scholarly journals Perbandingan Tool Forensik pada Mozilla Firefox Private Mode Menggunakan Metode NIST

2021 ◽  
Vol 18 (1) ◽  
pp. 283-291
Author(s):  
Sarjimin ◽  
Herman ◽  
Anton Yudhana

Penggunaan System Operasi Linux yang didistribusikan secara open source menjadikannya operating system yang dapat didistribusikan secara masif oleh banyak perusahaan. PC/Notebook maupun perangkat pintar yang berbasiskan Linux semakin diminati oleh user karena dalam proses distribusinya tidak dipungut biaya apapun. Memberikan layanan browsing internet kepada para user secara privat dan tidak meninggalkan jejak digital merupakan salah satu upaya yang dilakukan oleh web browser sebagai upaya invovasi web browser mendapatkan pengguna layanan sebanyak-banyaknya. Metode investigasi forensic web browser private mode menjadi hal yang perlu guna menjadi acuan dalam melakukan forensic terhadap kasus/kejadian kejahatan yang melibatkan layanan browsing secara privat. Ada banyak tools yang dapat dimanfaatkan untuk melakukan live forensics dan analisis data. Penelitian ini berhasil mengungkap bahwa layanan browsing secara privat yang disediakan oleh Mozilla Firefox nyata-nyata tidak privat secara menyeluruh. Artefak digital masih dapat ditemukan dalam RAM dan dianalisa dengan menggunakan berbagai macam tools untuk forensic, tools Autopsy berhasil mendapatkan data log browser sebesar 83%. Hasil artefak investigasi tersebut dapat menjadi acuan permulaan para investigator dalam penegakan hukum untuk mencari tersangka lain dan mendalami sebuah kasus yang melibatkan banyak pihak.

Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Author(s):  
Kevin Brock

The increasing prominence and variety of open source software (OSS) threaten to upset conventional approaches to software development and marketing. While a tremendous amount of scholarship has been published on the differences between proprietary and OSS development, little has been discussed regarding the effect of rhetorical appeals used to promote either type of software. This chapter offers just such an examination, focusing its scrutiny on the websites for three pairs of competitors (operating system, Web browser, and image manipulation program). The means by which the OSS websites promote their programs provide a significant set of insights into the potential trajectory of OSS development and its widespread public acceptance, in terms of both its initial philosophy and its perceived alternative nature to traditional software products and models.


Author(s):  
Imam Riadi ◽  
Sunardi Sunardi ◽  
Muhamad Ermansyah Rauli

 The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live forensics which is used when the computer is running and connected to the internet. This study aims to find digital evidence regarding cases of online shop fraud using the National Institute of Standards and Technology (NIST) method. Digital evidence can be obtained using forensic tools, namely RamCapturer, FTK Imager and Winhex. RamCapturer is used to acquire data in RAM, FTK Imager is used for imaging and Winhex is used to analyze data that has been taken. The results obtained in this study were conversational recordings consisting of conversation time, conversation content and conversation status which could be digital evidence in uncovering the online shop fraud crime that occurred.


2017 ◽  
Vol 8 (1) ◽  
pp. 50-57
Author(s):  
Dafwen Toresa

Abstrak- Pada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan, maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa. Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client). Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute. Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute Abstract- At this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy server on different operating system that is Linux Operating System with Squid tools and Windows Operating System with Winroute tool. This study was conducted to determine the comparison of browsing speed of the user's computer (client). The browser used on the user's computer is Mozilla Firefox. This study uses two client computers with each test 5 times accessing web browsing / destination testing via proxy server. From the results of tests conducted, it can be concluded that the application of proxy server in linux operating system with squid tools faster browsing from client using the same web browser and client computer different from the proxy server windows operating system with winroute tools. Keywords: Proxy Server, Linux, Windows, Squid, Winroute


Author(s):  
Kevin Brock

The increasing prominence and variety of open source software (OSS) threaten to upset conventional approaches to software development and marketing. While a tremendous amount of scholarship has been published on the differences between proprietary and OSS development, little has been discussed regarding the effect of rhetorical appeals used to promote either type of software. This chapter offers just such an examination, focusing its scrutiny on the websites for three pairs of competitors (operating system, Web browser, and image manipulation program). The means by which the OSS websites promote their programs provide a significant set of insights into the potential trajectory of OSS development and its widespread public acceptance, in terms of both its initial philosophy and its perceived alternative nature to traditional software products and models.


