Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256
DOI:
https://doi.org/10.47065/jimat.v2i2.150Keywords:
File; File Duplicate; File Search; SHA-256 HashAbstract
Hard drives are one of the core components of a computer in various types and sizes. Large hard disks can become full, even though they don't feel like storing large files. The possibility of saving the same file in the directory is very difficult and will take a long time. The Duplicate Docx Scanner application is able to solve this problem. The Duplicate Docx Scanner application is able to find out the same file is located in a different directory by determining the directory on the hard disk and other storage media. This application can calculate the hash value so that it can find the same file. The Duplicate Docx Scanner application uses the SHA-256 hash method. SHA-256 is used to perform file integrity checks in a variety of situations. This Duplicate Docx Scanner application is designed to use the Microsoft Visual Basic.Net 2008 programming language
Downloads
References
H. Sembiring, S. Utara, F. Y. Manik, S. Utara, and S. Utara, “Penerapan Algoritma Secure Hash Algorithm ( SHA ) Keamanan Pada Citra,” vol. 4, no. 1, pp. 33–36, 2019.
Al-Bahra Bin Ladjamudin, Analisis dan desain sistem informasi. Yogyakarta, 2005.
jogiyanto, Analisis & Desain Sistem Informasi. Yogyakarta, 2013.
H. M. jogiyanto, Analisis dan Rancangan Sistem Informasi. Yogyakarta, 2010.
M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya menggunakan MATLAB. Yogyakarta: ANDI, 2015.
Rifki Sadikin, Kriptografi untuk keamanan jaringan dan implementasi dalam Bahasa Java. Yogyakarta: ANDI, 2012.
Dony Ariyus, PENGANTAR ILMU KRIPTOGRAFI Teori Analisis & Implementasi. Yogyakarta, 2008.
Dimaz A Wijaya, MENGENAL BITCOIN & CRYPTOCURRENCY. Medan, 2016.
https://ejurnal.stmik-budidarma.ac.id/index.php/ijics/article/view/1404/1186
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Adelina

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).