Claim Missing Document
Check
Articles

APLIKASI RSS READER MENGGUNAKAN AJAX DAN JQUERY Saputra, Rendi; Hamzah, Amir; Raharjo, Suwanto
Jurnal Script Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Script

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT The development of rapid information technology makes the need for information / news more so urgently needed. To open a blog or website, Internet users can also forget the address of your blog or website that he thought attractive, even they also find it quite difficult when I have to look up the address they want our site Google. RSS (Really Simple Syndication) is an application that can be used by internet users to overcome the difficulties that arise as the site address or a search process to find out the latest information. In this thesis made the application RSS Reader using ajax and jQuery. The process of making this system begins with making the system analysis, system design that includes context diagram, DAD, and then making the program. While the database used is MySQL and the PHP programming language danJQuery. The application system can help to admin / user bias get information such as news headlines right from your blog / website updates. Keywords: RSS, Feeds, JQuery, Javascript,
PERBANDINGAN PERFORMA DAN KEAMANAN VOICE OVER INTERNET PROTOKOL DENGAN DAN TANPA OPEN VIRTUAL PRIVATE NETWORK (STUDI KASUS KOS GAYAM) Yulkarnain, Dani; Raharjo, Suwanto; Lestari, Uning
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT VoIP (Voice Over Internet Protocol) is a system that used by sending data package from one place to another places such as voice or video use mediator IP Address in a internet network. VoIP transmission voice signal by change to the digital form and it can be categorized be data packages that sent by using platform IP. However, the weakness of VoIP is security is not guaranteed. Because IP based, so anybody can tap and record the data of VoIP. So, it needs a security system to overcome that security problem. One of the solutions is by implement of OpenVPN (Virtual Private Network). OpenVPN is one method to overcome the security network in sending the data package. To implement that idea so, it made a system VoIP OpenVPN. Then analyze   how to Performa the sending of voice or video that resulted and the security of VoIP before and after used OpenVPN. Before using OpenVPN, data package VoIP that sent can be record and replay the data payload it also can be caught and can be saw. The Performa of sending data in the busy network it also can be long delayed. However, after using OpenVPN, the package data VoIP cannot record and replay and data payload also cannot catch. The Performa VoIP OpenVPN in busy network is better than VoIP without OpenVPN. Keywords : VoIP, OpenVPN, Performa, Security
ANALISIS DAN IMPLEMENTASI HONEYPOT MENGGUNAKAN HONEYD SEBAGAI ALAT BANTU PENGUMPULAN INFORMASI AKTIVITAS SERANGAN PADA JARINGAN Nugroho, Ardianto Setyo; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT A honeypot is a system that is purposely built to be investigated , attacked, or compromised . In general, a honeypot is a computer , data or a network site that looks like part of the network , but actually terisolalsi and monitored . When viewed from the eyes of the hacker would attack , honeypot systems like that deservest to be attacked. One type of honeypot is Honeyd . Honeyd is a low interaction honeypot with types that have a much smaller risk than other types of interactions due to the high interaction honeypot does not directly involve the actual system . In testing this system , implemented on a local network honeypot to try some attacks such as footprinting , DoS , and bruteforce is expected to be one of the information to the administrator of hasillog honeypot in order to make the system more secure . This ,implementation of honeypot can be used as a tool administrators to view activity reports generated Honeyd in order to assist in determining the network security policy . Keywords : honeypot , Honeyd , footprinting , Dos , bruteforce . 
