Claim Missing Document
Check
Articles

BUILD COMPUTER NETWORK USING TCP / IP VERSION 6 Yudi Irawan Chandra
Majalah SIKOMTEK Vol 4, No 1 (2004): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper will explain about IP version 6 and how pengalokasiannya. This time to request anIP address that has been done through agencies appointed by the IANA (Internet AssignedNumbers Authority) which is determined on a regional basis, such as APNIC (Asia PacificNetwork Information Center), which handles special requests IP addresses for the AsiaPacific region, including areas served by APNIC is Indonesian. Similar organizations thathandle regions of North America, South America, the Caribbean, and Sub-Saharan Africa isARIN, whereas in Europe, the Middle East, and parts of Africa is the RIPE-NCC.
BUILD COMPUTER NETWORK USING TCP / IP VERSION 6 Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 1 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper will explain about IP version 6 and how pengalokasiannya. This time to request anIP address that has been done through agencies appointed by the IANA (Internet AssignedNumbers Authority) which is determined on a regional basis, such as APNIC (Asia PacificNetwork Information Center), which handles special requests IP addresses for the AsiaPacific region, including areas served by APNIC is Indonesian. Similar organizations thathandle regions of North America, South America, the Caribbean, and Sub-Saharan Africa isARIN, whereas in Europe, the Middle East, and parts of Africa is the RIPE-NCC.
VIRUS ATTACK PREVENTION TECHNIQUES USING LOCAL VISUAL BASIC SCRIPT AND TEXT EDITOR Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 1 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development in recent local viruses that sometimes infect your computer,demanding to take part should start thinking about how to manufacture pencegahnya. This isnecessary, because the local virus is sometimes difficult to detect by some leading anti-virus,antivirus, except by some local-made which was then published as an antivirus that canhandle one or several types of local virus. This could occur because the virus might havecaused the local work is not as generally non-local viruses, so that out of the standard virussearches, for example, only rarely local virus that infects exe files or com files or the other,making it very difficult to detect as a virus or not, except when the virus has been reportedand detected by antivirus software maker, the new virus could be overcome, again created bythe assumption that the virus a step ahead of antivirus. One cause of the difficulty ofdetecting these local viruses, since almost no different from ordinary files, let alone the virusis also using the local language. One side might be proud, because some names of local virusis Indonesian, and has become a name in the database list of international virus. Now it's timeto try to disassemble the local virus defense manual, which these techniques may someday beable to create a simple antivirus. Dismantle local virus defense techniques using visual basicscript and bahsa edior text refers to the target of securing some vital parts infected by thevirus, such as the Registry, MSCONFIG, sysedit, cmd, folder windows, system32 and manymore. This meant that by understanding the techniques, we expect it to disassemble the viruspertahahanan able to prevent the virus infecting computers earlier, this is in line with theassumption that prevention is better than cure.
DATA SECURITY DESIGN HEALTH SYSTEM USING cryptographic SmartCard Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Person's medical record information is one factor that determines the quality of serviceprovided by central health care services to patients and, therefore, this medical recordinformation should always be there when needed. Confidentiality of medical recordinformation is very important because this information to explain the special relationshipbetween patient and physician, which must be protected from leakage according to the codeof medical ethics and the applicable legislation.Smart card technology (smartcard) offers convenience and security of data storage because ofthe mechanism for data encryption before the data is stored in memory, and the pin (secretcode) that maintain such data in order not to be read by unauthorized parties. Smartcard canalso be easily carried so as to ensure the availability of data whenever needed.
DETECTING trojan virus, PREVENTION STEPS TO YOUR COMPUTER SYSTEM Handling Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Trojan Horse or better known as the "Trojan" in the computer system is part of a digitalinfection whose presence is not expected by the owner of the computer. Trojan consisting offunctions of unknown purpose, but the outline has destructive properties. Trojans go into acomputer over a network is inserted at the time by surfing with physical media.Trojans do not take effect directly as well as computer viruses, but the potential hazards canbe far greater than computer viruses. Trojans can be activated and controlled by remote orusing the timer. Remote control as well as the Remote Administration Tools, which is theserver version will be controlled by the attacker through his version of the client. Many thingscan be done by an attacker if the victim's computer that has been controlled. Certain unusualports open trojan indicate active eventsHandling Trojan can be done in two ways, namely prevention (preventive) and treatment(recovery). Prevention efforts conducted prior to the occurrence of infection, namely effortsto keep the system has no security holes. Treatment of business conducted after the system isinfected, the effort to close security holes that have been exploited and eliminate the cause ofinfection.Understanding of the nitty gritty of Trojans need to be known by Internet users to avoid orminimize attacks against him and be able to perform the treatment if infected.
