scholarly journals Intranet-Based Wiki with Instant Messaging Protocol

Author(s):  
Chimezie F. Ugwu ◽  
Henry O. Osuagwu ◽  
Donatus I. Bayem

This research developed an Intranet-Based Wiki with Instant Messaging Protocol (IBWIMP) for the Staff of the Department of Computer Science, University of Nigeria, Nsukka to enable them to collaborate on tasks; like writing of documents like, memo, project guidelines, proposal/grants, and circulars with online security consideration. The essence of this work is to improve on the contributions staff make during work, in carrying out tasks with their colleagues irrespective of the person’s location at that point in time. The existing system on ground would always require the presence of the staff within the department before they can carry out the tasks meant for them or respond to the available mails within their mail boxes located within the general office of the department. In regard to such situation, there is always delay in the processing of such mails or documents that could require urgent attention of the supposed staff therefore could cause serious damages. This research established a better internet connection for the security of the system and the documents therein by the use of virtual private server (VPS) hosting on virtual private network (VPN). This system allows the collaboration between the staff of the department and external persons, or partners classified as external staff user on documents like circulars that normally come from outside the department. This system automatically sends emails to the supposed users whenever the admin posts a document via the Short Message Transfer Protocol (SMTP). The system is accessed online by the users from any location once there is accessible internet connection and users can collaborate on the development of any posted document at the same time. This application was designed using Object Oriented Analysis and Design Methodology (OOADM) and implemented using Hypertext Markup Language (HTML), JavaScript, Cascading Style Sheet (CSS), CkEditor, Hypertext Pre-Processor (PHP) and MySQL database management system.

Author(s):  
Albert Verasius Dian Sano

The objective of this research is to develop a web-based-online-stock-simulation application applying Virtual Private Network (VPN) technology. The web-based application is prefered for user’s convenience and comfort since it does not require any software to be installed on the client side and is also accessable anywhere and anytime with internet connection availability. The application is developed by means of analysis and design towards the technology needed to establish the connectivity between servers through internet as well as database analysis and design. The data are real time derived from the Indonesia Stock Exchange (IDX) and forwarded through an official data vendor PT XYZ. Data from the IDX will be captured by a middleware application at PT XYZ and forwarded to www.kontan.co.id. This application has been tested and succesfully run by around 700 users. This tool is expected to provide a kind of education and motivation to beginner-level investors who want to be engaged with the stock-trading activities. 


Author(s):  
Mohammad Subekti ◽  
Anthoni Tandiono ◽  
Fenky Tania ◽  
Hendro Wibowo A.

The purpose of this study is to develop an e-commerce that can distribute any information about the products of PD Cross Tech. The e-commerce is supported by dynamic DBMS and can be connected via database reseller server so that it can do information sharing. The distribution is performed using the Distributed Relational Database Management System (DRDBMS), supported by the File Transfer Protocol and Virtual Private Network. In other words the e-Commerce supports multiplatform database. Research methodologies used are analytical methods, design methods, and literature study. Results showed that PD Cross Tech needs a new e-Commerce that supports multiplatform database. With this e-Commerce, it is expected that similar computer equipment needs for many organization in Indonesia can be designed in the same way.


Author(s):  
Ganesh Chandra Deka ◽  
Prashanta Kumar Das

With Open source virtualization software like VMware Player and Virtualbox, it is easy to install and run Virtual machines (VMs) in a home desktop computer. Endian Firewall provides a service called VPN (Virtual Private Network); it offers a secure communication between two different networks by using internet connection. In this chapter, we will install an Endian Firewall Community OS in one of the virtual machines (VM) and network it with the other VM for creating a firewall/router/proxy/VPN.


