Pressman, R.s. (2015). Rekayasa Perangkat Lunak: Pendekatan Praktisi Buku I. Yogyakarta: Andi
Provided with permission by R.S. REKAYASA PERANGKAT LUNAK. Nov 03, 2012  Referensi. Rekayasa Perangkat Lunak – Pendekatan Praktisi, Roger S. Pressman, Ph.D, Andi Jogyakarta, 2012 – Buku 1. Rekayasa Perangkat Lunak. REKAYASA PERANGKAT LUNAK.
- Loraine McCarthy
- 2 years ago
- Views:
Transcription
1 DAFTAR PUSTAKA 1. A. Hasibuan, Zainal, Metodologi Penelitian Pada Bidang Ilmu Komputer Dan Teknologi Informasi, Fakultas Ilmu Komputer Universitas Indonesia, Adikusuma, Yan, Tia Narang Ali, Tri Wahyudi, Secure Authentication For Internet Banking With SMS Key, Makalah, Sekolah Tinggi Sandi Negara, Bogor, Ariyus, Dony, Computer Security, Penerbit Andi Yogyakarta, Artikel, Internet Banking Mandiri, tanggal akses 30 Januari Bank Mandiri, Aman Bertransaksi Dengan Token PIN Mandiri, tanggal akses 5 November Barker, Elaine, William Barker, William Burr, William Polk, and Miles Smid, Computer Secutiy, National Institute of Standards and Technology, Barus, N. Petra, Infrastruktur Kriptografi Pada Security Token Untuk Keperluan Internet Banking, ITB Bandung, Chan, Stephen, Stephen Lau, Jay Srinivasan, Adrian Wong, One Time Password Authentication for Open High Performance Computing Environments, Lbl. Gov Fowler, Martin, UML DISTILLED, Edisi 3, Panduan Singkat Bahasa Permodelan Objek Standar, Penerbit ANDI Yogyakarta, Friedl, Steve, An Illustrated Guide to Cryptographic Hashes, tanggal akses 29 Januari Gondowasito, Chandra, Studi Pemanfaatan Mersenne Twister sebagai Secure Random Number Generator dan Perbandingannya dengan SPNRG Lainnya, ITB Bandung, Menezes, A, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Munir, Rinaldi, Kriptografi, Penerbit Informatika Bandung,
2 2 14. Nugroho, Adi, Rekayasa Perangkat Lunak Berorientasi Objek dengan Metode USDP (Unified Software Development Process), Penerbit ANDI Yogyakarta, Pressman, Roger S, Rekayasa Perangkat Lunak : Pendekatan Praktisi (Buku 1/Roger S. Pressman : diterjemahkan oleh LN Harnaningrum), Penerbit Andi Yogyakarta, , Software Engineering, A Practitioner s Approach, Seventh Edition, McGraw-Hill International Edition, Rahardjo, Budi, Arsitektur Internet Banking Yang Terpercaya, INDOCISC, Rahardjo, Budi, Keamanan Sistem Informasi Berbasis Internet, INDOCISC, Riswandi, Budi Agus, Aspek Hukum Internet Banking, PT. Raja Grafindo Persada Jakarta, Sommerville, Ian, Software Engineering (Rekayasa Perangkat Lunak) edi si 6 jilid 1, Penerbit Erlangga Jakarta, Suprianto, Dodit, Buku Pintar Pemrograman PHP, OASE Media, Wicaksono, Rizki, Memahami Cara Kerja Token Internet Banking, tanggal akses 10 November 2010.
3 3 LAMPIRAN 1. Source Code MobileOTP.java package MobileOTP; import javax.microedition.midlet.*; import javax.microedition.lcdui.*; import java.util.date; import javax.microedition.rms.*; import MobileOTP.MD5; import java.util.calendar; public class MobileOTP extends MIDlet implements CommandListener private Command exitcommand = new Command('Exit', Command.SCREEN, 1); private Command aboutcommand = new Command('About', Command.SCREEN, 2); private Command infocommand = new Command('Info', Command.SCREEN, 2); private Command timezonecommand = new Command ('Time Zone', Command.SCREEN, 2); private Command responseonlycommand = new Command ('Response Only', Command.SCREEN, 2); private Command backcommand = new Command('Back', Command.BACK, 1); private Command cancelcommand = new Command('Cancel', Command.BACK, 1); private Command tzsavecommand = new Command('Save', Command.BACK, 2); private static String PIN=';
4 4 private static String pindis='; private static String secret='; private static String initdate='; private static int timez=12; private static int count=0; private static int initcount; private static RecordStore rs; Date now=new Date(); Calendar cnow; String epoch; public MobileOTP() public void startapp() PIN='; count=0; initcount=20; pindis='; try rs = RecordStore.openRecordStore( 'motp', true); if ( rs.getnumrecords()!=3 ) rs.closerecordstore(); RecordStore.deleteRecordStore( 'motp' ); rs = RecordStore.openRecordStore ('motp',true); rs.addrecord(' '.getbytes(),0,8); rs.addrecord('not initialized!'.getbytes(),0,16); rs.addrecord('12'.getbytes(),0,2); //System.out.println ('New RS!');
5 5 catch(recordstoreexception rse) System.out.println('RS Error!Open'); try secret=new String(rs.getRecord(1)); initdate=new String(rs.getRecord(2)); timez=integer.parseint(new String(rs.getRecord(3))); catch(recordstoreexception rse) System.out.println('RS Error! Read'); Canvas lowinput = new Canvas () String otp='; String seed='; MD5 hash; public void paint(graphics g) g.setcolor(255,255,255); int w=getwidth(); int h=getheight(); g.fillrect(0,0,w,h); g.setcolor(0,0,0); g.drawstring('mobile-otp',1,1,0); String printpin='chal: '+pindis; g.drawstring(printpin,w/7,h/3-2,0); if (PIN.equals('#**#')) if (initcount!= 0) g.setcolor(255,255,255); g.fillrect(0,0,w,h);
6 6 g.setcolor(0,0,0); g.drawstring('random Keys:',w/9,h/3-2,0); g.drawstring('+initcount,w/2-8,h/2,0); else secret=new MD5(seed).asHex().substring(0,16); cnow=calendar.getinstance(); String day='+cnow.get(calendar.day_of_month); String month='+(cnow.get(calendar.month)+1); String hour='+cnow.get(calendar.hour); String minute='+cnow.get(calendar.minute); String year='+(cnow.get(calendar.year)-2000); if (day.length()<2) day='0'+day; if (month.length()<2) month='0'+month; if (hour.length()<2)hour='0'+hour; if (minute.length()<2)minute='0'+minute; if (year.length()<2)year='0'+year; initdate=day+'/'+month+'/'+year+', '+hour+':'+minute; try rs.setrecord(1,secret.getbytes(),0,secret. length()); rs.setrecord(2,initdate.getbytes(),0,initdate. length()); catch (RecordStoreException rse) System.out.println('RS Error! Write'); g.setcolor(255,255,255); g.fillrect(0,0,w,h); g.setcolor(0,0,0);