PENERAPAN DIGITAL SIGNATURE PADA TRANSKRIP NILAI Hamzah, Amir; Raharjo, Suwanto; Berliyanto G.A, Ibnu
Jurnal Script Vol 1, No 2 (2014): EDISI JANUARI 2014
Publisher : Jurnal Script

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 ABSTRACTAlong with the rapid development of information technology especially which is related to computers and internet, data security is a complex issue, one of the problem is data manipulation. One way to prevent this is to create a data security system that can prevent data manipulation activities and ensure that the data is authentic. In this case, data security technology using a digital signature is a quite right effort . The application of digital signature methods on transcripts with a web-based application is one of the solutions in the application of data security systems. The application is built using a digital signature with function of CRC32 hash algorithm that will generate a CRC value based on certain bits within the file, and then combined with a unique value for the variable then integrated with database and included on the transcript as evidence of authentic data.The results of this application is a security data system which show the transcripts using  digital signature, as data authentication attempts. With the digital signature application  hopefully  can help to  reduce any data manipulation activities, especially academic data which is one of the manipulated data is sensitive and too risky to be manipulated.Keywords : Transcript, digital signatures, hash function, CRC32, authentic
ANALISA PERBANDINGAN EASYHOTSPOT DAN MIKROTIK DALAM PENERAPAN HOTSPOT AREA DENGAN SISTEM AAA Lubis, Rizal Fakhruddin; Raharjo, Suwanto; Sutanta, Edhy
Jurnal Jarkom Vol 1, No 2 (2014): Edisi Januari 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT               At present more and more public places are provided hotspots area in order to attract consumers. Such facilities are generally only be used by a particular user is allowed, so needed a software to authenticate the prospective user prior to access to the Internet using hotspots area. Many alternative software options available, so that the necessary guidelines for choosing the right software to do security, one with the AAA system (Authentification, Authorized, Accounting). This study compared two software namely EasyHotspot and Mikrotik for the implementation of the AAA system in hotspot areas. Keywords: EasyeHotspot, Mikrotik, hotspots, internet.
ANALISIS DAN PERANCANGAN JARINGAN DUAL STACK SEBAGAI METODE TRANSISI IPv4 KE IPv6 Anita, Merlie; Raharjo, Suwanto; Sholeh, Muhammad
Jurnal Jarkom Vol 1, No 2 (2014): Edisi Januari 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIPv6 present as IPv4 replacement with some feature to cover IPv4 weakness. Transition is needed in order to migrate to IPv6 because totally migration will cause much networking problem considering most of network device in this time are still designed for IPv4. Transition method used in this research is dual stack which connected to tunnel broker so that local network can communicate with internet and be able to access IPv6 sites. In dual stack network, host and router implements both IPv4 and IPv6. With these two kind of IP, gateway address must consists of two different addresses either because sending and receiving process from client to server or vice versa is happen in separate way. Dual stack most implemented in a network because its compatibility in network device and it doesn’t need necessary to change extremely configuration of IPv4 existing network. As a result from this research, IPv4 network performance has 2% faster for RTT than IPv6 network. For time used and speed transfer using FTP, IPv4 network has 3% faster than IPv6 network. IPv6 network has 10% better performance for throughput than IPv4 does. Whereas jitter, IPv6 has 44% smaller than IPv4. Considering IPv4 limited allocation address nowadays doing the transition to IPv6 using dual stack network is a good choice to deploy IPv6 used. Keywords: dual stack, IPv6, tunnel broker
MEMAKSIMALKAN POTENSI BISNIS INTERNET PADA JARINGAN NIRKABEL (Studi Kasus: Pengembangan Jaringan Lan di Pondok Pesantren Terpadu Al Mumtaz Setiadi, Yuki Syambudi; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): Edisi Januari 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTWireless technology, has now spread all-over the nation. By using radio waves, wireless technology on computer network becomes indicate its existence compare to conventional network model (wired network). The existence of technology which becomes cheaper, has support the existence of these wireless network also. Nowadays, areas supported with wireless network or often called hotspot become easier to find. The cheaper the devices to build these hotspot networks, has passionate peoples to use this business opportunity on wireless network. Many tricks use by businessman, start with obligation to buy good before using hotspot facility until “Warung Internet” AKA “WARNET”. But, using prepaid cards AKA vouchers are the most prospective business strategy. This occurs because it simplicity to manage on businessman’s side and it simplicity on customer’s side. Consider to the target of PT. Telkom which obsessed to make Indonesia becomes nation with the largest numbers of WiFi area in Asia (Yandi, 2012), it is 10 millions WiFi radio at 2015, is certainly hotspot business is one of the “hottest” business in future. But thus, hotspot business must be controlled so it doesn’t cross-side with law and norm, moreover if this business runs within Islamic Boarding School’s environment. With some synchronization between the system and Islamic Boarding School’s ideology, then this hotspot business will becomes really useful for the instance. Keywords: Hotspot, Voucher, Ideology, Islamic Boarding School
ANALISA PERBANDINGAN EASYHOTSPOT DAN MIKROTIK DALAM PENERAPAN HOTSPOT AREA DENGAN SISTEM AAA Lubis, Rizal Fakhruddin; Raharjo, Suwanto; Sutanta, Edhy
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTAt present more and more public places are provided hotspots area in order to attract consumers. Such facilities are generally only be used by a particular user is allowed, so needed a software to authenticate the prospective user prior to access to the Internet using hotspots area. Many alternative software options available, so that the necessary guidelines for choosing the right software to do security, one with the AAA system (Authentification, Authorized, Accounting). This study compared two software namely EasyHotspot and Mikrotik for the implementation of the AAA system in hotspot areas.Key words: EasyeHotspot, Mikrotik, hotspots, internet.
