto Hariyanto Hariyanto
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The problem of data security is a problem frequently faced by computer users especially ifthe data is communicated with the other computer, where data needs to be protected to avoidabuse by people who are not entitled the data. One of the things that are important in ensuringthe confidentiality of the data is to use encryption techniques. Encryption dalah a process thatchanges a code of conduct that can be understood (plaintext) into a code incomprehensible(not readable / ciphertext)). One method used for the encryption algorithm is the ExclusiveOR logical operators (XOR) the plaintext data which is converted into ASCII code stored inbinary form (ciphertext) so that data can not be read without knowing the decryption key.XOR encryption methods can be implemented through various programs, one of them usingVisual Basic software, allowing you seen changes in the data (encryption) from plaintext intociphertext and decrypt the data through changes back into plaintext.
EMAIL AND MAILING LIST Desy Diana Diana
Majalah SIKOMTEK Vol 6, No 2 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This day many are starting to use email as a means of correspondence, which quickly andaccurately so there are no limitations of space and time between the sender and the recipientwhile they are still biased to connect to the internet, it will cost you only pay for any freeinternet use. With a variety of benefits that email becomes the means who loved today.
Acquisition Data System Through the Internet Networking Case Study Room With Temperature Measurement Sensor DS1621 INDRIANTO INDRIANTO INDRIANTO
Majalah SIKOMTEK Vol 6, No 2 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sensor in industrial and other much needed because with the sensor adannya industrial areascan be easily able to control equipment remotely. The sensor can be used if there is a series ofADC and DAC, and required a calibration for the sensor can measure an exact quantity. Byusing DS1621 sensors then it is not necessary because the DS1621 is a sensor that 'smart'(Intelegent Sensor). DS1621 does not require the microcontroller and does not requirecalibration.Temperature Measuring Equipment Design Room With DS1621 Sensor Networks ThroughInternet-Based Personal is a tool for censorship that uses DS1621 temperature. Data sent bythe temperature sensor can be retrieved through the Internet network so that this equipmentcan be accessed from anywhere as long as it is connected with the Internet. This circuit has atemperature of -20 C. .......+ 125 Software used to display the results of temperaturemeasurement is HTML. Use the Windows 2000 server as a server on this design is veryhelpful. Because it makes nearly all computer activity becomes easier, faster and fullyintegrate with the Internet because there are DNS (Domain Name System) and IIS (InternetInformation Service).
Network Connection BETWEEN TWO COMPUTER USING THE USB CABLE NETWORK / BRIDGE WITH CHIP BRIDGE PL 2501 Nenny Nenny Anggraini
Majalah SIKOMTEK Vol 6, No 2 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network connection is about building a simple network between two computers withoutusing an ethernet card via a USB port. The problem that arises is the USB system is designedonly to communicate with USB devices, so that between the USB Host Controller on acomputer can not directly connect with USB Host Controller on the other computer.By using a USB cable Network / Bridge as a USB device, the USB Host Controller cancommunicate with each other. USB Cable Network / Bridge features an electronic circuit thatfunctions as a regulator of the data traffic from the USB Host Controller on computer A toUSB Host Controller on computer B and vice versa. So in building a network through theUSB port is required equipment as a medium of communication between the USB HostController.
EVIL COMPUTER SYSTEM RISTYAWATI RISTYAWATI RISTYAWATI
Majalah SIKOMTEK Vol 6, No 2 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer crime can be categorized as crimes of "White Colar Crime", which operates inmore use of the mind or brain. Definition of Cyber crime is any act that harm others orcertain parties who performed on digital media or with the aid of digital devices.
UPC-A AS A FORM OF BARCODE AND HOW MANUFACTURE MANUAL Saepul Lukman Lukman
Majalah SIKOMTEK Vol 6, No 2 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Barcode is a special code that shaped arrangement of vertical bars varying in width andinterspersed with an empty space / white space. Barcodes are used in general to give a specialmark or specific identification of the goods / items different from his own specifications.Barcodes can be read and encoded by using a tool moving / Barcode Scanner.
SECURITY ENCAPSULATING PAYLOAD IP SECURITY PROTOCOL IN AS Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today's world of information about crime on the Internet computer network, such as attacks,especially viruses, worms, Trojans, Denial of Service (DoS), Web defacement, hijackingsoftware, up to the problem of theft of credit card more often adorned the pages of massmedia. Crime in the world of computers continues to increase in line with the developmentand advancement of science and technologies in this field. This challenge is actually alreadyappeared since the beginning. Encapsulating security payload (ESP) is a protocol used inInternet Protocol Security (IPSec) and in addition the Authentication Header (AH) is anotherprotocol which is a service that provides confidentiality, and authentication.In this article will discuss about the encapsulating protocol IPsec Security as a service.

Page 4 of 4 | Total Record : 39