7 7 g.drawstring('init-secret:',w/7,h/3-2,0); g.drawstring(secret,w/7,h/2,0); //g.drawstring(secret.substring(0,8),w/6,h/2,0); //g.drawstring(secret.substring(8,16), w/6,h/2+h/5,0); else if (count4) now=new Date(); epoch='+(now.gettime()+((timez-12)* )); epoch=epoch.substring(0,epoch.length()-4); otp=epoch+secret+pin; hash=new MD5(otp); otp=hash.ashex().substring(0,6); g.drawstring('pass: ' + otp,w/7,h/2,0); protected void keypressed (int keycode) if (PIN.equals('#**#') & initcount!= 0 ) seed=seed + ((char)keycode); initcount--; repaint(); else seed='; count++; initcount=20; if (count5)
8 8 count=1; PIN='; pindis='; PIN=PIN + ((char)keycode); pindis=pindis + ((char)keycode); repaint(); ; lowinput.addcommand(exitcommand); lowinput.addcommand(aboutcommand); lowinput.addcommand(infocommand); lowinput.addcommand(timezonecommand); lowinput.addcommand(responseonlycommand); lowinput.setcommandlistener(this); Display.getDisplay(this).setCurrent(lowinput); public void pauseapp() public void destroyapp(boolean unconditional) public void commandaction(command c, Displayable s) if ( c exitcommand ) try rs.closerecordstore();
9 9 catch(recordstoreexception rse) destroyapp(false); notifydestroyed(); if ( c aboutcommand ) Canvas about = new Canvas() public void paint(graphics g) int w=getwidth(); int h=getheight(); g.setcolor(255,255,255); g.fillrect(0,0,w,h); g.setcolor(0,0,0); g.drawstring('mobile-otp',3,3,0); g.drawstring('v. 1.06',3,3+h/5,0); g.drawstring('(c) 2003,2004',3,3+2*h/5,0); g.drawstring('m. Straub',3,3+3*h/5,0); ; about.addcommand(backcommand); about.setcommandlistener(this); Display.getDisplay(this).setCurrent(about); if ( c infocommand ) now=new Date(); epoch='+(now.gettime()+((timez 12)* )); epoch=epoch.substring(0,epoch.length()-4);
10 10 Canvas infoc = new Canvas() public void paint(graphics g) int w=getwidth(); int h=getheight(); g.setcolor(255,255,255); g.fillrect(0,0,w,h); g.setcolor(0,0,0); g.drawstring('epoch-time:',1,1,0); g.drawstring(epoch,1,1+h/5,0); g.drawstring('initialization:', 1,1+2*h/5,0); g.drawstring(initdate,1,1+3*h/5,0); ; infoc.addcommand(backcommand); infoc.setcommandlistener(this); Display.getDisplay(this).setCurrent(infoc); if ( c backcommand c cancelcommand ) startapp (); if ( c tzsavecommand ) try rs.setrecord(3,('+timez).getbytes(),0, ('+timez).length()); catch (RecordStoreException rse)
11 11 System.out.println('RS Error! Write'); startapp (); if ( c responseonlycommand ) now=new Date(); epoch='+(now.gettime()+ ((timez-12)* )); epoch=epoch.substring(0,epoch.length()-4); String otp=epoch+secret; MD5 hash=new MD5(otp); otp=hash.ashex().substring(0,6); final String finalotp = otp.tostring(); Canvas infoc = new Canvas() public void paint(graphics g) int w=getwidth(); int h=getheight(); g.setcolor(255,255,255); g.fillrect(0,0,w,h); g.setcolor(0,0,0); g.drawstring('pass:',1,1,0); g.drawstring(finalotp,1,1+h/5,0); ; infoc.addcommand(backcommand); infoc.addcommand(responseonlycommand); infoc.setcommandlistener(this); Display.getDisplay(this).setCurrent(infoc); if ( c backcommand c cancelcommand )
12 12 startapp (); if ( c tzsavecommand ) try rs.setrecord(3,('+timez).getbytes(),0, ('+timez).length()); catch (RecordStoreException rse) System.out.println('RS Error! Write'); startapp (); if ( c timezonecommand ) Canvas timezc = new Canvas() public void paint(graphics g) now=new Date(); epoch='+(now.gettime()+((timez-12)* )); epoch=epoch.substring(0,epoch.length()-4); int w=getwidth(); int h=getheight(); g.setcolor(255,255,255); g.fillrect(0,0,w,h); g.setcolor(0,0,0); g.drawstring('set Time Zone=',1,1,0); if (timez > 12) g.drawstring('utc'+ (12-timez),1,1+h/5,0); else g.drawstring('utc+'+(12-timez),1,1+h/5,0);
13 13 g.drawstring('epoch-time:',1,1+2*h/5,0); g.drawstring(epoch,1,1+3*h/5,0); protected void keypressed (int keycode) if (keycode KEY_NUM1 keycode KEY_NUM4 keycode KEY_NUM7 keycode KEY_STAR keycode LEFT) timez++; if (keycode KEY_NUM3 keycode KEY_NUM6 keycode KEY_NUM9 keycode KEY_POUND keycode RIGHT) timez--; if (timez < 0 ) timez=0; if (timez > 24 ) timez=24; repaint(); ; timezc.addcommand(cancelcommand); timezc.addcommand(tzsavecommand); timezc.setcommandlistener(this); Display.getDisplay(this).setCurrent(timezc);
14Gta vice city stories.cso. 14 2. Source Code MD5.java package MobileOTP; class MD5State int state[]; int count[]; byte buffer[]; public MD5State() buffer = new byte[64]; count = new int[2]; state = new int[4]; state[0] = 0x ; state[1] = 0xefcdab89; state[2] = 0x98badcfe; state[3] = 0x ; count[0] = count[1] = 0; public MD5State (MD5State from) this(); int i; for (i = 0; i < buffer.length; i++) this.buffer[i] = from.buffer[i]; for (i = 0; i < state.length; i++) this.state[i] = from.state[i]; for (i = 0; i < count.length; i++) this.count[i] = from.count[i]; ; public class MD5
15 15 MD5State state; MD5State finals; static byte padding[] = (byte) 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ; public synchronized void Init () state = new MD5State(); finals = null; public MD5 () this.init(); public MD5 (Object ob) This (); Update (ob.tostring()); private int rotate_left (int x, int n) return (x << n) (x >>> (32 - n)); private int uadd (int a, int b) long aa, bb; aa = ((long) a) & 0xffffffffL; bb = ((long) b) & 0xffffffffL;
16 16 aa += bb; return (int) (aa & 0xffffffffL); private int uadd (int a, int b, int c) return uadd(uadd(a, b), c); private int uadd (int a, int b, int c, int d) return uadd(uadd(a, b, c), d); private int FF (int a, int b, int c, int d, int x, int s, int ac) a = uadd(a, ((b & c) (~b & d)), x, ac); return uadd(rotate_left(a, s), b); private int GG (int a, int b, int c, int d, int x, int s, int ac) a = uadd(a, ((b & d) (c & ~d)), x, ac); return uadd(rotate_left(a, s), b); private int HH (int a, int b, int c, int d, int x, int s, int ac) a = uadd(a, (b ^ c ^ d), x, ac); return uadd(rotate_left(a, s), b); private int II (int a, int b, int c, int d, int x, int s, int ac) a = uadd(a, (c ^ (b ~d)), x, ac); return uadd(rotate_left(a, s), b); private int[] Decode (byte buffer[], int len, int shift)
