file transfer protocol
Recently Published Documents


TOTAL DOCUMENTS

113
(FIVE YEARS 25)

H-INDEX

7
(FIVE YEARS 2)

2021 ◽  
Vol 1 (2) ◽  
pp. 95-102
Author(s):  
Alexander Theo Philus Tambunan ◽  
Adi Prijuna Lubis ◽  
Syartika Anggraini

Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that specifies how data is exchanged, and one of the most widely used protocols is the File Transfer Protocol (FTP). FTP  is generally useful as a means of exchanging files or data in a network. The FTP protocol is not secure enough, because when data transfer there is no security to protect it. Therefore the FTP protocol is necessary for additional security, by implementing the SSL security protocol or Secure Socket Layer Security protecting the FTP protocol during data transfer. SSL certificates are used for the purpose of handling the security of data packets transmitted over the network system. When SSL is activated, the server and client when the connection occurs will be encrypted so that the data cannot be seen by others. Keywords: FTP; Network; Server; SSL  Abstrak: Suatu Kemajuan teknologi komunikasi saat ini memiliki pengaruh terhadap perkembangan didalam pengelolaan data didalam sendi kehidupan, membuat kebutuhan akan media center menjadi sesuatu yang harus dalam penyimpanan arsip digital. Data tidak selamanya akan tersimpan di dalam personal computer saja tetapi akan lebih baik jika ada wadah data terpusat menjadi solusi dalam media penyimpanan, agar menjaga dari kehilangan data atau cadangan data. Istilah jaringan (network) dipakai apabila terdapat minimal dua atau lebih perangkat yang terhubungkan satu dengan yang lainnya. Untuk melaksanakn pertukaran data didalam jaringan ini, digunakan protocol yang menspesifikasikan bagaimana data dipertukarkan, dan salah satu protocol yang banyak digunakan adalah File Transfer Protocol (FTP). FTP umumnya bermanfaat sebagai sarana pertukaran file atau data dalam suatu network. Protokol FTP tidaklah cukup aman, dikarenakan ketika transfer data tidak ada keamanan untuk melindunginya. Maka dari itu protokol FTP perlu untuk penambahan keamanan, dengan menerapkan protokol keamanan SSL atau  Secure Socket Layer Security melindungi protokol FTP pada saat transfer data. Sertifikat SSL dimanfaatkan  untuk keperluan menangani keamanan paket data yang ditransmisikan melalui sistem jaringan. Ketika SSL diakatifkan, maka server dan client ketika terjadi koneksi akan ter enkripsi sehingga data yang ada tidak dapat untuk dilihat oleh orang lain. Kata kunci: FTP;Network;  Server; SSL 


2021 ◽  
Vol 2 (2) ◽  
pp. 1245-1256
Author(s):  
Viviana Bernal-Benítez ◽  
Juan Gómez-Malagón ◽  
Camilo Pardo-Beainy

The following article presents the techniques developed for the treatment of images obtained from the modeling process with AERMOD of data on the immission concentration of PM10 particulate matter. This data conditioning was carried out in order to generate, through the analysis of dispersion images, isolines that identify and quantify the areas of the Sogamoso Valley where PM10 concentrations occur from emissions from the limestone firing process in Nobsa, Boyacá. It is a first approach to the prediction of the dispersion phenomenon and the spatio-temporal determination of the influence that this immission has on the air quality conditions of a region.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-12
Author(s):  
Belinda Ayuningtyas ◽  
Syaeful Ilman

Keamanan menjadi fokus utama bagi setiap orang, terutama bagi mereka yang memiliki barang berharga. Kamera pengintai merupakan salah satu cara untuk mencegah terjadinya pencurian. Sistem pengawasan telah dirancang dengan menggunakan IP kamera dengan fitur Motion Detection di dalamnya. Fungsi kamera IP adalah untuk mendeteksi dan menangkap gambar dari setiap gerakan dengan menggunakan fiturnya dan mengirimkan snapshot ke situs pengguna melalui FTP (File Transfer Protocol). Selain itu, sensor PIR (Passive InfraRed) yang digunakan sebagai motiondetectorakan dihubungkan ke mikrokontroler Arduino uno dan ethernet shield. Sistem ini juga menggunakan aplikasi pada smartphone android sebagai alert. Jika sensor mendeteksi beberapa gerakan, sensor akan mengaktifkan notifikasi di aplikasi android. Notifikasi di aplikasi android berisi 'Motion Detected check ftp: //ftp.roomsurveillance.info'. Hasil dari sistem surveilans ini berupa snapshot yang dikirimkan oleh kamera IP, dapat dilihat dan diunduh dengan mengklik link FTP. Sistem pengawasan ini dapat meningkatkan keamanan ruangan dalam kondisi realtime.


