cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Jarkom
ISSN : -     EISSN : 23386312     DOI : -
Core Subject : Education,
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol. 3 No. 1 (2015): Juni 2015" : 6 Documents clear
PENERAPAN QR CODE SEBAGAI KEAMANAN DATA DAN PENGGUNAANNYA UNTUK MEDIA SALING TUKAR DATA ANTAR PARTNER Indra Satria; Dina Andayati; Rr. Yuliana Rachmawati
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Alongwith the rapiddevelopment of information technology, especially with regard tocomputersandthe Internet, data security is acomplex issue, one of whic his the manipulation of data. One way to prevent this is to create data security system that can prevent data manipulation activities and ensure that the data is authentic. In this case, data security technology using the QR code is afairly precise effort. Application of the method QR code on asecret message is one of the solutions in the application of data security systems. This application s built using the QR code with the function of AE Sencryption algorithm that will generatea digital image file is a three-dimensional shape ofthe barcode, then th egiven key as the AES decryption key toopen the message in the QRcode. The results of this application is a data security system that displays the message, as data security efforts. With the application of QR codeis expected to help reduce the activity of data manipulation.
APLIKASI MONITORING KEAMANAN JARINGAN DENGAN MENGGUNAKAN IDS DAN ROUTER MIKROTIK Pidie Wiyanto; Amir Hamzah; Mohammad Sholeh
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study is aimed at making security application of computer network by using snort detection system method and mikrotik. Combining IDS method and IPTables mikrotik is to avoid intruder furthrmore, using web to make admin easily to monitor .This application aims to make system of network computer security easier, based on web and to be analyzed as well as controlled by administrator . this application is made to block ip address that is suspected bringing. The system is capable to processing output data from mikrotik, and it can also recognize all activities an intruder in attempt to infiltrate into the system by using port scanner, the ssh, ftp,then do the bloking of ip address that are considered as intruder after that the system will provide a report to the administrator through webserver of the presence of an intruder who trying to get into the system.
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Muh. Ibnu Habil Hanafi; Suwanto Raharjo; Suraya -
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services. Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks. Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.
ANALISIS KUALITAS FINAL PROYEK WEBSITE MILIK BANK BOYOLALI TERHADAP PENGGUNA AKHIR(METODE WEBQUAL 4.0) Sony Cahyo Wibisono; Amir Hamzah; Uning Lestari
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

website development focuses only on the system, interface and content of the website content without any satisfaction research on the website is presented, this study aims to determine the level of satisfaction of the end user as well as an evaluation before the website was published on the main domain, research methods used WebQual 4.0 and scale linkert as the study interval. WebQual is one method or technique of measuring the quality of a website based on the perception of the end user. 4.0 WebQual method is based on three dimensions of usability, information quality dimensions and dimensional quality of the interaction. In the process of analysis used tranches respondent sample of 100 people consisting of 82 respondents which includes customers and employees as well as the 18 respondents not clients, data collection is divided into 50 respondents using an online questionnaire and 50 respondents using offline questionnaires. The next stage is the analysis of data consisting of validity, reliability and assessment with linkert scale. On the validity of the test using the formula Pearson Bevariate while test reliability using Cronbach's alpha formula. In the assessment using linkert scale with 5 scale interval. Based on the results of the research, the average total value sufficient satisfaction for publicizing the website with some items of the dimensions of quality of interaction that must be repaired.
BANDWIDTH MANAGER MENGGUNAKAN HIERARCHICAL TOKEN BUCKET PADA IMPLEMENTASI VIDEO STREAMING Saryadi K T Soba; Yuliana Rachmawati; Suwanto Raharjo
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Science and technology are increasingly evolving, has brought a wide range of new breakthrough, one that is increasingly technologically sophisticated and modern. This also participate in the field of computerization, computers that previously had limited functions only as a mere data processing, but now is able to play a major role in people's lives everyday. Streaming video service is now urgently needed. It is characterized by many organizations or institutions that use streaming video access in bulk. The use of video streaming en masse this network performasi downs along with the increasing number of users. One way to reduce the decline in performance is to set the bandwidth. Hierarchical Token Bucket (HTB) as implementer management of bandwidth available for free and can be run on Linux Operating system platform is a viable Bandwidth Manager analyzed their advantages and disadvantages, is expected to use proper and accurate will create a network that implements Bandwidth Manager is working optimally
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Yosefina Pantu; Catur Iswahyudi; Rr Yuliana Rachmawati K
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN. The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.

Page 1 of 1 | Total Record : 6