viernes, 21 de abril de 2017

HTML WEB

Hi everyone, hope you are enjoying your holidays! This time we had to create a web using what we´ve learnt about html during this month. I decided to show you one of my favourite bands since I was little, so now I will post an image about the structure of the web and another one about the final look. This is the structure:
And this how the web looks:

viernes, 7 de abril de 2017

HTML TABLE

Hi again! Here we've made a table using html system and we've written our name, surname and ages inside the brackets. here you can see how it looks: The structure of the table is the following one:

viernes, 31 de marzo de 2017

HTML

Here there is our web. We´ve made it using html with this process: Carmen and Patricia

THIS WEB BELONGS TO A 4TH ESO STUDENT

Our hobbies are studyng ICT, English, watching american series and going to the library to read english books.

patri

viernes, 10 de marzo de 2017

WIFI SECURITY

-Protocols/version of the WIFI: it's always 802.11 followed by a letter. Ther first one was b, then g, then n and finally, which is the current one; ac. these letters indicate the WIFI's speed.
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.

The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.

To connect to the Internet through Wifi you need:
-  Wireless NIC
-   AP
-   Router


About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:

1-Open: there must be a password, if there is no autentication, there is no confidentially either.

2-WEP 

3-WPA

4-WPA2

martes, 7 de marzo de 2017

CRYPTOGRAPHY

Hi again! today I'm going to post a summary about what we have spoken of today


Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.

Encrypt and Decrypt:

Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.

Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.

The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...

key is the number you use in order to encrypt something using algorithms.

Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/