patrivid
jueves, 4 de mayo de 2017
viernes, 21 de abril de 2017
HTML WEB
Hi everyone, hope you are enjoying your holidays! This time we had to create a web using what we´ve learnt about html during this month. I decided to show you one of my favourite bands since I was little, so now I will post an image about the structure of the web and another one about the final look.
This is the structure:
And this how the web looks:
viernes, 7 de abril de 2017
HTML TABLE
viernes, 31 de marzo de 2017
HTML
Here there is our web. We´ve made it using html with this process:
Carmen and Patricia
THIS WEB BELONGS TO A 4TH ESO STUDENT
Our hobbies are studyng ICT, English, watching american series and going to the library to read english books.
viernes, 10 de marzo de 2017
WIFI SECURITY
-Protocols/version of the WIFI: it's always 802.11 followed by a letter. Ther first one was b, then g, then n and finally, which is the current one; ac. these letters indicate the WIFI's speed.
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.
The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.
To connect to the Internet through Wifi you need:
- Wireless NIC
- AP
- Router
About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:
1-Open: there must be a password, if there is no autentication, there is no confidentially either.
2-WEP
3-WPA
4-WPA2
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.
The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.
To connect to the Internet through Wifi you need:
- Wireless NIC
- AP
- Router
About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:
1-Open: there must be a password, if there is no autentication, there is no confidentially either.
2-WEP
3-WPA
4-WPA2
jueves, 9 de marzo de 2017
martes, 7 de marzo de 2017
CRYPTOGRAPHY
Hi again! today I'm going to post a summary about what we have spoken of today
Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.
Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.
The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...
A key is the number you use in order to encrypt something using algorithms.
Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/
Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.
Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.
The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...
A key is the number you use in order to encrypt something using algorithms.
Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/
Suscribirse a:
Comentarios (Atom)