10 research outputs found

    Design of Network-based Security System for Windows Nt Network Operations to Achieve Efficiency

    Full text link
    In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems. Data security is very important but because it provideswindows applications security system that can protect applications that are used bythe user that is using the mandatory profile and policy editor. a user is restricted tolimit the network but also users can create security on the local drive directory is usedso it can not be accessed by anyone, including supervisors

    Working Alarm System Analysis Using Password

    Full text link
    Statistics show that each year a robbery in our country growing, the robbers did nothesitate to commit an act of violence against his victims even to commit murder.Most robberies occur by opening a door or window with one way. The simplest wayto combat this robbery is by preventing the open door or window with a lock.To reduce the increase in robberies of symptoms that often occur in our countryespecially in major cities, the author wants to put forward a robbery alarm system.Not a professional and expensive, but a simple and inexpensive system, but very ableto prevent the robbery and the robber so shocked and terrified him to cancel hisintention to conduct the robbery

    INFORMATION CONTROL DESIGN HOUSE PROTOTYPE COMPUTER BASED IBM PC

    No full text
    Computer systems today are not only used as a tool to assist their daily work, but alsoused as entertainment and advice on development control is currently used as a tool.That's why the house lights were used computers to control them. As in theconventional switch, the computer can control the lights manually through a pressurebutton. Besides computers have advantages in controlling the lights are programmed.So users need not bother to go to each room to turn on or turn off the lights in thebuilding with plenty of space. Simply through one central place, everything has beenchecked. So we use a relay that will mediate between the computer with a series oflights. So that each can operate can be mutually affected the voltage differencebetween the two

    DESIGN OF NETWORK-BASED SECURITY SYSTEM FOR WINDOWS NT NETWORK OPERATIONS TO ACHIEVE EFFICIENCY

    No full text
    In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems. Data security is very important but because it provideswindows applications security system that can protect applications that are used bythe user that is using the mandatory profile and policy editor. a user is restricted tolimit the network but also users can create security on the local drive directory is usedso it can not be accessed by anyone, including supervisors

    COMPUTER NETWORK CONNECTING WITH THE PERSONAL COMPUTER (PC)

    No full text
    Skytel operations in Indonesia have access to data located in several separate cities,namely Jakarta, Bandung, Semarang, Surabaya, Denpasar and Medan. At the headoffice (Jakarta) terdapt two backbone, where a backbone is used to addressoperational problems (sending information) and the backbone, the other is used tohandle the administration. Each branch office is connected to one backbone, only thecentral office, which handles the operational backbone only, while the backbone thathandles all administrative issues held by the central office. In order for the localnetwork can access the branch office network backbone system of localadministration head office or vice versa, then the media needed to be able to connectthe computer networks of two or more of these. In this case the media is a computernetwork connecting Personal Computers (PCs) which are set as a router using theUNIX operating system

    LAN NETWORK MANAGEMENT SYSTEM DESIGN IN PT. ABC

    No full text
    In all cases, the process of choosing what type of system and network to the appropriate network operating system relies heavily on an understanding of running a business firm (in terms of managing data and information into something meaningful). Hence thing to note is studied process data and information flow within an existing business in a way to analyze and evaluate as precisely as possible. Emphasized here that the selected network must support and reflect the ways data / information flow or process in the conduct of company business. Reviewing and analyzing the data stream back to processed into useful information, and efforts to improve management processes, and visualize network support for the improvement company

    ELECTRONIC WALL CLOCK WITH LED AND SEVEN SEGMENT POINTER

    No full text
    In making this writing, the author makes a simple tool in the form of an electronic clock display with hours, minutes and seconds are interesting. Two of the seven segment displays double pulses minutes and seconds. While the hours indicated by the LED 12 arranged around the seven segment.The purpose of this paper is to analyze how the workings of the tool, what errors found on the appliance, as well as what components are used in the manufacture of this appliance. At the research / writing, writer use method of book study, namely materials associated with the writing of the book and testing these tools, namely data drawn from experimental results using a simple tool which was then analyzed and explained.In this tool Decade Counter IC used for the calculation of the number of incoming pulses at the input. And used BCD to Decimal Decoder IC that will encode binary information in question into the appropriate voltages to mendrive display devices

    OPTIMIZING INTRANET NETWORK SYSTEM DESIGN WITH CONTROL PANEL ON USING WINDOWS 95 OPERATING SYSTEM

    No full text
    Intranet that can bridge all of shape due to the use of network protocols TCP / IP (Transmission Control Protocol / internetworking protocol) is already a standard so that all people are connected in a network can access the Intranet system of systems regardless of type of computer and operating system used. Intranet system can be implemented into a variety of existing network systems such as Novel, Windows, Workgroup and others. And it is also mastering the basics of HTML so that they can create their own homepages that can be displayed on the Intranet server

    E-COMMERSE PROJECT DESIGN IN PT. LATOKA MINARYA

    No full text
    In writing this paper discusses the design of e-commerce project that would apply to companies engaged in maritime, where the sales made by companies other than sold to Indonesia also imported abroad. So it required a project design e_commerce to enable customers to obtain information. The writer tries to design an e-Commerce project into a concept view website. First the authors analyze the current system flowchart documents in the company, then the author tries to create a system that can facilitate the company in handling the product offering, namely through the internet along with an initial capital of thinking as an estimate, and project schedule. It is expected that after this project made the company can make it easier to exchange information to subscribers
    corecore