2021 ◽  
Vol 9 (1) ◽  
pp. 45-55
Author(s):  
Abdul Djalil Djayali ◽  
Rifaldi Nurdin ◽  
Rachmat Saleh Sukur

Keamanan berbanding terbalik dengan kenyamanan, semakin nyaman dalam penerapan teknologi maka akan berdampak pada sisi keamanan sistem. Server merupakan salah satu infratruktur yang penting dalam mengelolah data. Mencegah serangan pada Server penting untuk dilakukan. Penerapan firewall dapat meminimalisir serangan yang membahayakan Server. Salah satunya dengan menerapkan aplikasi Intrusion Detection System (IDS) seperti Snort yang memiliki kemampuan untuk mendeteksi serangan yang terjadi pada sistem Server. Pada penelitian ini, penulis melakukan pengembangan sistem yang diberi nama R-Wall. Penerapan R-Wall bertujuan untuk mampu memonitor dan mengamankan server terhadap beberapa metode serangan, antara lain yaitu distribution denial of service (DDoS) ping of death, port scanning, brute force pada layanan file transfer protocol (FTP) dan brute force pada layanan secure shell (SSH). Hasil penerapan ini mampu memberikan notifikasi serangan yang dikirimkan melalui robot Telegram dengan total 247 serangan DDoS ping of death, 8 serangan port scanning, 247 serangan brute force pada layanan FTP dan 208 serangan pada layanan brute force SSH. R-Wall juga mampu melakukan pembatasan akses terhadap penyerang.


2021 ◽  
Vol 9 (01) ◽  
pp. 127-132
Author(s):  
Sourabh Saroha ◽  

Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and stretch, commencing from hackers. The coordination supervisor is in authority for safekeeping the Linux packet. Underneath maximum system formations, operator appellations, open sesame, FTP / tel-net / r-sh guidelines and relocated documentations be able to be seized by everyone programmed in the identical environment. To overcome this problem the user or the server can use secure shell, secure FTP, or file transfer protocol with transport layer security. The operating system can be protected more securely by using the above protocols. The security of the linux modules can be protected by using security enhancement technique, trappings numerous measures to avert unlicensed coordination convention. The safe keeping structural design rummage-sale is called Flask, and delivers a spotless different protection strategy and implementation. This paper is a gestalt of the Flask architecture and the execution in Linux.


2021 ◽  
Vol 3 (1) ◽  
pp. 10
Author(s):  
Ilhamsyah Muhammad Nurdin ◽  
Abdul Fadlil

Eye sight is sometimes deceptive, especially in determining the quality of a canned food, so it is necessary to use technology that resembles human visual observation, namely in the form of an application. The process to detect the quality of canned food uses image processing methods, especially thresholding, which is then designed so that the application is able to determine the quality of canned food with the help of the MATLAB GUI which detects and then sends it from making the MATLAB GUI on the Laptop to Android using FTP (File Transfer Protocol). At the end of the process, it is marked with known good and bad quality of canned food with an android application that has been specially designed with an accuracy level of 84% with a thresholding value of 70.


2021 ◽  
Vol 10 (1) ◽  
pp. 30-40
Author(s):  
Stavros K. Archondakis

The objective of this study was to investigate the feasibility of implementing short videos captured by static telecytological applications for remote evaluation of cervical smears prepared by means of liquid-based cytology. The study was performed on representative short videos captured from a total of 404 cervical smears that were transferred via file transfer protocol to password-protected accounts for remote review by three independent cytopathologists. Statistical evaluation of cytological diagnoses detected no significant difference in diagnostic accuracy between the diagnoses proffered on the basis of short videos and digital images. Short videos production by static telecytology applications can be used as an alternative method for telecytological diagnosis of cervical smears, particularly for quality control purposes.


Sign in / Sign up

Export Citation Format

Share Document