Claim Missing Document
Check
Articles

Found 31 Documents
Search

PENGONTROLAN AKSES INTERNET MENGGUNAKAN MODEL OTOMATA DENGAN MEMANFAATKAN LOG PROXY SERVER Setyowibowo, Sigit; Wahyunungsih, Dian
WIDYA TEKNIKA Vol 22, No 2 (2014): Widyateknika Vol. 22 No. 2
Publisher : Universitas Widyagama Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Duplicatet asks owned by admin Internetin STMIK PPKIA Pradnya Paramita resulted admin Internet can not linger on the configuration computer to an Internet server so often negative sites can be accessed freely. To anticipate the necessary control to access the Internet by installing Squid proxy server. To further enhance the ability of the proxy server, can be done by analyzing the log proxy server, because the record contains a record of the users Internet access. Needed a method to read and analyze the log file because the file is recorded in the text squensial. The method used is a deterministic Turing machine is a finite state machine that has a two - way tape. Analysis of the log file will produce rules that can be read and understood by the Squid proxy server. The rules are access control list (ACL) that is then returned by the proxy server configured. Based on the results of the configurations quid ability will always be up to date and can ease the work load of the Internet admin.     Keywords: Pengontrolan, Proxy Server, otomata, dan log proxyserver..
MODEL PEMBELAJARAN TEKNOLOGI INFORMASI DAN KOMUNIKASI PADA SEKOLAH LANJUTAN TINGKAT PERTAMA Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The use of computers today are not just limited to the processing and manipulation of data alone but can also be used to create application programs related to education, especially the lessons of ICT by using a recorded human voice first. The purpose of this study was to create a learning application program of ICT in an interactive and communicative-based computer so that in the learning process is expected to run in both directions. The program also aims to reduce the saturation of the students in receiving the material being taught. Software (software) to program a computer learning aids Information and Communication Technology was created using Macromedia Flash program. Keywords: Help Program, Information and Communication Technology, Macromedia Flash
APLIKASI SISTEM PENDUKUNG KEPUTUSAN DIAGNOSA PENYAKIT PARU-PARU DENGAN METODE FORWARD CHAINING Yunus, Mahmud; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 2 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In Indonesian lung disease have a high death. Tubercolosis (TB) world report (2006) by World Health Organization (WHO), Indonesia still the third biggest after India and China with around 539.000 cases and around 101.000 peoples die for a year. Derived from those fact it need more attention from mass society. My research can be used to decision support system which used to lung disease diagnosed, and know what kind of disease from their symptom. Decision support system use production rule method for representating knowledge about the kind of lung disease and their symptom. This inference engine use tree method and forward chaining. Result derived from this research shown that tree method and forward chaining can be used in finding lung disease from their symptom.  Key words: tree, forward chaining, lung.
IMPLEMENTASI SNORT SEBAGAI ALAT PENDETEKSI INTRUSI MENGGUNAKAN LINUX Setyowibowo, Sigit; Affandi, Mohammad
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 4 NO. 2 TAHUN 2013
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network security system on the server is an important factor to ensure the stability , integrity and validity of the data . Implementation of Snort -based Intrusion Detection System can save the cost of procurement of software because it is free and quite reliable in detecting security attacks . Snort -based IDS systems can be implemented on the Linux operating system . Snort main settings and network settings , especially on existing Snort rule . An attack can be detected or not by SnortI IDS , depending on the presence or absence of an appropriate rule. Testing the IDS system was done with several attack patterns to test the reliability of Snort to detect an attack against the security system . Based on the results of testing the system Snort IDS with ping , nmap port scanning , exploits , SQL Injection , accessing the database . Snort can provide warning of an attack against the security of a network system . The warning results can be used as a reference for determining the network security policy. Key words : Linux , Intrusion Detection System , Snort
MODEL PEMBELAJARAN MATEMATIKA ONLINE BERBASIS MOBILE LEARNING MELALUI WAP (WIRELESS APPLICATION PROTOCOL) UNTUK SEKOLAH MENENGAH ATAS Setyowibowo, Sigit
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 1 NO 2 TAHUN 2010
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Math was always regarded as the most intimidating subject of learning by the students. For that we need the development of various teaching methods, devices and apparatuses are needed to support the process of teaching and learning activities that teach not only targets are met but the discussion of student learning in the eye is also fulfilled. Hopefully with the online mathematical learning model using WAP-based mobile learning as an alternative media is expected to provide facilities and Visualization of knowledge so that knowledge becomes attractive and the young understood. Keywords: Matematika ,Online, WAP (Wireless Aplication Protocol) 
