cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Jarkom
ISSN : -     EISSN : 23386312     DOI : -
Core Subject : Education,
Arjuna Subject : -
Articles 6 Documents
Search results for , issue " Vol 2, No 2 (2015): EDISI JUNI 2015" : 6 Documents clear
PENERAPAN QR CODE SEBAGAI KEAMANAN DATA DAN PENGGUNAANNYA UNTUK MEDIA SALING TUKAR DATA ANTAR PARTNER Satria, Indra; Andayati, Dina; Rachmawati, Rr. Yuliana
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTAlongwith the rapiddevelopment of information technology, especially with regard tocomputersandthe Internet, data security is acomplex issue, one of whic his the manipulation of data. One way to prevent this is to create data security system that can prevent data manipulation activities and ensure that the data is authentic. In this case, data security technology using the QR code is afairly precise effort. Application of the method QR code on asecret message is one of the solutions in the application of data security systems. This application s built using the QR code with the function of AE Sencryption algorithm that will generatea digital image file is a three-dimensional shape ofthe barcode, then th egiven key as the AES decryption key toopen the message in the QRcode. The results of this application is a data security system that displays the message, as data security efforts. With the application of QR codeis expected to help reduce the activity of data manipulation. Keywords : QR code, encryption function, AES, authentic.
APLIKASI MONITORING KEAMANAN JARINGAN DENGAN MENGGUNAKAN IDS DAN ROUTER MIKROTIK Widianto, Pidie; Hamzah, Amir; Sholeh, Muhammad
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThis study is aimed at making security application of computer network by using snort detection system method and mikrotik. Combining IDS method and IPTables mikrotik is to avoid intruder furthrmore, using web to make admin easily to monitor .This application aims to make system of network computer security easier, based on web and to be analyzed as well as controlled by administrator . this application is made to block ip address that is suspected bringing. The system is capable to processing  output data from mikrotik, and it can also recognize all activities an intruder in attempt to infiltrate into the system by using  port scanner, the ssh, ftp,then do the bloking of ip address that are considered as intruder after that the system will provide a report to the administrator through webserver of the presence of an intruder who trying to get into the system. Keyboard :security system, intruder,Instrusion detection system, Mikrotik
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Hanafi, Muh. Ibnu Habil; Raharjo, Suwanto; ., Suraya
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTSome of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services. Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks. Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.  Keywords: WiFi, Server, FreeRADIUS, Network.
PENGONTROLAN VPS (VIRTUAL PRIVATE SERVER) SEBAGAI SERVER RADIO STREAMING VIA ANDROID Hidayat, Rohmat; Sutanta, Edhy; Raharjo, Suwanto
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTRadio streaming is a technology for multimedia services are growing rapidly and become a trend at the moment is real-time multimedia, interactive and holding a very important role in todays society as a medium which is very actual for entertainment, information or business. Radio streaming service on computer networks generally involve a multipoint communication over the two sides simultaneously (server and client), which skipped on a TCP/IP network.On this research will be implemented a streaming server radio built on a VPS (virtual private server) namely a technology side about server operating systems and software that allows a machine with large capacity divided into several virtual machines. Every virtual machine serving the operating system and software independently and with new configuration that fast. With the technology advancement is very fast currently it is possible to develop a remote desktop application of a smartphone to a virtual machine.The trial was done in accordance with the principle of radio stream, where as the purpose of the research is how to develop the application as a streaming radio server control by leveraging advances in technology of mobile devices both smartphone or Android-based tablet PC anywhere so long as connected to the internet network. Give the admin a streaming radio the ease in doing his job without having to always carry a laptop or even a PC computer to do broadcasting a radio stream. Keywords: android, streaming radio, server, smartphone.
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachamawati, Rr.Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap. Keywords : IDS, intruder, network security
ANALISIS KUALITAS FINAL PROYEK WEBSITE MILIK BANK BOYOLALI TERHADAP PENGGUNA AKHIR(METODE WEBQUAL 4.0) Wibisono, Sony Cahyo; Hamzah, Amir; Lestari, Uning
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTwebsite development focuses only on the system, interface and content of the website content without any satisfaction research on the website is presented, this study aims to determine the level of satisfaction of the end user as well as an evaluation before the website was published on the main domain, research methods used WebQual 4.0 and scale linkert as the study interval. WebQual is one method or technique of measuring the quality of a website based on the perception of the end user. 4.0 WebQual method is based on three dimensions of usability, information quality dimensions and dimensional quality of the interaction.In the process of analysis used tranches respondent sample of 100 people consisting of 82 respondents which includes customers and employees as well as the 18 respondents not clients, data collection is divided into 50 respondents using an online questionnaire and 50 respondents using offline questionnaires. The next stage is the analysis of data consisting of validity, reliability and assessment with linkert scale. On the validity of the test using the formula Pearson Bevariate while test reliability using Cronbachs alpha formula. In the assessment using linkert scale with 5 scale interval.Based on the results of the research, the average total value sufficient satisfaction for publicizing the website with some items of the dimensions of quality of interaction that must be repaired.Keywords: The reliability, Linkert, Validity, WebQual

Page 1 of 1 | Total Record : 6