17 17 int out[]; int i, j; out = new int[16]; for (i = j = 0; j < len; i++, j += 4) out[i] = ((int) (buffer[j + shift] & 0xff)) (((int) (buffer[j shift] & 0xff)) << 8) (((int) (buffer[j shift] & 0xff)) << 16) (((int) (buffer[j shift] & 0xff)) << 24); /* System.out.println('out[' + i + '] = t' + ((int) buffer[j shift] & 0xff) + 't t' + ((int) buffer[j shift] & 0xff) + 't t' + ((int) buffer[j shift] & 0xff) + 't t' + ((int) buffer[j shift] & 0xff));*/ return out; private void Transform (MD5State state, byte buffer[], int shift) int a = state.state[0], b = state.state[1], c = state.state[2], d = state.state[3], x[]; x = Decode(buffer, 64, shift); /* Round 1 */ a = FF (a, b, c, d, x[ 0], 7, 0xd76aa478); /* 1 */ d = FF (d, a, b, c, x[ 1], 12, 0xe8c7b756); /* 2 */ c = FF (c, d, a, b, x[ 2], 17, 0x242070db); /* 3 */ b = FF (b, c, d, a, x[ 3], 22, 0xc1bdceee); /* 4 */ a = FF (a, b, c, d, x[ 4], 7, 0xf57c0faf); /* 5 */ d = FF (d, a, b, c, x[ 5], 12, 0x4787c62a); /* 6 */
18 18 c = FF (c, d, a, b, x[ 6], 17, 0xa ); /* 7 */ b = FF (b, c, d, a, x[ 7], 22, 0xfd469501); /* 8 */ a = FF (a, b, c, d, x[ 8], 7, 0x698098d8); /* 9 */ d = FF (d, a, b, c, x[ 9], 12, 0x8b44f7af); /* 10 */ c = FF (c, d, a, b, x[10], 17, 0xffff5bb1); /* 11 */ b = FF (b, c, d, a, x[11], 22, 0x895cd7be); /* 12 */ a = FF (a, b, c, d, x[12], 7, 0x6b901122); /* 13 */ d = FF (d, a, b, c, x[13], 12, 0xfd987193); /* 14 */ c = FF (c, d, a, b, x[14], 17, 0xa679438e); /* 15 */ b = FF (b, c, d, a, x[15], 22, 0x49b40821); /* 16 */ /* Round 2 */ a = GG (a, b, c, d, x[ 1], 5, 0xf61e2562); /* 17 */ d = GG (d, a, b, c, x[ 6], 9, 0xc040b340); /* 18 */ c = GG (c, d, a, b, x[11], 14, 0x265e5a51); /* 19 */ b = GG (b, c, d, a, x[ 0], 20, 0xe9b6c7aa); /* 20 */ a = GG (a, b, c, d, x[ 5], 5, 0xd62f105d); /* 21 */ d = GG (d, a, b, c, x[10], 9, 0x ); /* 22 */ c = GG (c, d, a, b, x[15], 14, 0xd8a1e681); /* 23 */ b = GG (b, c, d, a, x[ 4], 20, 0xe7d3fbc8); /* 24 */ a = GG (a, b, c, d, x[ 9], 5, 0x21e1cde6); /* 25 */ d = GG (d, a, b, c, x[14], 9, 0xc33707d6); /* 26 */ c = GG (c, d, a, b, x[ 3], 14, 0xf4d50d87); /* 27 */ b = GG (b, c, d, a, x[ 8], 20, 0x455a14ed); /* 28 */ a = GG (a, b, c, d, x[13], 5, 0xa9e3e905); /* 29 */ d = GG (d, a, b, c, x[ 2], 9, 0xfcefa3f8); /* 30 */ c = GG (c, d, a, b, x[ 7], 14, 0x676f02d9); /* 31 */ b = GG (b, c, d, a, x[12], 20, 0x8d2a4c8a); /* 32 */ /* Round 3 */ a = HH (a, b, c, d, x[ 5], 4, 0xfffa3942); /* 33 */ d = HH (d, a, b, c, x[ 8], 11, 0x8771f681); /* 34 */ c = HH (c, d, a, b, x[11], 16, 0x6d9d6122); /* 35 */ b = HH (b, c, d, a, x[14], 23, 0xfde5380c); /* 36 */
19 19 a = HH (a, b, c, d, x[ 1], 4, 0xa4beea44); /* 37 */ d = HH (d, a, b, c, x[ 4], 11, 0x4bdecfa9); /* 38 */ c = HH (c, d, a, b, x[ 7], 16, 0xf6bb4b60); /* 39 */ b = HH (b, c, d, a, x[10], 23, 0xbebfbc70); /* 40 */ a = HH (a, b, c, d, x[13], 4, 0x289b7ec6); /* 41 */ d = HH (d, a, b, c, x[ 0], 11, 0xeaa127fa); /* 42 */ c = HH (c, d, a, b, x[ 3], 16, 0xd4ef3085); /* 43 */ b = HH (b, c, d, a, x[ 6], 23, 0x4881d05); /* 44 */ a = HH (a, b, c, d, x[ 9], 4, 0xd9d4d039); /* 45 */ d = HH (d, a, b, c, x[12], 11, 0xe6db99e5); /* 46 */ c = HH (c, d, a, b, x[15], 16, 0x1fa27cf8); /* 47 */ b = HH (b, c, d, a, x[ 2], 23, 0xc4ac5665); /* 48 */ /* Round 4 */ a = II (a, b, c, d, x[ 0], 6, 0xf ); /* 49 */ d = II (d, a, b, c, x[ 7], 10, 0x432aff97); /* 50 */ c = II (c, d, a, b, x[14], 15, 0xab9423a7); /* 51 */ b = II (b, c, d, a, x[ 5], 21, 0xfc93a039); /* 52 */ a = II (a, b, c, d, x[12], 6, 0x655b59c3); /* 53 */ d = II (d, a, b, c, x[ 3], 10, 0x8f0ccc92); /* 54 */ c = II (c, d, a, b, x[10], 15, 0xffeff47d); /* 55 */ b = II (b, c, d, a, x[ 1], 21, 0x85845dd1); /* 56 */ a = II (a, b, c, d, x[ 8], 6, 0x6fa87e4f); /* 57 */ d = II (d, a, b, c, x[15], 10, 0xfe2ce6e0); /* 58 */ c = II (c, d, a, b, x[ 6], 15, 0xa ); /* 59 */ b = II (b, c, d, a, x[13], 21, 0x4e0811a1); /* 60 */ a = II (a, b, c, d, x[ 4], 6, 0xf7537e82); /* 61 */ d = II (d, a, b, c, x[11], 10, 0xbd3af235); /* 62 */ c = II (c, d, a, b, x[ 2], 15, 0x2ad7d2bb); /* 63 */ b = II (b, c, d, a, x[ 9], 21, 0xeb86d391); /* 64 */ state.state[0] += a; state.state[1] += b; state.state[2] += c;
20 20 state.state[3] += d; public void Update (MD5State stat, byte buffer[], int offset, int length) int index, partlen, i, start; /* System.out.print('Offset = ' + offset + 'tlength = ' + length + 't'); System.out.print('Buffer = '); for (i = 0; i < buffer.length; i++) System.out.print((int) (buffer[i] & 0xff) + ' '); System.out.print('n');*/ finals = null; if ((length - offset)> buffer.length) length = buffer.length - offset; index = (int) (stat.count[0] >>> 3) & 0x3f; if ((stat.count[0] += (length << 3)) < (length << 3)) stat.count[1]++; stat.count[1] += length >>> 29; partlen = 64 - index; if (length >= partlen) for (i = 0; i < partlen; i++) stat.buffer[i + index] = buffer[i + offset]; Transform(stat, stat.buffer, 0); for (i = partlen; (i + 63) < length; i+= 64) Transform(stat, buffer, i); index = 0; else i = 0; if (i < length) start = i;
21 21 for (; i < length; i++) stat.buffer[index + i - start] = buffer[i + offset]; public void Update (byte buffer[], int offset, int length) Update(this.state, buffer, offset, length); public void Update (byte buffer[], int length) Update(this.state, buffer, 0, length); public void Update (byte buffer[]) Update(buffer, 0, buffer.length); public void Update (byte b) byte buffer[] = new byte[1]; buffer[0] = b; Update(buffer, 1); public void Update (String s) byte chars[]; chars = new byte[s.length()]; chars=s.getbytes(); Update(chars, chars.length); public void Update (int i) Update((byte) (i & 0xff));
22 22 private byte[] Encode (int input[], int len) int i, j; byte out[]; out = new byte[len]; for (i = j = 0; j < len; i++, j += 4) out[j] = (byte) (input[i] & 0xff); out[j + 1] = (byte) ((input[i] >>> 8) & 0xff); out[j + 2] = (byte) ((input[i] >>> 16) & 0xff); out[j + 3] = (byte) ((input[i] >>> 24) & 0xff); return out; public synchronized byte[] Final () byte bits[]; int index, padlen; MD5State fin; if (finals null) fin = new MD5State(state); bits = Encode(fin.count, 8); index = (int) ((fin.count[0] >>> 3) & 0x3f); padlen = (index < 56)? (56 - index) : (120 - index); Update(fin, padding, 0, padlen); Update(fin, bits, 0, 8); finals = fin; return Encode(finals.state, 16); public static String ashex (byte hash[])