DESIGNING AND MAKING authentication server DISTRIBUTED SYSTEM BASED ON XML Yudi Irawan Chandra
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Not completely secure computer networks from a variety of attacks and weaknesses of thesystem that can be exploited so that it can cause overall system failure. On the other hand,handling the security aspects of the application is still done in conjunction with thedevelopment of business processes so that the resulting system will not become effective ifthe application has many users with a variety of diverse access rights. In addition, efforts tointegrate various kinds of applications become more complex because each application has itsown method with limitations on certain platforms. Based on this background developed anauthentication server. How the authentication server is the first time by listing all theattributes In addition, registration applications must also include a list of users and accessrights. Client application then sends the user data and applications to a server identityauthentication each time a user login request. Before data is sent, the data is encrypted andthen converted to XML format. Arriving on the server, the data is then translated into textform and then decrypted into plaintext. These data are used as parameters to be validated byfirst passing the port knocking. If the validation is successful port knocking, then the specialsession will be created for that user. Then the session will be returned to the application to beprocessed further. Almost the same process also applies if the user requesting access to aprocedure. The difference lies in the validation process which involves the examination of thevalidity of the session, permissions, parameters and requirements can be met. While in thelogoff process, limit switches so that the user session is terminated can no longer perform theaccess. The existence of authentication server integration proved to facilitate a variety ofapplications under a single security system for all XML-formatted data is transferred. Inaddition, the ease of integration flexibility is also evidenced by the authentication server forcoordinating the various applications and users that use it. On the other hand, authenticationserver also serves to improve the security system shown in the form of resistance to theplaintext data reading, the man in the middle attacks and unauthorized access.
TELECOMMUNICATIONS NETWORK THROUGH SIGNAL INJECTION POWER "POWER LINE COMMUNICATION" Network Connection INTERNET AS AN ALTERNATIVE Yudi Irawan Chandra
JAKSTIK Journal Vol 5, No 1 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The flow of electric current in a sinusoidal wave form apparently can be used for voice communication and data signals known as Powerline Communications (PLC). How is the concept?, In sederana this analogy that the electrical current can flow like water to generate waves and sea foam. Is the current wave, while the foam form of noise. Noise is utilized by the PLC technology to deliver voice and data signals.  Internet presence by some of our communities is a means of communication are quite expensive, so use only a limited circle only. One reason can we say, access the Internet through a telephone line which is very slow, it raises the amount of money should we spend. What's the solution? the answer is Digital Power Line technology. 
WEBSITE DESIGN APPLICATIONS IN COUNTER HP VAN Cellular USING PHP AND Adobe Dreamweaver CS3 Irfan Fauzy; Yudi Irawan Chandra, SKom, MMSI
Jurnal Sistem Informasi 2008
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Application websiteat Van Cellular counter is made to facilitate communityin getting an update on developments surrounding the mobile phone worldwhich is increasingly popular in the community by making applications mobile phone priceslist sold at one counter handphone, namely that Conter Cellular Mobile Vanprecisely located in Tangerang is Pamulang area. Application of this website is made byusing a merger between Adobe software Dreamweaver CS3 is used to design web pages,programming language Hypertext Preprocessor (PHP) which is a server side scriptinglanguage for web content together with the Hypertext Markup Language (HTML). Inparticular, PHP is designed to dynamic web form, it means php can form a view on requestrecent and very easy to use and learn.Keywords: Applications, Adobe Dreamweaver CS3, PHP
PRAYER TIME REMINDER APPLICATION IN INDONESIA TOWN BY USING VISUAL BASIC 6.0 Abdul Hakim; Yudi Irawan Chandra, S.Kom., MMSI
Jurnal Sistem Informasi 2006
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this scientific writing about the timetable set forth reminders of time of five timeobligatory prayers that are around the cities in Indonesia.With this application one can know the time schedule contained prayers throughoutthe cities in Indonesia and can be reminded directly with the call to prayer when theprayer time has come, perhaps in haste to pray without disrupting work on oneactivity. Data storage performed on the Microsoft Access database, while dataprocessing and the processing is done by programs created with Visual Basic 6.0.This application can be run on a computer that is running the operating systemWindows-based.
APPLICATION INFORMATION ACADEMIC AND STUDENT ADMINISTRATION (BAAK) IN STMIK JAKARTA STI&K USING PROTOCOL WIRELESS APPLICATION (WAP) Anak Agung Sri Rahayu; Yudi Irawan Chandra, SKom., MMSI
Jurnal Sistem Informasi 2004
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Applications using Wireless Application Protocol technology (WAP), enablingapplications that can be displayed and made accessible with wireless hardware, sothat information retrieval can be more effective and efficient. Media are used tocapture information that is mobile phone (mobile phone), which is a very appropriatemedium and easy to socialize. This application form displayed text on the screenphone users. This application can be accessed by mobile phone already has thetechnology General Packet Radio Service (GPRS)