cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
TEKNOLOGI INFORMASI
Published by STMIK PRADYA PARAMITA
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 132 Documents
ANALISIS SISTEM KEAMANAN HOTSPOT DENGAN MENGGUNAKAN HONEYPOT DAN IDS DI KAMPUS STMIK PPKIA PRADNYA PARAMITA MALANG Zainuddin, Ahmad; Affandi, Luqman; Duty Susilo, Antonius
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 5 NO. 2 TAHUN 2014
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Campus STMIK PPKIA Pradnya Paramita Malang an informatics-based private university in Malang. Security Hotspot used Mikrotik is using a security system. Users who use Hotspot itself is the lecturer and students. Honeypot and IDS is a tool to help security systems that still use Mikrotik Hotspot. Every time there is an attack action using Hotspot then stored into a log of activities each server. Honeypot itself is useful as a shadow Server or Server fake to fool the server where the original moment of the attack. The attack can be done in antaralain Hotspot network using scanning techniques, Arp Spoofing and DDOS. The ultimate goal of this research is to provide a recommendation of Honeypot and IDS analysis results that are tailored to the security system "STMIK PPKIA Pradnya Paramita Malang" and determine the performance of software after testing on Honeypot and IDS. The results of the study indicated that the Snort IDS is able to give a warning on the attack quite well and would be even better if combined with a low interaction and high interaction honeypot honeypot because besides being able to provide better alerting honeypot able to learn what is done by the attacker. Keywords: Honeypot - IDS, Snort, Mikrotik, Server,STMIK PPKIA Pradnya Paramita Malang
PERBANDINGAN METODE-METODE EDGE DETECTION UNTUK PROSES SEGMENTASI CITRA DIGITAL Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 2 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Edge detection (Edge detection) is executed to detect the operating margins (edges) that restricts two homogeneous image regions with different brightness levels (Pitas, 1993). A digital image edge detection is the process of looking for differences in the intensity of the states boundaries of an object (sub-images) in the entire digital image in question. Purpose of edge detection is to improve the appearance of the boundary line of an area or object in the image. The process of image edge detection is done by looking for the locations of the intensity of the pixels that discontinue with the intensity of the pixels adjacent (neighboring / neighborhood).There are several methods such as object edge detection operators are known, such as (1) Sobel, (2) Prewitt, (3) Robert, (4) Laplacian of Gaussian, (5) and Canny (6) Kiresh. Each operator has its own advantages and disadvantages in performing edge detection. By doing a combination or in the development of these operators allow to gain a better edge detection (obviously).One of the contributions of this study for science and technology is the creation of a software application that can be used as a simulation tool using edge detection operators in digital image and its various combinations in order to gain a better edge detection (obviously).Keywords: Edge detection, detection operator
PERANCANGAN SISTEM KONEKTIFITAS INTRANET-INTERNET DENGAN MENGGUNAKAN KONSEP NAT Purwandi, A.W.
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 1 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Intranet can be related to the Internet, and vice versa. To connect your intranet to the internet a lot of things to watch for the efficient and effective connectivity. Some important things that are addressing and internet security. Internet protocol used in the TCP / IP (Transmission Control Protocol / Internet Protocol), requires that every host or intend to connect computers into a network must have a unique IP address. So that when the intranet was about to be connected to the internet or any host computer that is connected must have an IP address in accordance with the rules of the addressing used in the internet. The concept of NAT (Network Address Translator) provides a solution to overcome the limitations of available IP addresses. Masquereding IP is the internet service which is the application of the concept of NAT that can reduce the demand for new IP addresses connecting ourselves into the internet and intranet can improve security. Masquereding IP is one of the additional capabilities on LINUX operating system. Keywords: TCP / IP, NAT Concepts, IP Masquerading, LINUX
MEMBANGUN SERVER VOIP DENGAN ASTERISK DI LINUX BESERTA ADMINISTRASI USER BERBASIS WEBSITE Setyowibowo, Sigit; ., Syahminan
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 1 NO. 1 TAHUN 2010
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of computer network allows for rapid pass voice traffic over computer networks or common called VoIP (Voice Over Internet Protocol). Voice over Internet Protocol (VoIP) is a technology capable of passing voice traffic and video or even a form of data packets over a computer network based on IP (Internet protocol). Major emphasis of VoIP (Voice Over Internet Protocol) is the cost. With two locations that are connected to the internet or network then the conversation becomes very low cost even close to free (Rp0, 00 -). This system is designed using an asterisk on fedora 7 -1.6.0.13 Keywords : VoIP (Voice Over Internet Protocol)
OTOMATISASI ACL SQUID PROXY SERVER BERBASIS WEB Ragil Prihantoro, Candra
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 4 NO. 2 TAHUN 2013
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Squid is the most widely used program by the network administrator as a program for squid proxy server is open source ( free ) that can be modified according to our wishes.               In use squid proxy server must be configured directly to its squid file is to create a functioning ACL ( Access Control List ) manually . By writing scripts ACL ACL settings manually create quite prone to errors in setting and writing , it is because the complexity of the placement and write ACL scripts . If the administrator does not have the skills in the proxy server settings are still manually or still typing some script ACL , there will be difficulties in squid proxy server settings . Based on this background, the need for automation in the ACL Squid proxy -based web server that serves to facilitate configure squid proxy server in order to provide convenience and minimize errors on the write command squid proxy server ACL.        The method used for the design automation Acl Squid Proxy Server Based Web consists of several stages: planning , data collection , analysis , design , system design , application development and preparation of reports.The results of this study in the form of web-based applications that can be used by the client to perform ACL configuration on squid proxy server so that the configuration changes made by administrators using the web based applications that have been made .         Key words : Squid Proxy Server , Access Control List Squid , Otomatisasi  Web based ACL 
PROTOKOL TCP/IP SEBAGAI SARANA DALAM PROSES TRANSFER DATA Yunus, Mahmud; As’ad, M.