23 23 StringBuffer buf = new StringBuffer(hash.length * 2); int i; for (i = 0; i < hash.length; i++) if (((int) hash[i] & 0xff) < 0x10) buf.append('0'); buf.append(long.tostring((int) hash[i] & 0xff, 16)); return buf.tostring(); public String ashex () return ashex(this.final()); 3. Source Code LOGIN.PHP <?php session_start(); include('initdb.php'); include('lib.php'); if (isset($_post['login'])) $username = addslashes($_post['username']); $pin = $_POST['pin']; $sql = 'SELECT initsecret FROM users WHERE username='$username'; $res = mysql_query($sql); if ($arr_row = mysql_fetch_array($res)) $initsecret = $arr_row['initsecret']; $success = checkro($pin, $initsecret); if ($success)
24 24 $_SESSION['username'] = $username; $_SESSION['initsecret'] = $initsecret; header('location: transfer.php'); else $err = 'PIN anda salah, silahkan masukkan kembali data anda.'; else $err = 'Data tidak ditemukan.';?> <html> <body> <H1>Login Internet Banking MyBank</H1> <?php if (isset($err)) echo '<font color=red><b>$err</b></font>';?> <form method='post' action='> <table border=1> <tr> <td>username</td> <td><input type='text' name='username' /></td> </tr> <tr> <td>token PIN:</td> <td><input type='text' name='pin' /></td> </tr> <tr> <td colspan=2 align=center><input type='submit' name='login' value='login' /></td> </tr> </table>
25 25 </form> </body> </html> 4. Source Code TRANSFER.PHP <?php session_start(); include('initdb.php'); include('lib.php'); if (!isset($_session['initsecret'])) header('location: login.php'); if (isset($_post['login'])) $pin = addslashes($_post['pin']); $initsecret = $_SESSION['initsecret']; $challenge = $_SESSION['challenge']; $success = checkcr($challenge,$pin,$initsecret); if ($success) header('location: berhasil.php'); else $msg = '<font color=red>pin anda salah, silahkan masukkan data anda kembali</font>'; srand(time()); $challenge = sprintf('%04d',(rand()%9999)); $_SESSION['challenge'] = $challenge;?> <html> <body> <?php if (isset($msg)) echo '<B>$msg</b>';?>
26 26 <h1>transfer Form</h1> <form method='post' action='> No Rekening Tujuan: <input type='text' name='norek' /><br/> Jumlah: Rp. <input type='text' name='jumlah' /><br/> Challenge Code: <?= $challenge?><i>(masukkan kode ini ke dalam token anda)</i><br/> Token PIN : <input type='text' name='pin' /><i>(masukkan response dari token anda)</i><br/> <input type='submit' name='login' value='transfer' /><br/> </form> </body> </html> 5. Source Code BERHASIL.PHP <html> <head> <title>konfirmasi berhasil</title> </head> <body> <p><strong>transfer BERHASIL</strong></p> <p><a href='transfer.php'>silahkan klik di sini untuk melakukan transfer kembali</a></p> </body> </html> 6. Source Code DAFTAR_NASABAH.PHP <!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' ' <html xmlns='
27 27 <head> <meta http-equiv='content-type' /> <title>daftar nasabah</title> </head> <body> <? include'initdb.php'; $sql='select ID, username, initsecret FROM users'; $kueri = mysql_query($sql); while ($row = mysql_fetch_array($kueri)) echo 'ID : '. $row['id']. '<br />'; echo 'username : '. $row['username']. '<br />'; echo 'initsecret : '. $row['initsecret']. '<br />'; echo '<hr>'; /* if(!$query=mysql_query($sql)) echo 'ID :$row[id]<br>'; echo 'username :$row[username]<br>'; echo 'initsecret :$row[initsecret]<br>'; echo '<hr>'; */?> </body> </html> 7. Source Code DATA_NASABAH.PHP <html><head><title>data NASABAH</title></head> <body> <b>data NASABAH</b> <form method='post' action='input.php'>
28 28 <pre> <!--ID : <input type='text' name='id' size='30'>//--> username : <input type='text' name='username' size='30'> initsecret : <input type='text' name='initsecret' size='30'> <input type='submit' name='submit' value='submit'><input type='reset' name='reset' value='reset'> </pre> </form> </body> </html> 8. Source Code INITDB.PHP <?php mysql_connect('localhost','root','); mysql_select_db('mybank');?> 9. Source Code INPUT.PHP <!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' ' <html xmlns=' <head> <meta http-equiv='content-type' /> <title>konfirmasi</title> </head> <body> <? include 'initdb.php'; if (isset($_post['submit'])) //$ID = $_POST['id'];
29 29 $username = $_POST['username']; $initsecret = $_POST['initsecret']; $sql='insert into users (username,initsecret) values('$username','$initsecret')'; if(!$query=mysql_query($sql)) echo mysql_error(); else echo 'data nasabah sudah disimpan<br>'; echo '<a href=daftar_nasabah.php>lihat data nasabah</a>';?> </body> </html> 10. Source Code LIB.PHP <?php // Check Challenge/Response Mode function checkcr($chal,$otp,$initsecret) $maxperiod = 3*60; // in seconds = +/- 3 minutes $time=gmdate('u'); for($i = $time - $maxperiod; $i <= $time + $maxperiod; $i++) $md5 = substr(md5(substr($i,0,-1).$initsecret.$chal),0,6); if($otp $md5) return(true); return(false); // Check Response/Only Mode
30 30 function checkro($otp,$initsecret) $maxperiod = 3*60; // in seconds = +/- 3 minutes $time=gmdate('u'); for($i = $time - $maxperiod; $i <= $time + $maxperiod; $i++) $md5 = substr(md5(substr($i,0,-1).$initsecret),0,6); if($otp $md5) return(true); return(false);?> 11. Table users.sql -- Table structure for table `users` -- CREATE TABLE IF NOT EXISTS `users` ( `ID` int(11) NOT NULL AUTO_INCREMENT, `username` varchar(225) COLLATE latin1_bin NOT NULL, `initsecret` varchar(225) COLLATE latin1_bin NOT NULL, PRIMARY KEY (`ID`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_bin AUTO_INCREMENT=9 ; Dumping data for table `users` -- INSERT INTO `users` (`ID`, `username`, `initsecret`) VALUES
Network Working Group. and RSA Data Security, Inc. April 1992
Network Working Group Request for Comments: 1321 R. Rivest MIT Laboratory for Computer Science and RSA Data Security, Inc. April 1992 The MD5 Message-Digest Algorithm Status of this Memo This memo provides
More informationMembuat Aplikasi Berita Sederhana
Pemrograman Web Membuat Aplikasi Berita Sederhana Merancang Struktur Database Membuat File Koneksi Database Membuat Halaman Input Berita Menampilkan Berita Terbaru di Halaman Depan Menampilkan Berita Lengkap
More informationRichard Victor Ginting 1, Muhammad Kurniawan 2 1,2