APLIKASI SISTEM MONITORING PENJUALAN DISTRIBUTOR DI PR. SUMBER DJAYA Setyowibowo, Sigit; Nugroho, Timtim Sulistiono
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 3 NO 1 TAHUN 2012
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Marketing Unit is a unit in one of the PR. Djaya sources that have a role in the process of marketing to contribute to the companys sales. Based on examination of Sales Monitoring Applications that are running there are things that can be developed further, which simplify and accelerate the computation recapitulation bills and distributor sales effectiveness. With the optimized system is expected to meet sales targets planned. Hopefully this simple information systems can be an additional solution to overcome the problems in the implementation and reporting system that is running. Key Words: Application Monitoring Sales Distributor in PR. sources Djaya
MEMBANGUN SERVER VOIP DENGAN ASTERISK DI LINUX BESERTA ADMINISTRASI USER BERBASIS WEBSITE Setyowibowo, Sigit; ., Syahminan
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 1 NO. 1 TAHUN 2010
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of computer network allows for rapid pass voice traffic over computer networks or common called VoIP (Voice Over Internet Protocol). Voice over Internet Protocol (VoIP) is a technology capable of passing voice traffic and video or even a form of data packets over a computer network based on IP (Internet protocol). Major emphasis of VoIP (Voice Over Internet Protocol) is the cost. With two locations that are connected to the internet or network then the conversation becomes very low cost even close to free (Rp0, 00 -). This system is designed using an asterisk on fedora 7 -1.6.0.13 Keywords : VoIP (Voice Over Internet Protocol)
SISTEM INFORMASI AKADEMIK BERBASIS WEB DI SMK NEGERI 1 SEMBORO Hartono, Marga; Mumpuni, Indah Dwi; Setyowibowo, Sigit
DINAMIKA DOTCOM DINAMIKA DOTCOM Vol 5 No 1 TAHUN 2014
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this globalization era, a information can be spread rapidly, even just in a matter of second information can be accepted and delivered. A very useful information for all the people, and valueless moreover, in an institution and company.Through the information quickly and correctly to facilitate a lot of things wothy to gain information needed, for example businessman, the shops, enterpreneurs, restaurants, private education institutions as well as the country. Through the information quickly and correctly, exchange of information that will further develop and extends it.Because it, writer takes the theme about the information system based on the WEB. Academic with the existence of a web information can be packaged with such a way that information expressed can reach the target. In addition, the web potentially a good alternative and profitable for any storage medium information to the public at large. Key words :  Academic Information Systems, Website
ANALISIS ONLINE SHOP DI INDONESIA MENGGUNAKAN TOOLS ALEXA.COM KATEGORI FORUM ONLINE DAN IKLAN BARIS Setyowibowo, Sigit; Firdaus, Nasrul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi Vol 6 No 1 Tahun 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi informasi yang semakin pesat menimbulkan banyak hal baru bermunculan salah satunya yaitu online shopping, Online Shopping adalah pembelian barang maupun jasa yang dilakukan melalui internet, Indonesia menduduki peringkat ke-4 tertinggi di Asia Tenggara dalam populasi pemakaian internet pada tahun 2014, hal ini mengindikasikan bahwa Indonesia merupakan pasar yang menjanjikan dalam bisnis online shopping. kaskus.co.id, berniaga.co.id, olx.co.id merupakan contoh dari beberapa situs online shooping diindonesia, penelitian ini bertujuan untuk memberikan rangking dari ke-3 situs tersebut untuk nantinya dapat digunakan sebagai bahan pertimbangan bagi penjual dalam memasarkan produknya. Penelitian ini mengguna menggunakan situs pemeringkatan dalam metode pemberian rangking yaitu alexa.com Keywords: online shoping, forum online , alexa.com
KEAMANAN AUTHENTIKASI HOTSPOT MENGGUNAKAN CAPTCHA Prasetyo, Kiki Pradikta; Widiyanti, Rahayu; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 6 NO 2 TAHUN 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hotspot networking SMKMuhammadiyah2Malang do not have a good security system that can be used by unauthorized users. With the issue of the security system research and design that has a hotspot networks security level better than before. The purpose of this study is to secure hotspot network of ilegal users by adding a captcha in the authentication process using MikroTik hotspot. Data collection methods used to analyze the data and make the information that will be used to determine the problems faced. System development method using the waterfall method. The use of captcha on the authentication process hotspot login page in SMK Muhammadiyah 2 Malang using Mikrotik has not been able to provide evidence of the power system network security hotspot. This is evidenced by the test using a brute force attack techniques. The testing process using the same time frame with the type of passwords that are very weak and not obtained differences of the results achieved. Hotpsot proxy authentication security system based captive portal using only user and password as the authentication process already has a good level of security even without using captcha. Keyword:Networking Security, authentication, hotspot, captcha.