2017 ◽  
Vol 118 (11/12) ◽  
pp. 672-674 ◽  
Author(s):  
Bruce Massis

Purpose The purpose of this study is to examine the use of a virtual private network (VPN) as an additional protective strategy for patrons using library computers. Design/methodology/approach This study is a literature review and commentary on this topic that has been addressed by professionals, researchers and practitioners. Findings Credit must be given to those libraries who have made free VPN services available to their patrons, thus encouraging off-site usage of library resources through this extra layer of authentication in an effort to provide them with a trust level of privacy beyond their standard expectations. Should the library not provide such a service at present, at least an individual can add a VPN to one’s protective bag of tricks to, perhaps, in an effort to place even a limited constraint on those who would do them harm when online. Originality/value The value in exploring this topic is to provide some context and potential options for patrons through their use of a VPN.


Author(s):  
Siswa Trihadi ◽  
Frenky Budianto ◽  
Wirriyanto Arifin

Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business process andidentify problems which can be solved by using a network technology. Meanwhile, the design method wasdone by making a topology network diagram, and determining elements needed to design a VPN technology,then suggesting a configuration system, and testing to know whether the suggested system could run well ornot. The result is that network between the head and branch office, and the mobile user can be connectedsuccessfully using a VPN technology. In conclusion, with the connected network between the head andbranch office can create a centralization of company database, and a suggested VPN network has run well byencapsulating data packages had been sent.Keywords: network, Virtual Private Network (VPN), library study, analysis, design


Author(s):  
Rohit Ramesh Jadhav ◽  
Parth Sandeep Sheth

Virtual Private Networks (VPN) gives anonymity and online security whilst using the web by creating a private network from our public internet connection. VPNs cloak Internet Protocol addresses such that our online activities cannot be traced. Initially, VPNs were only being utilized by huge corporate organizations, which could bear its cost, to safely and privately share records between workplaces situated in various parts of the world. Currently in 2020, now over a quarter of the world's population uses VPN to access the internet anonymously. This paper presents an introduction to VPN technology, its working, its types, some of the VPN Protocols, comparison between free and paid VPN services, and security issues associated with VPN use.


1996 ◽  
Vol 35 (01) ◽  
pp. 52-58 ◽  
Author(s):  
A. Mavromatis ◽  
N. Maglaveras ◽  
A. Tsikotis ◽  
G. Pangalos ◽  
V. Ambrosiadou ◽  
...  

AbstractAn object-oriented medical database management system is presented for a typical cardiologic center, facilitating epidemiological trials. Object-oriented analysis and design were used for the system design, offering advantages for the integrity and extendibility of medical information systems. The system was developed using object-oriented design and programming methodology, the C++ language and the Borland Paradox Relational Data Base Management System on an MS-Windows NT environment. Particular attention was paid to system compatibility, portability, the ease of use, and the suitable design of the patient record so as to support the decisions of medical personnel in cardiovascular centers. The system was designed to accept complex, heterogeneous, distributed data in various formats and from different kinds of examinations such as Holter, Doppler and electrocardiography.


