Attack and Analysis on the Vulnerability of Tenda Wireless Routers

2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.

2019 ◽  
Vol 5 (1) ◽  
pp. 87-92
Author(s):  
Mugi Raharjo ◽  
Frengki Pernando ◽  
Ahmad Fauzi

The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2018 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Khairul Saleh ◽  
Tini Fitriani

Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account.   Keywords - Security System, Speedy Network


Author(s):  
Nur Wahyuning Sulistyowati ◽  
Farida Styaningrum ◽  
Nik Amah

This study aims to analyze the efficiency of the application of PPN e-Invoice to the compliance of Taxable Entrepreneurs (PKP) registered at KPP Pratama Madiun. This type of research includes qualitative research with exploratory methods. Data sources in the form of primary data obtained from interviews with Taxable Entrepreneurs (PKP) and Tax Officers. Analysis of data in research using exploratory analysis methods. The results showed that the application of e-Invoices by PKP registered in the scope of KPP Pratama Madiun had been efficiently realized in saving time making VAT invoices, saving manpower and time because the delivery/reporting of e-Invoices could be done in realtime via the internet network, accurate because e- Invoices do not allow creating invalid or invalid tax invoices, data security and confidentiality are guaranteed, save costs due to paperless e-Invoices, save archival storage space, and easily create VAT invoices and VAT e-SPTs. Thus the efficiency of the application of this VAT e-Invoice will impact the compliance of Taxable Entrepreneurs in carrying out their tax obligations.


2020 ◽  
Vol 5 (1) ◽  
pp. 178
Author(s):  
Taufik Rahman ◽  
Sumarna Sumarna ◽  
Hafis Nurdin

The internet network enters various sectors and is used in various activities, especially in the automation, industry 4.0 trend. Where almost all applications, ranging from desktops, websites, mobile (android and ios) that are used in various fields of education, transportation, banks, logistics, services, of course use high complexity internet networks that need to be analyzed so that high performance can be obtained. Analyzing the performance of MikroTik on the internet is the aim of this research. Research by configuring includes ip route, firewall filter, NAT, Mangle for packet tagging, Queue (bandwidth management), bridge wireless, DHCP and ip cloud DDNS on MikroTik. The results concluded that moving the configuration center point on the modem (giving the IP address down) to the MikroTik router can be done well, it can also translate company, institutional, school and even parent policies to the home internet when children access the internet, such as when it is allowed to access the internet can be arranged, things that may or may not be arranged in order to educate children to use the internet positively, use MikroTik to analyze internet network performance. As for the further research by looking at problems that exist after MikroTik is configured.


2021 ◽  
Vol 1 (2) ◽  
pp. 65-77
Author(s):  
Sumardi Jayanto ◽  
Ahmad Tantoni ◽  
Hasyim Asyari

SMKN 1 Praya is one of the schools in NTB with national standards. This school has a very broad environment. In addition, this school also has a fairly good internet network. This can be seen by the breadth of the internet network that almost covers the entire school environment. At SMKN 1 Praya the main problem is the use of internet network data by students to be used to play games and social media during study hours so we need a system that is capable of being a protection so that users cannot use the internet to play games and social media during study hours. . Based on this, the study aims to examine the implementation of network security with mikrotic-based packet filtering at SMKN 1 Praya. In general, this study shows the success of blocking several online game applications such as mobile legend, free fire, TOT and social media such as facebook.


2017 ◽  
Vol 10 (2) ◽  
pp. 338-344
Author(s):  
Sunil Kumar ◽  
Maninder Singh

Network security, data security and several other security types such as the computer security collectively compose the word “Cloud Security”. Cloud computing posses a new challenge because traditional security mechanism is being followed are insufficient to safeguard the cloud resources. Cloud computing can easily be targeted by the attackers. A group of malicious users or illegitimate users can attack on system which may lead to denial the services of legitimate users. Such kinds of attacks are performed by the malicious (zombie) attackers. The zombie attack will degrade the network performance to large extend. Traditional techniques are not easily capable to detect the zombie attacker in the cloud network. So in this paper we have proposed a technique which is the enhancement of the mutual authentication scheme in order to detect and isolate zombie attack for the efficient performance of the network.


Asian Studies ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 287-300
Author(s):  
Helena Motoh

The paper focuses on the phenomenon of quoting Confucius, the classical Chinese thinker of the Western Zhou Dynasty. Firstly, it approaches the core issue of quotes and historicity of the “master said” narrative which marked the tradition of quoting Confucius and understanding his heritage through the form of quotes. In the core part of the paper, a selection of ten quotes that most commonly circulate on the Internet are analysed and traced to their most probable sources, while the paper then concludes by approaching the problem of misquoting from a historical and philosophical point of view.


Author(s):  
Andreas Sebayang ◽  
Indrastanti Ratna Widiasari

Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the network.


2013 ◽  
Vol 347-350 ◽  
pp. 3377-3380
Author(s):  
Xiao Feng Wang

Cloud computing is a hot technology now, is a new business model. The use of cloud computing to businesses in many industries, especially e-commerce has brought new opportunities, However, due to the characteristics of its own cloud computing and the Internet network security flaws, Resulting in e-commerce system security weaknesses. This paper describes the cloud computing and security issues of cloud computing in the e-commerce, through e-commerce security needs analysis, proposed ensuring e-commerce security methods in the cloud.


Sign in / Sign up

Export Citation Format

Share Document