server computer
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 12)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Natanael Christianto ◽  
Wiwin Sulistyo

Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime. Cyber crime can be done by all internet users, without exception, to earn a profit. Security monitoring system server through the app messenger Telegram can help administrators in the work because always be on standby in front of the server computer. Notice of Snort as IDS via Telegram also quicked and can be accepted anywhere. In taking action when the server something happened not too late. Target cyber crime also can attack anyone without exception. A system should be a strength, with the protection of a secure network that will be difficult to hack by hackers. The server is the main target in the conduct of cyber crime. The use of the server must maintain to secure all the data is not misused by persons who are not responsible. Each server is a system that should be an administrator as a guard on duty watching and taking action when something happens on the server. To monitor a server, an administrator should always standby in front of the server computer so as not to late take action when the server is about to happen something.


Author(s):  
Pratic Chakraborty

Abstract: Machine learning is the buzz word right now. With the machine learning algorithms one can make a computer differentiate between a human and a cow. Can detect objects, can predict different parameters and can process our native languages. But all these algorithms require a fair amount of processing power in order to be trained and fitted as a model. Thankfully, with the current improvement in technology, processing power of computers have significantly increased. But there is a limitation in power consumption and deployability of a server computer. This is where “tinyML” helps the industry out. Machine Learning has never been so easy to access before!


Author(s):  
Theodorus Kristian Widianto ◽  
Wiwin Sulistyo

Security on computer networks is currently a matter that must be considered especially for internet users because many risks must be borne if this is negligent of attention. Data theft, system destruction, and so on are threats to users, especially on the server-side. DDoS is a method of attack that is quite popular and is often used to bring down servers. This method runs by consuming resources on the server computer so that it can no longer serve requests from the user side. With this problem, security is needed to prevent the DDoS attack, one of which is using iptables that has been provided by Linux. Implementing iptables can prevent or stop external DDoS attacks aimed at the server.


Author(s):  
Anthony Anggrawan ◽  
Raisul Azhar ◽  
Bambang Krismono Triwijoyo ◽  
Mayadi Mayadi

The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.


Compiler ◽  
2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Harliyus Agustian ◽  
Agung Nugraha

The function of the Adisutjipto-Aerospace Institute of Technology (ITDA) library is to provide borrowing and reimbursement services for books insured by members of the library. The books which increase in number each year occupy a lot of space in the library, it is therefore necessary to study it so that the form of this book is no longer physical but digital or paperless to be able to be stored on a server computer. This form of library is known as a digital library or e-library. The electronic library is a modern library as a place which provides a source of educational information with more convenience and security. The flow in the application is not very different from the flow in the manual library. Security becomes an important part of an application, by limiting network access, accessing PDF documents and implementing PDF Viewer using the PDF.js library by rendering PDF documents on a canvas capable of blocking illegal downloads. Based on the test results, the electronic library application can work properly. The speed of opening a PDF document is influenced by the speed of the server, the content contained in the PDF and the size of the PDF file.


Author(s):  
Roman Maximov ◽  
Sergey Sokolovsky ◽  
Ivan Voronchikhin

The main factors that determine the expansion of capabilities and increase the effectiveness of network intelligence to identify the composition and structure of client-server computer networks due to the stationarity of their structural and functional characteristics are analyzed. The substantiation of an urgent problem of dynamic management of structurally-functional characteristics of the client-server computer networks functioning in the conditions of network reconnaissance is resulted on the grounds of the revealed protection features of client-server computer networks at the present stage that is based on realization of principles of spatial safety maintenance, and also formalization and introduction of forbidding regulations. The mathematical model allowing to find optimum modes for dynamic configuration of structurally-functional characteristics of client-server computer networks for various situations is presented. Calculation results are given. An algorithm is presented that makes it possible to solve the problem of dynamic configuration of the structural and functional characteristics of a client-server computer network, which reduces the reliability time of data obtained by network intelligence. The results of practical tests of software developed on the basis of the dynamic configuration algorithm of client-server computer networks are shown. The obtained results show that the use of the presented solution for the dynamic configuration of client-server computer networks allows to increase the effectiveness of protection by changing the structural and functional characteristics of client-server computer networks within several subnets without breaking critical connections through time intervals that are adaptively changed depending on the functioning conditions and the attacker’s actions. The novelty of the developed model lies in the application of the mathematical apparatus of the Markov’s theory of random processes and Kolmogorov’s solution of equations to justify the choice of dynamic configuration modes for the structural and functional characteristics of client-server computer networks. The novelty of the developed algorithm is the use of a dynamic configuration model for the structural and functional characteristics of client-server computer networks for the dynamic control of the structural and functional characteristics of a client-server computer network in network intelligence.


