Abstract

Duplicatet asks owned by admin Internetin STMIK PPKIA Pradnya Paramita resulted admin Internet can not linger on the configuration computer to an Internet server so often negative sites can be accessed freely . To anticipate the necessary control to access the Internet by installing Squid proxy server. To further enhance the ability of the proxy server, can be done by analyzing the log proxy server, because the record contains a record of the user's Internet access. Needed a method to read and analyze the log file because the file is recorded in the text squensial. The method used is a deterministic Turing machine is a finite state machine that has a two - way tape. Analysis of the log file will produce rules that can be read and understood by the Squid proxy server. The rules are access control list (ACL) that is then returned by the proxy server configured. Based on the results of the configurations quid ability will always be up to date and can ease the work load of the Internet admin . K eywords: Pengontrolan, P r oxy Server, otomata, dan l og proxyserver. .

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call