scholarly journals Introducing Mobile Network Security Experiments to Communication Technology Education

Author(s):  
Stig F. Mjølsnes ◽  
Ruxandra F. Olimid
2020 ◽  
Vol 12 (1) ◽  
pp. 165-180
Author(s):  
Andi Nurul Hidayat

Technology education is a right for everyone in this world. Therefore, there is no reason to discriminate against technological education especially for women in Indonesia. In the perspective of technology for women, there is a high desire to master technology to enable women to build meaningful interpretations and personal representations. In addition, technology is also useful as a rich and flexible learning tool for women, in this article it is targeted to discuss the importance of technology education and independence to women, especially independence in the family economy. Women who have broader knowledge and more competent economic skills will be more independent, stronger, and will be more successful in carrying out their roles and functions in the family, society, and national development. The level of compatibility between technological values ​​and norms with the values ​​or norms of its users will determine the pattern The use of this technology starts from the value of most of the goods and services of information and communication technology (ICT) which tends to be more masculine, which is one of the causes of the digital divide in technological women.


2018 ◽  
Vol 1 (2) ◽  
pp. 118-124
Author(s):  
Arif Hidayat ◽  
Ismail Puji Saputra

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.


2013 ◽  
Vol 427-429 ◽  
pp. 2691-2695
Author(s):  
Zhi Qiang Wei ◽  
Xiao Cheng Yang ◽  
Hao Liu ◽  
Yan Xiu Sheng ◽  
Xi Wang

In recent years, with the rapid development of mobile communication technology, intelligent mobile terminal tendency is increasingly popular. People are stepping into the era of mobile networks. Information systems created for enterprise or individual gradually rely on mobile networks and mobile devices. Because the mobile network is often interrupted, data synchronization working on the mobile network is very difficult. We put forward a model of the data synchronization in mobile network. JSON and data compression with parallel processing are introduced into the model. Thus, the model has high efficiency. It was applied to a company's Warehouse Management System and solved the problem of data synchronization preferably.


2019 ◽  
Author(s):  
Chenjie Xu ◽  
Yaogang Wang

UNSTRUCTURED The 6th World Internet Conference took place in Wuzhen, Zhejiang Province from October 19 to 22 in China. The theme of this year's conference is "Intelligent Interconnection for Openness and Cooperation: Building a Community with a Shared Future in Cyberspace". Hot internet-related issues, such as artificial intelligence, internet of things and 5G, had been held in the conference. Under the current trend of the times, we have higher and higher requirements for information transmission and exchange. And with the mobile network technology rapidly developed, there are countless flashing wisdom behind the development of mobile network technology from the generation, transmission to reception of information. Since the introduction of 1G in the early 1980s and 4G in the 2010s, a new wireless mobile communication technology has been released every 10 years or so. The emergence of mobile network technology has illuminated the modern society.


Sign in / Sign up

Export Citation Format

Share Document