GENETIC ALGORITHM IMPLEMENTATION ON A W E B - B A S E D COURSE SCHEDULING SOFTWARE FOR SCHEDULING DIVISION OF ACADEMIC ADMINISTRATION BUREAU IN STMIK & POLTEK LPKIA BANDUNG Richard Victor Ginting 1, Muhammad
More information<head> <meta http-equiv='content-type' /> <title>my First PHP Lab</title> </head>
Lab1.html my First PHP Lab Please enter your Username and Email Name:
More informationCUSTOMER RELATIONSHIP MANAGEMENT INFORMATION SYSTEM ST BORROMEUS HOSPITAL
CUSTOMER RELATIONSHIP MANAGEMENT INFORMATION SYSTEM ST BORROMEUS HOSPITAL Jimmy Bunardi 1, Linda Salma Angreani, MT 2 1 Jurusan Teknik Informatika Fakultas Teknik Dan Ilmu Komputer Universitas Komputer
More informationDevelopment Of Car Rental Management Information System (Case Study: Avis Indonesia)
Development Of Car Rental Management Information System (Case Study: Avis Indonesia) Bayu Waspodo, Qurrotul Aini and Syamsuri Nur Information System, Faculty of Science and Technology Syarif Hidayatullah
More informationHTML Fails: What No One Tells You About Email HTML
HTML Fails: What No One Tells You About Email HTML 2 Today s Webinar Presenter Kate McDonough Campaign Manager at PostUp Worked with various ESPs: Constant Contact, Campaign Monitor, ExactTarget, Distribion
More informationHello friends, This is Aaditya Purani and i will show you how to Bypass PHP LFI(Local File Inclusion)
#Title: PHP LFI Bypass #Date : 12-July-2015 #Tested on: Kali Linux/ Windows 7 #Category : Papers #Exploit Author : Aaditya Purani Hello friends, This is Aaditya Purani and i will show you how to Bypass
More informationCreate dynamic sites with PHP & MySQL
Create dynamic sites with PHP & MySQL Presented by developerworks, your source for great tutorials Table of Contents If you're viewing this document online, you can click any of the topics below to link
More informationIntroduction to Mobile Phone. Programming in Java Me
Introduction to Mobile Phone Programming in Java Me (prepared for CS/ECE 707, UW-Madison) Author: Leszek Wiland and Suman Banerjee 1 Content 1. Introduction 2. Setting up programming environment 3. Hello
More informationWeb Application Security Part 1
Web Application Security Part 1 Author : Treasure Priyamal Site : www.treasuresec.com E-mail : treasure@treasuresec.com Twitter :http://twitter.com/treasure_sec Introduction Today we are going to talk
More informationCTNET Field Protocol Specification November 19, 1997 DRAFT
CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol
More informationOnline Medical Record on the Obstetrics-Gynecology Sub Section
Online Medical Record on the Obstetrics-Gynecology Sub Section Anung Prastyo Pribadi Eko Handoyo R.Rizal Isnanto Abstract Nowadays many health institutions need a computer-based patients medical record
More informationAAI-enabling Web Applications (personalized, dynamic content in PHP, ASP, Perl, Java,..) Valéry Tschopp <tschopp@switch.ch>
AAI-enabling Web Applications (personalized, dynamic content in PHP, ASP, Perl, Java,..) Valéry Tschopp 2005 SWITCH AAI Attribute Transmission Attributes Store SAML Attributes Home
More informationTCG Algorithm Registry. Family 2.0' Level 00 Revision 01.15. April 17, 2014. Published. Contact: admin@trustedcomputinggroup.org.
Family 2.0' Level 00 Revision 01.15 April 17, 2014 Published Contact: admin@trustedcomputinggroup.org TCG TCG Published Copyright TCG 2014 Disclaimers, Notices, and License Terms THIS SPECIFICATION IS
More informationWeb Development Guide. Information Systems
Web Development Guide Information Systems Gabriel Malveaux May 2013 Web Development Guide Getting Started In order to get started with your web development, you will need some basic software. In this guide
More informationTHE DEVELOPMENT OF ANDROID MOBILE GAME AS SENIOR HIGH SCHOOL LEARNING MEDIA ON RATE REACTION AND CHEMICAL EQUILIBRIUM
Proceeding of International Conference On Research, Implementation And Education Of Mathematics And Sciences 2014, Yogyakarta State University, 18-20 May 2014 THE DEVELOPMENT OF ANDROID MOBILE GAME AS
More informationOptimizing computation of Hash-Algorithms as an attacker. Version 1.0-2013.05.12
Optimizing computation of Hash-Algorithms as an attacker Version 1.0-2013.05.12 Name: Nick: Jens Steube atom About me Coding Projects: hashcat / oclhashcat Work Status: Employed as Coder, not crypto- or
More informationANALYSIS AND EVALUATION SNORT, BRO, AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER
ANALYSIS AND EVALUATION SNORT, BRO, AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER Paper Department of Informatics Faculty of Communications and Informatics By: M. Faqih Ridho Fatah Yasin,
More informationTool Enhancement For Collaborative Software Engineering Education
Tool Enhancement For Collaborative Software Engineering Education Danang Wahyu Utomo 1, Egia Rosi Subhiyakto 2, Sabrina Ahmad 3 1,2 Program Studi Teknik Informatika, Fakultas Ilmu Komputer, Universitas
More informationDevelopment of Stock Portfolio. Optimization Application Program Using. Fuzzy Linear Programming
Applied Mathematical Sciences, Vol. 8, 2014, no. 86, 4249-4259 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.45330 Development of Stock Portfolio Optimization Application Program Using
More informationSoft-Starter SSW-06 V1.6X
Motors Energy Automation Coatings Soft-Starter SSW-06 V1.6X Serial Communication Manual Language: English Document: 0899.5731 / 04 Serial Communication Manual Series: SSW-06 V1.6X Language: English Document
More informationprivate byte[] encryptcommand = {(byte)0xa0, (byte)0xc1, (byte)0x00, (byte)0x00, (byte) 0x00};
/* *Utilisation des Java Card (U)SIM pour la sécurisation des communications et des données dans les applications sur téléphones mobiles Cette midlet est chargée de proposer une interface à l'utilisateur
More informationAPI. Application Programmers Interface document. For more information, please contact: Version 2.01 Aug 2015
API Application Programmers Interface document Version 2.01 Aug 2015 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 Table of Contents Overview..