Author(s):  
I Wayan Eka Putra Darmawan

VoIP (Voice over Internet) dikenal juga dengan sebutan IP (Internet Protocol) Telephony saat ini semakin banyak digunakan karena memiliki beberapa keunggulan, salah satu diantaranya yaitu tarif yang jauh lebih murah daripada tarif telepon tradisional sehinggapengguna telepon dapat memilih layanan tersebut sesuai dengan kebutuhannya. VoIP dapat mereduksi biaya percakapan sampai 70%. Selain memiliki beberapa keunggulan di atas,VoIP juga memiliki kelemahan yang sangat vital yaitu dari segi keamanan transfer suarakarena berbasis IP, sehingga siapapun bisa melakukan penyadapan dan perekaman terhadap data VoIP. Ganguan yang terjadi pada sistem VoIP ada berbagai macam diantaranya, transferdata yang lewat pada suatu jaringan seperti misalnya dapat disalahgunakan (abuse), dapatdibajak isi data tersebut (sniffing), dan tidak dapat mengakses server dikarenakan server yang kelebihan muatan (Denial of Services).Ada beberapa cara untuk mengamankan komunikasi data VoIP, antara lain, dengan mengamankan jalur yang digunakan pengguna untuk melakukan komunikasi VoIP denganmenggunakan metode VPN (Virtual Private Network) dan juga dapat dilakukan suatu metode kriptografi pada aplikasi VoIP tersebut sehingga data yang dikirimkan dapat dilindungidengan baik. VPN adalah teknik pengaman jaringan yang bekerja dengan cara membuat suatu tunnel sehingga jaringan yang dipercaya dapat menghubungkan jaringan yang ada diluar melalui internet. Titik akhir dari VPN adalah tersambungnya Virtual Channels (VCs)dengan cara pemisahan. Kenyataannya koneksi sebuah end-to-end VPN tergantung dari sebuah nilai dari hubungan daripada titik-titiknya. VPN mempunyai dua metode dalampengamanan yakni IPSec dan Crypto IP Encapsulation (CIPE). Selain itu dapat dipergunakan teknik Kriptografi (cryptography) yang merupakan ilmu dan seni penyimpanan pesan, data,atau informasi secara aman.Sistem VoIP menggunakan VPN ini diharapkan dapat memberikan keamanan transfer data pada jaringan internet maupun intranet.


2019 ◽  
Vol 7 (2) ◽  
pp. 129
Author(s):  
Firmansyah Firmansyah ◽  
Mochamad Wahyudi ◽  
Rachmat Adi Purnama

2019 ◽  
Author(s):  
Amarudin ◽  
Sampurna Dadi Riskiono

Akhir-akhir ini sudah mulai banyak perusahaan yang memanfaatkan protokol Virtual Private Network (VPN) sebagai media akses/komunikasi antar jaringan interlokal. VPN adalah sebuah protokol keamanan jaringan yang dapat digunakan sebagai salah satu cara untuk meningkatkan keamanan jaringan dari sisi transmisi data. Dengan pemanfaatan VPN, koneksi antar jaringan dapat terbentuk secara virtual walaupun tidak terbentuk secara fisik. Selain itu, dengan memanfaatkan protokol VPN, user (client) dapat mengkases Server secara private melalui jaringan public. Dengan demikian komunikasi antara Client dan Server terjaga dari Sniffing (penyadapan) dari pihak yang tidak bertanggung jawab. Akan tetap tingkat keamanan yang dihasilkan dari penerapan VPN ini perlu dilakukan pengkajian yang lebih dalam. Sehingga tingkat keamanannya dapat diketahui apakah sudah termasuk dalam kategori aman ataukah masih ada peluang bug yang membahayakan dari penetrasi. Dalam penelitian ini dilakukan pengujian Scanning dan Sniffing pada penerapan VPN menggunakan toos hacking yaitu Nmap dan Wireshark. Sedangkan pengujian performansi service pada VPN Server, dilakukan pengujian Denial of Service (DoS) menggunakan tools hacking yaitu LOIC. Adapun objek penelitian ini adalah perangkat Mikrotik RouterOS yang digunakan pada Universitas Teknokrat Indonesia. Hasil penelitian yang didapatkan bahwa komunikasi data antar jaringan (antara VPN Server dan VPN Client) dapat terenkripsi dengan baik. Akan tetapi dari segi konektifitas antar jaringan sangat dipengaruhi oleh performansi bandwidth yang digunakan oleh sistem jaringan tersebut. Selain itu berdasarkan hasil pengujian performansi service pada VPN Server didapatkan hasil bahwa service pada VPN Server dapat dimatikan pada request (ping) sebesar 1.899.276 request. Hal ini dipengaruhi oleh spesifikasi perangkat Mikrotik RouterOS yang digunakan. Adapun untuk penelitian selanjutnya perlu dilakukan pengujian performansi konektifitas menggunakan bandwith yang lebih besar dan untuk menguji performansi service VPN Server menggunakan spesifikasi perangkat Mikrotik yang lebih baik.


Sign in / Sign up

Export Citation Format

Share Document