Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps …
DDoS attack is one of the security threats frequently experienced on the internet, which utilizes multiple sources to send excessive traffic to a server, causing system failure, making DDoS a signi…
With the increasing use of vehicles and the large human population in urban areas, the level of traffic jams is high. Every motorist certainly does not want to be stuck in a traffic jam for too lon…
Sistem keamanan pada kunci pintu rumah yang ada saat ini kebanyakan merupakan sistem keamanan manual berupa kunci atau gembok konvensional. Penelitian bertujuan menciptakan sistem keamanan pada kun…
Di dalam perkembangan bisnis, web service sungguh sangat dibutuhkan dalam integrasi sistem karena tidak melihat platform, arsitektur maupun bahasa pemrograman yang digunakan oleh sumber berbeda. Ke…
In modern times, growing on the Internet in terms of technology and its use can bring many positive things to human life. Surely it cannot be denied that Internet technology has had a negative impa…
DDoS TCP Flood attack is a condition where the attacker exploits the three-way handshaking mechanism of the TCP connection establishment process, where the server will be flooded with requests for …
Wannacry ransomware is a specific type of malware that threatens access to victims unless their data has been redeemed or paid for. Usually, ransomware encrypts the content on the victim's hard dri…
Sistem Supervisory Control And Acquisition (SCADA) adalah sistem kontrol industri otomatis yang digunakan untuk mengontrol serta memantau berbagai tahapan industri yang menyebar luas, dimana akuisi…
Visualization is a technique to present the number of Ransomware packet attacks that occur on datasets that have been provided by Unavarra. Attacks Visualization aiming to recognize attacks and mak…