The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, Blackbox records all important information that happens during the accident that is Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). The data is for by applying a compression method to make both of them get into transmission with on demand. This way is probably to present the data without has to find the black box. It will make the investigator easier on the evacuation process...
Server security is necessary to avoid all attack that will happen. IPS (Intrusion Prevention System) is an example of right solution for the security system. IPS can prevent an attack by using the IDS (Intrusion Detection System) and firewall features. In this paper, bro IPS on the server will be tested with some attack include DOS (Denial of Service), port scanning, and ftp brute force to ensure...
The black box records all the important information that takes place on a flying plane. The black box is a tool used on airplanes to store all activities during flight. The black box has a Flight Data Recorder (FDR) and a Cockpit Voice Recorder. FDR and CVR function to record and record the existing in the aircraft. The black box has recordings of information that occurs during the flight. Data generated...
Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along...
Currently, the development of technology is progressing very fast, as well as information on the media technologies such as Push to Talk. But the level of information security of voice data that is sent still not assured. Confidential information security should be increased. Because it is required by cryptography method to maintain data confidentiality of such information. This final research project...
Power bank is a device used to support charging up a device battery, especially a mobile phone's battery. Since design of common power bank contain of battery cell and power controller, it will have some empty space to create a modified power bank. We could implement a tiny Micro controller named teensy. Teensy will create power bank detected as a storage media and all the selected data will be copied...
Autonomous sender is a program that is able to send log data automatically. The sender program is designed to send log data from kleptoware because it only creates log data without having a program to send it. Autonomous sender uses socket programming so that it can transfer the log data from one computer to another computer. There are two programs needed to support Autonomous sender. The programs...
The increase of technology usage, especially in online storage data with cloud system, makes data security become one of the most important requirements for the user. One of the ways to protect the data is with encryption process, it as a process to change a data form into a new one that can only be read by the chosen recipient. This technology has been carried out in the election process with e-voting...
Nowadays, the use of electronic voting in an election has been widely adopted as a replacement for conventional voting system. Apart from the benefits of using this system, in fact, there are still many problems that can occur, such as system errors, network security, data confidentiality, and others. One of the main problems is it does not guarantee the confidentiality and accuracy of the data that...
Soft keyboard is perhaps the most common human input device on smartphone. This study designed and implemented a proof-of-concept soft keyboard keylogger in Android. The soft keyboard app was designed to have the capability to capture keystrokes from user and save it. It also can record the GPS location of user at the time of typing and sent it to a remote server. From our testing, the app was capable...
Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing...
The development of today's technology is increasing technology became more sophisticated and easier for all human activities. Some human activities such as accessing open/lock room's door which is usually done manually or with a smartcard, so we must always carry all sorts of lock (lock house, garage locks, office locks, lock the car) or a smart card these in our daily activities. But sometimes we...
One of the most widely used multimedia data is Video on Demand. Video on Demand enables one to get diverse information easily and faster. However, this advantage is often misused currently. The less security of video is one of its problems. Video data can be pirated by any unauthorized person, harming the owners of the video data. To solve these problems, a security system with the cryptographic science...
Video on Demand (VoD) service have a concept that the user will have complete freedom to choose what he wants to see. VoD gives satisfaction is more personal than the interests of the people. The development of information technology through multimedia services such as Video on Demand cannot be separated from the issue of data security. Security is very important to maintain the data of those who...
Operating a computer to perform everyday tasks is sure to require input devices. The common human interface devices for operating a computer are mouse and keyboard. It means that modifying input devices can be alternative way to do monitoring and logging activity from a user. A keylogger is able to do such functions, but various hardware and software keylogger on the market are easily detectable either...
Development in technology bring digital world to be border-less. It's proven through a developed technology, when trade and transaction can be done not only using real money but also virtual one. Shopping process using virtual money has even more supported by existed Near Field Communication (NFC) device. This particular device works using radio frequency. In the year of 2011, Google was integrating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.