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study entitled Protocol TCP / IP as a means to transfer this data, carried out in laboratory STMIK PPKIA Pradnya Paramita Malang in order to find out how the working process of the protocol TCP / IP and obtain a clear picture of how the protocol TCP / IP plays a role in communication within the users computer internet. This research is the development presented in descriptive form, which is analyzing the data transfer process is one of them by using the protocol TCP / IP. The results could determine the level of error that occurred while sending and receiving data, and can be used as a reference untu networking development. Keywords:Protocol, Protocol TCP/IP, Transfer Data
WEBSITE PARAMITA MEMBER CLUB DENGAN MENERAPKAN MODEL AFFILIATE MARKETING Safitri, Ayu; ., Sujito
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 2 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Member Club Website Paramita affiliate marketing by applying the model was built with the aim to extend the range of netting prospective freshmen. The method used in this study is the method of data collection and system development methods. In the method of data collection conducted the interview on the new admissions as well as library research done either through library research results of previous studies, related literature and research records and documents relating to the research firm. System development method used is method SDLC (System Development Life Cycle) with the stages that include system analysis, system design, implementation and operation and maintenance. Of research has been done can be obtained form the website awakening Paramita Member Club that implement affiliate marketing models and implemented database system on the website Paramita Member Club as an alternative to extend the range of netting new students in Malang STMIK PPKIA Pradnya Paramita. Keywords: Website, Affiliate Marketing
RANCANG BANGUN SISTEM PAKAR UNTUK MENDIAGNOSIS PENYAKIT KULIT PADA USIA ANAK-ANAK Gomes De Jesus, Salvador Da Costa
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 5 NO. 2 TAHUN 2014
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Childrens health is important. Children are very susceptible to germs. Health of children should be considered by parents, especially skin diseases in children. With the skin disease diagnosis expert system can provide a solution and feedback to parents about issues in the diagnosis of skin disease in their children. This expert system itself is designed using forward chaining method is a forward chaining reasoning from facts first started to test the truth of the hypothesis . With the diagnosis of a user request, the diagnosis will be processed in the system, then the results will be presented again to the user. While making an application for a website using PHP as a scripting language and MySQL as database data storage. With the expert system user can directly consult a software system without having to consult with an expert ( a pediatrician ) . Because the application of expert system can provide a solution and feedback to the user about the problem in terms of diagnosing child illnesses. Key words : Expert skin diseases, Forward chaining, Children
MEMANFAATKAN SISTEM OPERASI LINUX UNTUK KEAMANAN DATA PADA E-COMMERCE ., Isnania
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

E-commerce is one of the major networks to do the transaction, where security is an issue that must be considered vital to the security of customer data and transactions. To realize the process of e-commerce, let prepared operating system (OS) that are reliable to secure the transaction path and also Dynamic Database back end that provides a product catalog that will be sold online. For technology, we can adopt open source technologies that are all available on linux. On linux its too bundles Apache web server that integrates with SSL technology (Secure Socket Layer) server and email facilities (able to use sendmail, small or qmaill) and also has the availability of MySQL Database. For the front end we can use Perl, C and PHP which has been used about 1,000,000 Website / sereer in the world. SSL technology (Secure Socket Layer) encryption method, wherein the method is a mathematical method to randomize the information submitted. SSL also supports the identification of even complex digital systems. Keywords: SSL (Secure Socket Layer), E-commerce, Linux, Firewall, Web server
SISTEM PAKAR DIAGNOSA UNTUK MEMBANTU PROGRAM PENGONTROLAN BERAT BADAN Wisnu Gumilang, Komang
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 2 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Useful as a decision support system that can support systems and decision support that leverages the benefits of human and electronic devices such as computers. Too much use of computers will result in a mechanical solution, a reaction that is not flexible, and shallow decisions. Whereas if you use too many men will bring a slow reaction, the utilization of the data which is too limited, and lags in reviewing the relevant alternatives. The purpose of this expert system design is to create software on weight control. Software used to build an expert system is Visual Basic 6.0. Results to be achieved in the design of this system is a software that can serve as an expert for weight control. Keywords: Expert Systems, Control Weight Loss

Page 3 of 14 | Total Record : 132