PENERAPAN DIGITAL SIGNATURE PADA TRANSKRIP NILAI SEBAGAI OTENTIKASI DATA G.A, Ibnu Berliyanto; Hamzah, Amir; Raharjo, Suwanto
Jurnal Script Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Script

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTAlong with the rapid development of information technology especially which is related to computers and internet, data security is a complex issue, one of the problem is data manipulation. One way to prevent this is to create a data security system that can prevent data manipulation activities and ensure that the data is authentic. In this case, data security technology using a digital signature is a quite right effort . The application of digital signature methods on transcripts with a web-based application is one of the solutions in the application of data security systems. The application is built using a digital signature with function of CRC32 hash algorithm that will generate a CRC value based on certain bits within the file, and then combined with a unique value for the variable then integrated with database and included on the transcript as evidence of authentic data.The results of this application is a security data system which show the transcripts using digital signature, as data authentication attempts. With the digital signature application hopefully can help to reduce any data manipulation activities, especially academic data which is one of the manipulated data is sensitive and too risky to be manipulated.Keywords : Transcript, digital signatures, hash function, CRC32, authentic.
MEMAKSIMALKAN POTENSI BISNIS INTERNET PADA JARINGAN NIRKABEL (Studi Kasus: Pengembangan Jaringan Lan di Pondok Pesantren Terpadu Al Mumtaz) Setiadi, Yuki Syambudi; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTWireless technology, has now spread all-over the nation. By using radio waves, wireless technology on computer network becomes indicate its existence compare to conventional network model (wired network). The existence of technology which becomes cheaper, has support the existence of these wireless network also. Nowadays, areas supported with wireless network or often called hotspot become easier to find. The cheaper the devices to build these hotspot networks, has passionate peoples to use this business opportunity on wireless network. Many tricks use by businessman, start with obligation to buy good before using hotspot facility until “Warung Internet” AKA “WARNET”. But, using prepaid cards AKA vouchers are the most prospective business strategy. This occurs because it simplicity to manage on businessman’s side and it simplicity on customer’s side. Consider to the target of PT. Telkom which obsessed to make Indonesia becomes nation with the largest numbers of WiFi area in Asia (Yandi, 2012), it is 10 millions WiFi radio at 2015, is certainly hotspot business is one of the “hottest” business in future. But thus, hotspot business must be controlled so it doesn’t cross-side with law and norm, moreover if this business runs within Islamic Boarding School’s environment. With some synchronization between the system and Islamic Boarding School’s ideology, then this hotspot business will becomes really useful for the instance.Keywords: Hotspot, Voucher, Ideology, Islamic Boarding School
