Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Ilmu Komputer dan Sistem Informasi (JIRSI)

Rancang Bangun Desain Ui/Ux Pada Pembuatan Startup Aplikasi Selfcare Berbasis Website M Lutfi Akbar; Ari Usman; Arief Budiman
Jurnal Ilmu Komputer dan Sistem Informasi Vol. 2 No. 1 (2023): Januari 2023
Publisher : LKP Unity Academy

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

During this pandemic, people are advised not to make physical contact and meet people who are not important. And many various product sellers switch to e-commerce or website-based online transactions, in making the website it is very necessary to have an attractive UI/UX design. In making the UI/UX design display, an application called figma is needed. Therefore, the researcher will design and build a UI/UX design in making a website-based selfcare application to make it easier for customers and sellers to transact buying and selling these products.
Keamanan Jaringan Hotspot Mikrotik Menggunakan Metode Otentikasi Pengguna dengan Captcha dan IP-Binding Untuk Filtering User Muhammad Rayza; Ari Usman; Arif Budiman
Jurnal Ilmu Komputer dan Sistem Informasi Vol. 2 No. 3 (2023): September 2023
Publisher : LKP Unity Academy

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the most common services provided for internet users is a hotspot network. This hotspot functions as a public area equipped with wireless network access. Numerous hotspot locations are available, with some even offering free access, allowing everyone to enjoy this service without any charges. However, security concerns are a significant focus in utilizing hotspot facilities in public zones due to the open nature of these places. Additionally, the use of hotspot networks also has a drawback - the existence of security vulnerabilities due to a lack of administrative attention. Based on findings from existing literature, an effective approach to enhancing wireless security involves user authentication through CAPTCHA and IP-binding methods for user filtration. It is anticipated that this user authentication method can optimize hotspot network security, ensuring that only authorized and registered individuals can access the service.