More informationAccessing External Databases from Mobile Applications
CENTER FOR CONVERGENCE AND EMERGING NETWORK TECHNOLOGIES CCENT Syracuse University TECHNICAL REPORT: T.R. 2014-003 Accessing External Databases from Mobile Applications Version 2.0 Authored by: Anirudh
More informationHELPDESK SYSTEM DESIGN AND DEVELOPMENT IN A UNIVERSITY BASED ON ITIL V3 FRAMEWORK (CASE STUDY: AL AZHAR INDONESIA UNIVERSITY)
HELPDESK SYSTEM DESIGN AND DEVELOPMENT IN A UNIVERSITY BASED ON ITIL V3 FRAMEWORK (CASE STUDY: AL AZHAR INDONESIA UNIVERSITY) Endang Ripmiatin 1), Arum Fitriati Informatics Engineering Department, Faculty
More informationWeb Development for Business Revision Pack
Web Development for Business Revision Pack The exam is 3 hours. This is the second year that Web Development for Business has run and after feedback from students last year the paper structure has been
More informationChapter 1 Introduction to web development and PHP
Chapter 1 Introduction to web development and PHP Murach's PHP and MySQL, C1 2010, Mike Murach & Associates, Inc. Slide 1 Objectives Applied 1. Use the XAMPP control panel to start or stop Apache or MySQL
More informationA SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks
A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks Abhay K. Kolhe Faculty, Dept. Of Computer Engineering MPSTME, NMIMS Mumbai, India Pratik Adhikari
More informationDAFTAR PUSTAKA. Arifin Ali, 2002, Membaca Saham, Edisi I, Yogyakarta : Andi. Bapepam, 2004, Ringkasan Data Perusahaan, Jakarta : Bapepam
03 DAFTAR PUSTAKA Arifin Ali, 00, Membaca Saham, Edisi I, Yogyakarta : Andi Bapepam, 004, Ringkasan Data Perusahaan, Jakarta : Bapepam Darmadji Tjiptono dan Fakhruddin M Hendy, 006, Pasar Modal di Indonesia,
More informationDESIGN AND IMPLEMENTATION OF LABORATORY CONTENT MANAGEMENT SYSTEM (CMS) ilab USING CakePHP FRAMEWORK
DESIGN AND IMPLEMENTATION OF LABORATORY CONTENT MANAGEMENT SYSTEM (CMS) ilab USING CakePHP FRAMEWORK Sunu Wibirama 1, Ir.Lukito Edi Nugroho, M.Sc., Ph.D. 2, Indriana Hidayah, S.T. 3 ABSTRACT The making
More informationOpen Design Specification for.dwg files. Version 5.3
Open Design Specification for.dwg files Version 5.3 Open Design Alliance www.opendesign.com Copyright 1998-2013 Open Design Alliance, Inc. All rights reserved. Information in these materials is furnished
More informationAUTOMATIC INVENTORY CONTROL SYSTEM
AUTOMATIC INVENTORY CONTROL SYSTEM Mohammad Mohsin Rumi 07141003 [Old ID: 02201070] Department of Computer Science and Engineering May 2007 BRAC University, Dhaka, Bangladesh 1 Supervisor - Sayeed Salam,
More informationTHE INFLUENCES OF PRODUCTIVE ZAKAH MENTORING TO THE SAVING BEHAVIOR AND THE PROSPERITY OF POOR HOUSEWIFE
Rizky Andriati & Nurul Huda: The Influences of Productive Zakah 207 THE INFLUENCES OF PRODUCTIVE ZAKAH MENTORING TO THE SAVING BEHAVIOR AND THE PROSPERITY OF POOR HOUSEWIFE Rizky Andriati & Nurul Huda
More informationTHE CHALLENGES FACED BY UNIVERSITY LIBRARIES IN THE SCIENTIFIC INFORMATION DEVELOPMENT
THE CHALLENGES FACED BY UNIVERSITY LIBRARIES IN THE SCIENTIFIC INFORMATION DEVELOPMENT Jonner Hasugian Staf Pengajar Fakultas Sastra Universitas Sumatera Utara Abstrak Dalam masyarakat ilmiah dibangun
More informationMobile application development J2ME U N I T I I
Mobile application development J2ME U N I T I I Overview J2Me Layered Architecture Small Computing Device requirements Run Time Environment Java Application Descriptor File Java Archive File MIDlet Programming
More informationFault attack on the DVB Common Scrambling Algorithm
Fault attack on the DVB Common Scrambling Algorithm Kai Wirt Technical University Darmstadt Department of Computer Science Darmstadt, Germany wirt@informatik.tu-darmstadt.de Abstract. The Common Scrambling
More informationMandiri e-cash Online
Mandiri e-cash Online ecommerce Payment Gateway Implementation Guide Version: 1.8 1 Index of Contents General Overview.. 3 MANDIRI E-CASH ECOMMERCE GATEWAY IMPLEMENTATION.. 5 Prerequisites.. 5 Implementation..
More informationDigital Library Information System Development at Malikussaleh University with SDLC (System Development Life Cycle)
Digital Library Information System Development at Malikussaleh University with SDLC (System Development Life Cycle) Dahlan Abdullah Department of Computer Science, University of Sumatera Utara, Medan,
More informationMobile Software Application Development. Tutorial. Caesar Ogole. April 2006
Mobile Software Application Development Tutorial By Caesar Ogole April 2006 About the Tutorial: In this tutorial, you will learn how to build a cross-platform mobile software application that runs on the
More informationDatabase Security Model in the Academic Information System
, pp. 163-174 http://dx.doi.org/10.14257/ijsia.2014.8.3.18 Database Security Model in the Academic Information System Ema Utami 1 and Suwanto Raharjo 2 1 Departement of Magister of Informatics Engineering
More informationAn Approach towards Security in Private Cloud Using OTP
An Approach towards Security in Private Cloud Using OTP Vishal Paranjape 1, Vimmi Pandey 2 1 PG Student, MTECH (CSE), Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India 2 Head of Department
More informationgomobi Traffic Switching Guide Version 0.9, 28 September 2010
gomobi Traffic Switching Guide Version 0.9, 28 September 2010 Mobile/Desktop Traffic Switching.. 3 Summary of Options.. 3 Single Site Solutions.. 4 Server-side Switching Code.. 4 JavaScript Switching
More informationPHP and XML. Brian J. Stafford, Mark McIntyre and Fraser Gallop
What is PHP? PHP and XML Brian J. Stafford, Mark McIntyre and Fraser Gallop PHP is a server-side tool for creating dynamic web pages. PHP pages consist of both HTML and program logic. One of the advantages
More informationCOMPARATIVE STUDY OF ERP IMPLEMENTATION METHODOLOGY CASE STUDY: ACCELERATED SAP VS DANTES & HASIBUAN METHODOLOGY
COMPARATIVE STUDY OF ERP IMPLEMENTATION METHODOLOGY CASE STUDY: ACCELERATED SAP VS DANTES & HASIBUAN METHODOLOGY M. Hilman, F. Setiadi, I. Sarika, J. Budiasto, and R. Alfian Faculty of Computer Science,
More informationShoreTel Enterprise Contact Center 8 Installing and Implementing Chat
ShoreTel Enterprise Contact Center 8 Installing and Implementing Chat November 2012 Legal Notices Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All
More informationMIDlet development with J2ME and MIDP
MIDlet development with J2ME and MIDP ibm.com/developerworks Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Introduction..