Author(s):  
Sharra Mae B. Fernandez ◽  

This experimental research study determined and compared the webpage browsing performance of proprietary and open source operating systems on wireless networks. It was intended to reveal the significant differences in the webpage browsing performance between proprietary and open source operating systems on wireless networks when classified as to hardware specifications and type’s web content. The researchers used the JavaScript Console of the Google Chrome web browser application to determine the time of the webpage to fully load. Operating system was the independent variable. Hardware specifications which were classified as old system and new system and types of web content which was also classified as static and dynamic webpages were the intervening variables. Webpages browsing performance was the dependent variable. The statistical tools used were arithmetic mean, and t-test. It also revealed that there were significant differences in the webpage browsing performance between proprietary and open source operating system on wireless networks when classified as to hardware specification and web content. The proprietary and open source operating systems were statistically different when classified as to hardware specifications and type of web content.


2018 ◽  
Vol 4 (1) ◽  
pp. 54-65
Author(s):  
Efmi Maiyana

Android is an Open Source operating system that gives developers the freedom to develop applications, with the advantages of android operating system, will help many android-based smartphone users to be able to enjoy various applications, one application is the Android-Based Preview Application, the main purpose of this Application is assisting Muslims in reciting the necessary prayers in daily life effectively and efficiently. The type of data used is a secondary data type in which data is obtained from reference books and literature related to this case. There are several stages in making this application, namely analysis, design, work processes, and evaluation of the program model that has been produced. This android-based prayer collection app, can be used on android-based smartphones in the least 4.1 version in this application testing can run smoothly


Author(s):  
Maaz Sirkhot ◽  
Ekta Sirwani ◽  
Aishwarya Kourani ◽  
Akshit Batheja ◽  
Kajal Jethanand Jewani

In this technological world, smartphones can be considered as one of the most far-reaching inventions. It plays a vital role in connecting people socially. The number of mobile users using an Android based smartphone has increased rapidly since last few years resulting in organizations, cyber cell departments, government authorities feeling the need to monitor the activities on certain targeted devices in order to maintain proper functionality of their respective jobs. Also with the advent of smartphones, Android became one of the most popular and widely used Operating System. Its highlighting features are that it is user friendly, smartly designed, flexible, highly customizable and supports latest technologies like IoT. One of the features that makes it exclusive is that it is based on Linux and is Open Source for all the developers. This is the reason why our project Mackdroid is an Android based application that collects data from the remote device, stores it and displays on a PHP based web page. It is primarily a monitoring service that analyzes the contents and distributes it in various categories like Call Logs, Chats, Key logs, etc. Our project aims at developing an Android application that can be used to track, monitor, store and grab data from the device and store it on a server which can be accessed by the handler of the application.


2021 ◽  
Vol 7 (3) ◽  
pp. 175
Author(s):  
Nobuyuki Fukawa ◽  
Yanzhi Zhang ◽  
Sunil Erevelles

Today, Industry 4.0 technologies, such as Big Data analytics and mobile technologies, are forcing firms to seek new ways to create and deliver customer value. We argue that the Android project, one of the most successful open-source digital platforms, reflects a new business model in the age of digital transformation. In the Android community, application developers create and sell applications for the Android operating system provided by the open-source firm (Google), and share the profit with Google. Such an open-source strategy forces the open-source firm to give up the profits from selling the operating system to customers. A firm generally chooses an open-source strategy to increase its user network size. Using the concept of creative intensity, or the speed of idea generation, we offer a new explanation regarding the benefits of an open-source strategy in the age of digital transformation. We investigate how to enhance creative intensity and profit on the open-source digital platform. Our model suggests that an open-source strategy effectively manages the diminishing value of ideas and, thus, facilitates the dynamic capability of an open-source firm.


2018 ◽  
Vol 2 (2) ◽  
pp. 71-77 ◽  
Author(s):  
Aqeel Kazmi ◽  
Martin Serrano ◽  
John Soldatos

Sign in / Sign up

Export Citation Format

Share Document