Co-Authors -, Komarudin Abdul Malik Zuhdi Achmad Yusron Arif Afifah Nur Aini Aflahah Apriliyani Ahmad irfa’i Amalia Febryane Adhani Mazaya Amir Hamzah Andi Kriswantono Apolinarius Gusala Argaditia Mawadati Ari Sabela Anggraini Arief Setyanto Arief, Achmad Yusron Arif Nur Rohman Arif setiadi Arif, Achmad Yusron Aziz Nurwahidin Azriel Christian Nurcahyo Budi Wijaya Rauf Cahyono, Nova Tri Cahyono, Nova Tri Candra Kusuma Catur Iswahyudi Catur Iswahyudi Catur Iswayudi Danang Kastowo Dani Yulkarnain Dewo Pambudi Dimas Wiryatari Dodik Prakoso Eko Hery Suwandojo Dzakiya, Nurul Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Edi Winarko Eka Suteja Eko Darmanto Eko Haryanto Eko Pramono Eko Pramono Ema Utami Ema Utami (Jurusan Sistem Informasi STMIK AMIKOM Yogyakarta) Emy Setyaningsih Enggar Febriyanti Enie Yuliani Erfanti Fatkhiyah Erma Susanti Ermawati - Erna Kumalasari N Erna Kumalasari Nurnawati Eska Almuntaha Faisal Siregar Fuad Hasan Gunawan Wicahyono Hanafi Eko Kurniawan Hardianto Nugroho Hari Rachmadi Hendrik Satria Harefa Heri Sismoro Ibnu Berliyanto G.A Ibnu Berliyanto G.A, Ibnu Berliyanto Imam Syafii Imam Thoib Indarto Indarto Irwan Siswanto Jazi Eko Istiyanto (Program Magister Ilmu Komputer Sekolah Pascasarjana UGM) Joko Triyono Joko Triyono Joko Waluyo Julianto Jussac Maulana Masjhoer Koco Anggoro Kurniati, Devi Kurniawan, Hanafi Eko Laksono Trisnantoro M. Abdul Alim Alami M. Rudiyanto Arief Merlie Anita Moh Erzal Arighi Damopolii Moh. Ishaq Yanuar Mohammad Sholeh Muh. Ibnu Habil Hanafi Muh. Ibnu Habil Hanafi, Muh. Ibnu Habil Muhamad Fatahillah Z Muhammad Arif Setyawan Muhammad Fahrizal Farid Muhammad Farid Ali Safii Muhammad Puguh Pamungkas Muhammad Rosyid Muhammad Saleh Jafri MUHAMMAD SHOLEH Muhammad Sholeh Munandar, Arief Mursyid Ardiansyah Naniek Widyastuti Nidia Lestari Omar Muhammad Altoumi Alsyaibani Prabowo Budi Utomo Prita Haryani Prita Haryani Purnawan - Purnawan Purnawan R. K. ST., MT., Rr. Yuliana Rahardyan Bisma Setya Putra Ramadhan, Hanan Fajar Rendi Saputra Rio Ponco Negoro Muhammad Hakim Rizal Fakhruddin Lubis Rizqa Luviana Musyarofah Rizqi Aji Nugroho Robertus Desta Raka Siwi Robertus Desta Raka Siwi, Robertus Desta Rohmat Hidayat Rohmat Hidayat Rr Yuliana Rachmawati Kusumaningsih Rr. Yuliana Rachmawati Rr.Y. Rachmawati Kusumaningsih Rr.Yuliana Rachamawati, Rr.Yuliana Ryvan Sirait S.T., M.T, Muhammad Sholeh, Samuel Kristiyana Saryadi K T Soba Saryadi K T Soba, Saryadi K T Siswanto - Sofyan Pariyasto Sri Hartati Stefanus Samuel Tampi Suparni Setyowati Rahayu Suparni Setyowati Rahayu Suraya - Suraya - Suraya ., Suraya Syafrizal S Ardiansyah Tampi, Stefanus Samuel Toto Rusianto Triyono, Joko Uning Lestari Uning Lestari Utamu, Ema Utomo, Prabowo Budi Vian Ardiyansyah Saputro Vian Ardiyansyah Saputro Wahyu Hidayat Yoga Arjanggi Nofianto Yuki Syambudi Setiadi Yuli Purwanto Yuli Purwanto Yuliana Rachmawati Yulianto Mustaqim Zeppi Maulana Bhakti