More informationPage 1 of 1. Page 2 of 2 % &! ' '! ( ' ( $) * +, - % -. !' # $
Argosoft Pos Server Panduan Page 1 of 1 Isi Mulai.. 3 Menguasai.. 5 Pilihan.. 7 Menentukan catatan.. 10 Menentukan Linkungan.. 11 Linkungan betul.. 12 Menentukan linkungan berganda.. 13 Menambahkan
More informationBAIK (BAHASA ANAK INDONESIA UNTUK KOMPUTER) PROGRAMMING LANGUAGE BASED ON INDONESIAN LEXICAL PARSING FOR MULTITIER WEB DEVELOPMENT
BAIK (BAHASA ANAK INDONESIA UNTUK KOMPUTER) PROGRAMMING LANGUAGE BASED ON INDONESIAN LEXICAL PARSING FOR MULTITIER WEB DEVELOPMENT Haris Hasanudin, Member, IEEE Email: hariscom@ieee.org Abstract Business
More informationForm Handling. Server-side Web Development and Programming. Form Handling. Server Page Model. Form data appended to request string
Form Handling Server-side Web Development and Programming Lecture 3: Introduction to Java Server Pages Form data appended to request string
More informationIRF2000 IWL3000 SRC1000 Application Note - Apps with OSGi - Condition Monitoring with WWH push
Version 2.0 Original-Application Note ads-tec GmbH IRF2000 IWL3000 SRC1000 Application Note - Apps with OSGi - Condition Monitoring with WWH push Stand: 28.10.2014 ads-tec GmbH 2014 IRF2000 IWL3000 SRC1000
More informationWeb Application Security. Srikumar Venugopal S2, Week 8, 2013
Web Application Security Srikumar Venugopal S2, Week 8, 2013 Before we start Acknowledgements This presentation contains material prepared by Halvard Skogsrud, Senior Software Engineer, Thoughtworks, Inc.
More informationWEB-BASED PROPERTY MANAGEMENT SYSTEM SAFURA ADEELA BINTI SUKIMAN
i WEB-BASED PROPERTY MANAGEMENT SYSTEM SAFURA ADEELA BINTI SUKIMAN A thesis submitted in fulfillment of the requirements for the award of the degree of Masters of Science (IT Management) Faculty of Computer
More informationANALISYS AND DEVELOPMENT OF MEASUREMENT THE EFFECTIVENESS OF CUSTOMER RELATIONSHIP MANAGEMENT SOFTWARE
Proceeding. International Seminar on Industrial Engineerig and Management Menara Peninsula, Jakarta, August 29-30, 2007 ISSN: 1978-774X ANALISYS AND DEVELOPMENT OF MEASUREMENT THE EFFECTIVENESS OF CUSTOMER
More informationWIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide
WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide Rev 0.2 This document describes how to make your own Configuration Tool for WIZ100SR, WIZ105SR and WIZ110SR of WIZnet. And
More informationNon-Obvious Bugs by Example
Gregor Kopf CONFidence 2011 What and why? Non-obvious (crypto) bugs As an example: two well-known CMS Easy to make, hard to spot Interesting to exploit Fun ;) How? The process from discovery to exploitation
More informationUSING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)
USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To
More informationII. LITERATURE REVIEW
Design System Fuel Inventory Control In Gas Stations With The Concept Of Min-Max Stock Level And Time Phased Order Point Case Study Gas Stations 44.501.01 Muhamad Danuri Departement of Informatics Management,
More informationAN OBJECT ORIENTED APPROACH FOR CREATING WEB SERVICE PRESENCE SYSTEM. Fandy Setyo Utomo, b Yuli Purwati a
Vol. 7, No. 2, July 2013 ISSN 0216 0544 AN OBJECT ORIENTED APPROACH FOR CREATING WEB SERVICE PRESENCE SYSTEM a Fandy Setyo Utomo, b Yuli Purwati a Information System Department, b Informatics Engineering
More informationMobile Application Development. MIDP & GUI Programmierung
J2ME MIDlets Mobile Application Development MIDP & GUI Programmierung Christoph Denzler Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme Lernziele Sie wissen wie ein MIDlet kontrolliert
More informationDESIGN OF DECISION SUPPORT SYSTEM FOR INTERNET BANKING TECHNOLOGY SERVICE DEVELOPMENT : CASE STUDY IN PT BANK RAKYAT INDONESIA (BRI PERSERO) TBK
DESIGN OF DECISION SUPPORT SYSTEM FOR INTERNET BANKING TECHNOLOGY SERVICE DEVELOPMENT : CASE STUDY IN PT BANK RAKYAT INDONESIA (BRI PERSERO) TBK Ilham Arief Gautama Graduate Program Management and Business,
More informationJoomla 1.0 Extension Development Training. Learning to program for Joomla
Joomla 1.0 Extension Development Training Learning to program for Joomla Objectives & Requirements Learn to develop basic Joomla Mambots, Modules and Components. Familiar with PHP and MySQL programming.
More informationWe hope to reveal unique insight into the way the Onity HT system works and detail various vulnerabilities therein.
Introduction In this paper we will discuss the design and inner workings of the Onity HT lock system for hotels. Approximately ten million Onity HT locks are installed in hotels worldwide. This accounts
More informationSOCIAL NETWORKING IN SMARTPHONE THROUGH A PROTOTYPE IMPLEMENTATION USING ANDROID
Volume 5, No. 3, March 2014 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info SOCIAL NETWORKING IN SMARTPHONE THROUGH A PROTOTYPE IMPLEMENTATION USING ANDROID
More informationUlteo Open Virtual Desktop - Protocol Description
Ulteo Open Virtual Desktop - Protocol Description Copyright 2008 Ulteo SAS 1 LIST OF PROTOCOLS USED CONTENTS Contents 1 List of Protocols used 1 1.1 Hyper Text Transfert Protocol (HTTP)...............
More informationEXPLORATiON in THE CROSS TERRiTORY the inevitable continuation of my first paper: Cross Site Scripting - Attack and Defense guide
EXPLORATiON in THE CROSS TERRiTORY the inevitable continuation of my first paper: Cross Site Scripting - Attack and Defense guide By Xylitol Summary: The Cross Frame Scripting Theoretical explanation
More informationBuilding a Simple Data Center Network Infrastructure for Campus
ISSN 2356-4393 Building a Simple Data Center Network Infrastructure for Campus Tedi Lesmana Marselino 1), Kiki Bayhaki 2) Informatika, Institut Teknologi dan Bisnis Kalbis Jalan Pulomas Selatan Kav.22
More informationJava Server Pages combined with servlets in action. Generals. Java Servlets
Java Server Pages combined with servlets in action We want to create a small web application (library), that illustrates the usage of JavaServer Pages combined with Java Servlets. We use the JavaServer
More informationOther Language Types CMSC 330: Organization of Programming Languages
Other Language Types CMSC 330: Organization of Programming Languages Markup and Query Languages Markup languages Set of annotations to text Query languages Make queries to databases & information systems
More informationServer-side: PHP and MySQL (continued)
An observation related to last assignment Server-side: PHP and MySQL (continued)! ' I found as result code for last assignment: echo 'Transporting Data to a Database..';
More informationSmart Card Based User Authentication
Smart Card Based User Authentication A thesis submitted in partial fulfilment of the requirements for the degree of Master of Science By BRANDON JAMES B.S., Wright State University, June 2010 2012 Wright
More informationGoogle Web Toolkit. Progetto di Applicazioni Software a.a. 2011/12. Massimo Mecella
Google Web Toolkit Progetto di Applicazioni Software a.a. 2011/12 Massimo Mecella Introduction Ajax (Asynchronous JavaScript and XML) refers to a broad range of techniques Beyond the technical jargon,
More informationWeb Development in Java Live Demonstrations (Live demonstrations done using Eclipse for Java EE 4.3 and WildFly 8)
Web Development in Java Live Demonstrations (Live demonstrations done using Eclipse for Java EE 4.3 and WildFly 8) Java Servlets: 1. Switch to the Java EE Perspective (if not there already); 2. File >
More informationWA 2. GWT Martin Klíma
WA 2 GWT Martin Klíma GWT What is it? Google Web Toolkig Compiler from Java to JavaScript + HTML Set of JavaScript and Java scripts / classes Development environment SDK Integration with IDE Eclipse, Netbeans,
More informationIJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 1, September 2012 ISSN (Online): 1694-0814 www.ijcsi.