2020 ◽  
Vol 5 (1) ◽  
pp. 26-34
Author(s):  
Amsar

Each online based server cannot be fully secured from various external attacks that attempt to infiltrate the system. Server security is the most important part for administrators against intruders who carry out their actions in attacking computer systems, there are several attack methods that can be done, method like brute-force are usually deployed to attack computer security systems that are connected to the internet. In this study to overcome attacks penetrating into the server system, the port knoking method can be used as a step taken to prevent attacks that enter the system or also known as the authentication method. By using this port knoking method the administrator can control the system to be more secure from brute-force attackers addressed in certain parts such as SSH server and FTP server. So that users can perform services connected with SSH server and FTP server services, knocked functions as a port knocking daemon that is ready to receive port knocking authentication from the user then rewrites the firewall, so that the connected services can be secured from attacks that try to infiltrate the server system. Furthermore, Ip tables and uncomplicated firewalls function to build firewalls that will deny connections to the SSH server and FTP server services. So when a foreign user accesses SSH and FPT without first doing the autendiction, the firewall will reject the connection, but if the user passes the port knocking autendiction stage via sending SYN packets to the port provided in the knocking daemon port, then the knocking daemon port is will rewrite the firewall so users can connect to the SSH server and FPT server services.


2020 ◽  
Author(s):  
Sasqia Ismi Aulia ◽  

This study aims to design a LAN network for data backup systems that are in accordance with certain aspects such as the selection of network design, network hardware, network transmission media, network connection devices, and network operating systems. Data is the most important thing for everyone, data can usually be reused even though it has not been used for some time, and therefore data storage is a serious problem that must be considered. Data on the server computer is very important to be maintained so that a backup process is needed on that data to another computer that is used as a backup in the event of damage to the hardware and software of the server computer. FTP is one of the solutions to the problems faced above,where FTP can be used to process the download and upload between the server and client computers. This design uses the Autobot system. The expected benefit in designing this LAN is that the existing network at SMP Negeri 6 Pekanbaru is not only used by employees and employees but can be used and enjoyed by teachers and students to access the internet anywhere as long as it is still within the scope of the SMP Negeri 6 area Pekanbaru.


2019 ◽  
Vol 9 (2) ◽  
pp. 369-376
Author(s):  
Soni Soni ◽  
Abdurrahman Abdurrahman ◽  
Afdhil Hafid

Virtualization technology is a topic that began to be scrutinized by researchers. This is inseparable from the technology's ability to reduce the cost of providing infrastructure and operations independently for each service to be served. With server virtualization, we can make several computers into one, which used to be possible for server computers to have three physical computers that can be used as one for the three server computers which in fact the resources on a single physical server computer will not use all the resources in one single physical computer. The existence of proxmox, then all servers can be connected in a network together so that they are able to streamline time. In addition, Proxmox has a web console that can be used for various purposes in server virtualization and maintenance. In this study, the performance of server virtualization using ProxmoxVE will be examined. This study is intended to determine the load of memory usage, load the CPU when running all the servers in Proxmox, and examine the Throughput, PacketLoss, Delay and Jitter on the server. Keyword: Proxmox, Virtualization, Resources, Server, Operating System


Sign in / Sign up

Export Citation Format

Share Document