{"id":2950,"date":"2012-04-12T11:59:25","date_gmt":"2012-04-12T04:59:25","guid":{"rendered":"https:\/\/staging.informatika.uin-malang.ac.id\/penggunaan-spoofing-dan-ssh-forwarding-untuk-keamanan-serta-filtrasi-data-pada-jaringan\/"},"modified":"2012-04-12T11:59:25","modified_gmt":"2012-04-12T04:59:25","slug":"penggunaan-spoofing-dan-ssh-forwarding-untuk-keamanan-serta-filtrasi-data-pada-jaringan","status":"publish","type":"post","link":"https:\/\/informatika.uin-malang.ac.id\/zh\/penggunaan-spoofing-dan-ssh-forwarding-untuk-keamanan-serta-filtrasi-data-pada-jaringan\/","title":{"rendered":"\u4f7f\u7528\u6b3a\u9a97\u548c SSH \u8f6c\u53d1\u6765\u4fdd\u62a4\u7f51\u7edc\u5b89\u5168\u548c\u8fc7\u6ee4\u6570\u636e"},"content":{"rendered":"<p style=\"text-align: center;\"><strong>\u9632\u5f39\u548cSSH\u8f6c\u53d1\u7684\u4f7f\u7528\u4ee5\u63d0\u9ad8\u5b89\u5168\u6027<br \/>\n\u7f51\u7edc\u6570\u636e\u8fc7\u6ee4<br \/>\n<\/strong><\/p>\n<p style=\"text-align: center;\">\u585e\u62c9\u9a6c\u7279\u00b7\u54c8\u91cc\u4e9a\u8fea<br \/>\n\u4fe1\u606f\u5de5\u7a0b\u7cfb \u79d1\u5b66\u4e0e\u6280\u672f\u5b66\u9662<br \/>\n\u9a6c\u6765\u897f\u4e9a\u4f0a\u65af\u5170\u5927\u5b66\u201c\u6bdb\u62c9\u7eb3\u00b7\u9a6c\u5229\u514b\u00b7\u6613\u535c\u62c9\u6b23\u201d\u9a6c\u7405<br \/>\n\u7535\u5b50\u90ae\u4ef6\uff1amet_hariadi@yahoo.co.id<\/p>\n<p style=\"text-align: justify;\"><em><strong>\u6458\u8981<\/strong> \u4e92\u8054\u7f51\u6280\u672f\u786e\u5b9e\u5f88\u4e86\u4e0d\u8d77\uff0c\u5bf9\u7528\u6237\u6709\u5f88\u591a\u597d\u5904\u3002\u7136\u800c\uff0c\u968f\u7740\u5b83\u7684\u53d1\u5c55\uff0c\u901a\u8fc7\u7f51\u7edc\u4f20\u8f93\u6570\u636e\u5f88\u5bb9\u6613\u88ab\u4ed6\u4eba\u7a83\u53d6\u3002\u6b3a\u9a97\uff08Spoofing\uff09\u662f\u67e5\u770b\u548c\u521b\u5efa\u7f51\u7edc\u540e\u95e8\u7684\u4e00\u79cd\u65b9\u5f0f\u3002SSH \u8f6c\u53d1\u5728\u5176\u4f7f\u7528\u4e2d\u65e8\u5728\u63d0\u9ad8\u6570\u636e\u4f20\u8f93\u7684\u6548\u7387\uff0c\u4f7f\u5176\u80fd\u591f\u51c6\u786e\u5730\u5230\u8fbe\u76ee\u6807\u670d\u52a1\u5668\u6216\u5ba2\u6237\u7aef\u3002\u6b3a\u9a97\u4e0e SSH \u8f6c\u53d1\u7684\u7ed3\u5408\u65e8\u5728\u4f7f\u4ece\u5ba2\u6237\u7aef\u8bf7\u6c42\u7684\u6570\u636e\u66f4\u52a0\u79c1\u5bc6\uff0c\u6216\u8005\u4fdd\u6301\u5b89\u5168\u7279\u6027\uff0c\u800c\u672c\u5730\u670d\u52a1\u5668\u4e0a\u7684\u6b3a\u9a97\u4f7f\u7528\u65e8\u5728\u5bf9\u4f20\u8fbe\u7ed9\u8bf7\u6c42\u5ba2\u6237\u7aef\u7684\u6570\u636e\u6216\u5730\u5740\u8fdb\u884c\u8fc7\u6ee4\u3002<\/em><\/p>\n<p style=\"text-align: justify;\"><em><strong>\u5173\u952e\u8bcd<\/strong>\u4e92\u8054\u7f51\u3001\u6b3a\u9a97\u3001SSH \u96a7\u9053\u3001\u6570\u636e\u5b89\u5168\u3001\u6570\u636e\u8fc7\u6ee4<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>PENGGUNAAN SPOOFING DAN SSH FORWARDING UNTUK KEAMANAN SERTA FILTRASI DATA PADA JARINGAN Selamet Hariadi Jurusan Teknik Informatika Fakultas Sains &amp; Teknologi Universitas Islam Negeri \u201cMaulana Malik Ibrahim\u201d Malang Email: met_hariadi@yahoo.co.id Abstrak &#8211; Teknologi Internet memang sungguh fenomenal &amp; memberikan efek yang baik bagi penggunanya. Namun seiring perkembangannya, transportasi data melalui jaringan memang rawan disadap orang [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2950","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/posts\/2950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/comments?post=2950"}],"version-history":[{"count":0,"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/posts\/2950\/revisions"}],"wp:attachment":[{"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/media?parent=2950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/categories?post=2950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/informatika.uin-malang.ac.id\/zh\/wp-json\/wp\/v2\/tags?post=2950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}