www.ijcsi.org 136 Education Policy Development With Development Strategy Application Of National Test Exercises For Vocational High School Case Study Vocational High School Bina Taruna Masaran Sragen Maryono
More informationThe Development of Mobile Client Application in Yogyakarta Tourism and Culinary Information System Based on Social Media Integration
The Development of Mobile Client Application in Yogyakarta Tourism and Culinary Information System Based on Social Media Integration Novrian Fajar Hidayat Department of Electrical Engineering and Information
More informationDEPARTMENT OF INFORMATION TECHNOLOGY
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY TRICHY -621105 DEPARTMENT OF INFORMATION TECHNOLOGY ANNA UNIVERSITY PRACTICAL EXAMINATIONS, OCT 2011 RECORD NOTE BOOK CS1403 - SOFTWARE DEVELOPMENT LABORATORY
More informationtelnetd exploit FreeBSD Telnetd Remote Exploit Für Compass Security AG Öffentliche Version 1.0 Januar 2012
telnetd exploit FreeBSD Telnetd Remote Exploit Für Compass Security AG Öffentliche Version 1.0 Januar 2012 Content Part I Info Bug Telnet Exploit Part II Advanced Exploitation Meta Information Disclosed
More informationPaillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
More informationA table is a collection of related data entries and it consists of columns and rows.
CST 250 MySQL Notes (Source: www.w3schools.com) MySQL is the most popular open-source database system. What is MySQL? MySQL is a database. The data in MySQL is stored in database objects called tables.
More informationConsult protocol, Nissan Technical egroup, Issue 6
Consult protocol, Nissan Technical egroup, Issue 6 1. Electrical and Signaling protocol 1.1. Consult terminal or PC communications is via three wire bus. TX, RX and Async Clock. 1.2. TX data to ECU level
More informationLIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY UNIVERSITI TEKNOLOGI MALAYSIA
LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY UNIVERSITI TEKNOLOGI MALAYSIA LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY A project report submitted
More informationData Sheet Januari 2015. Hubungi Kami. 0804 1 808 888 info@qwords.com
Januari 2015 Product Overview ` Web Hosting Web Hosting Web Hosting merupakan layanan penyimpanan data untuk website anda di Internet, layanan ini amat diperlukan jika anda ingin memiliki website. Data
More informationNetwork Configuration Example
Network Configuration Example OSPF Version 3 for IPv6 Feature Guide Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationSoftware security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
More informationIF3291 Jaringan Komputer dan Pengamanannya. Bugi Wibowo (bugi@informatika.org) Mei 2006 Informatika STEI ITB
IF3291 Jaringan Komputer dan Pengamanannya Network Security Bugi Wibowo (bugi@informatika.org) Mei 2006 Informatika STEI ITB Introduction Early network use: Universities to send mails Corporate to share
More informationTHE DESIGN OF FOREIGN LANGUAGE TEACHING SOFTWARE IN SCHOOL COMPUTER LABORATORY
THE DESIGN OF FOREIGN LANGUAGE TEACHING SOFTWARE IN SCHOOL COMPUTER LABORATORY Yan Watequlis Syaifudin a, Imam Fahrur Rozi b, Atiqah Nurul Asri c State Polytechni c of Malang, East Java, Indonesia abc
More informationGT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
More informationEffects of ownership structure, capital structure, profitability and company s growth towards firm value
International Journal of Business and Management Invention ISSN (Online): 2319 8028, ISSN (Print): 2319 801X Volume 4 Issue 4 April. 2015 PP-25-31 Effects of ownership structure, capital structure, profitability
More informationData Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide
Data Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide Sensors LCD Real Time Clock/ Calendar DC Motors Buzzer LED dimming Relay control I2C-FLEXEL PS2 Keyboards Servo Motors IR Remote Control
More informationServer-side: PHP and MySQL (continued)
Server-side: PHP and MySQL (continued) some remarks check on variable: isset ( $variable )? more functionality in a single form more functionality in a single PHP-file updating the database data validation
More informationWeb Server Logs Analyze Using the XML Technologies
Web Server Logs Analyze Using the XML Technologies Author: Tayeb L. E-mail: Tayeb.Lemlouma@inrialpes.fr July 2002. We introduce here an approach to write and analyze server logs using the XML technology.
More informationpset 7: C$50 Finance Zamyla Chan zamyla@cs50.net
pset 7: C$50 Finance Zamyla Chan zamyla@cs50.net Toolbox permissions HTML PHP SQL permissions use chmod in the Terminal to change permissions of files and folders chmod a+x folder folder executable by
More informationDownload: Server-side technologies. WAMP (Windows), http://www.wampserver.com/en/ MAMP (Mac), http://www.mamp.info/en/
+ 1 Server-side technologies Apache, Download: Apache Web Server: http://httpd.apache.org/download.cgi application server: http://www.php.net/downloads.php DBMS: http://www.mysql.com/downloads/ LAMP:
More informationPanduan Program Power Led
Panduan Program Power Led 1.Pertama-tama install Software power led seperti menginstal software lainnya 2. Jika instal sudah selesai maka tampilan akan seperti ini. Jika kontroler Tipe Serial USB to Serial
More informationIntroduction to Web Development
Introduction to Web Development Week 2 - HTML, CSS and PHP Dr. Paul Talaga 487 Rhodes paul.talaga@uc.edu ACM Lecture Series University of Cincinnati, OH October 16, 2012 1 / 1 HTML Syntax For Example:
More informationSECURE E-MAIL APPLICATION SOFTWARE FOR GOVERNMENT IN INDONESIA
++ I&S SECURE E-MAIL APPLICATION SOFTWARE FOR GOVERNMENT IN INDONESIA Kridanto SURENDRO and Setiyo CAHYONO Abstract: Exchanging information using e-mail brings a good deal of vulnerability that can be
More informationCustomer Relationship Management (CRM)
Customer Relationship Management (CRM) VRMA National Conference San Francisco October 16-20 www.vdsys.com/ppt/crm2004.ppt - http://www.vdsys.com/vrma2004 Paul: paulh@vdsys.com Ed: ed.ulmer@barefoot.com
More informationPressman R.s. (2015). Rekayasa Perangkat Lunak Pendekatan Praktisi Buku I. Yogyakarta Andi
Ewars (Early Warning Alert and Response System) Sms (Short Message Service) - Based at Health Department of Purworejo Distric
Ewars (Early Warning Alert and Response System) Sms (Short Message Service) - Based at Health Department of Purworejo Distric Savitri Citra Budi 1, Nur Rokhman 2 1 Vocational College of Medical Records,
More information