jueves, 4 de mayo de 2017
viernes, 21 de abril de 2017
HTML WEB
Hi everyone, hope you are enjoying your holidays! This time we had to create a web using what we´ve learnt about html during this month. I decided to show you one of my favourite bands since I was little, so now I will post an image about the structure of the web and another one about the final look.
This is the structure:
And this how the web looks:
viernes, 7 de abril de 2017
HTML TABLE
viernes, 31 de marzo de 2017
HTML
Here there is our web. We´ve made it using html with this process:
Carmen and Patricia
THIS WEB BELONGS TO A 4TH ESO STUDENT
Our hobbies are studyng ICT, English, watching american series and going to the library to read english books.
viernes, 10 de marzo de 2017
WIFI SECURITY
-Protocols/version of the WIFI: it's always 802.11 followed by a letter. Ther first one was b, then g, then n and finally, which is the current one; ac. these letters indicate the WIFI's speed.
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.
The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.
To connect to the Internet through Wifi you need:
- Wireless NIC
- AP
- Router
About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:
1-Open: there must be a password, if there is no autentication, there is no confidentially either.
2-WEP
3-WPA
4-WPA2
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.
The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.
To connect to the Internet through Wifi you need:
- Wireless NIC
- AP
- Router
About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:
1-Open: there must be a password, if there is no autentication, there is no confidentially either.
2-WEP
3-WPA
4-WPA2
jueves, 9 de marzo de 2017
martes, 7 de marzo de 2017
CRYPTOGRAPHY
Hi again! today I'm going to post a summary about what we have spoken of today
Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.
Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.
The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...
A key is the number you use in order to encrypt something using algorithms.
Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/
Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.
Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.
The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...
A key is the number you use in order to encrypt something using algorithms.
Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/
lunes, 13 de febrero de 2017
Cracking password
Hi everyone! This time I'm warning you with Asier of cracking password and its dangers! We've made a video to explain all of that. This is a very common topic and everybody should be informated about this thing beacause our security is very important!
Here you have the video's script:
Good afternoon! Here we are to prevent you about cracking password.
Cracking password consists of discovering information about people by knowing their passwords.
There has been lots of examples about cracking password, one of the most famous took place when someone access to an account of the actrice Jennifer Lawrence. There, the hacker could see photos of her where she appeared naked.
To prevent this kind of things, It's important to have a strong password.
You can use numbers instead of letters and use capital letters.
You mustn't use your name or your birthday.
There are websites that can help you to create a strong password.
You must turn on the two-step verification. This consists of answering a question added the password to increase your security.
That's everything you need to know to prevent yourself about cracking password.
Cracking password consists of discovering information about people by knowing their passwords.
There has been lots of examples about cracking password, one of the most famous took place when someone access to an account of the actrice Jennifer Lawrence. There, the hacker could see photos of her where she appeared naked.
To prevent this kind of things, It's important to have a strong password.
You can use numbers instead of letters and use capital letters.
You mustn't use your name or your birthday.
There are websites that can help you to create a strong password.
You must turn on the two-step verification. This consists of answering a question added the password to increase your security.
That's everything you need to know to prevent yourself about cracking password.
miércoles, 1 de febrero de 2017
Password strenght
Last day we spoke in class about security. This is an important thing in our lifes, that's why we should use password as much as possible. We can use passwords, for instance, in social networks such as instagram, snapchat or twitter or even in games, in play station or in profiles.
By knowing your password some people who are called hackers can access to your personal data and can discover information about yourself, for example your address.
These things are the reason why is important to have a good password.
By knowing your password some people who are called hackers can access to your personal data and can discover information about yourself, for example your address.
These things are the reason why is important to have a good password.
To create a strong password you must take in mind the
following steps:
-Try to
make a long password.
-Use numbers
and letters.
-Use capital
letters and lowercase letters.
-Use a password that you’ll remember.
-Do not use your name or similar things.
-Do not use the same password for everything.
You can also be helped by a password manager; a software application or hardware that
helps a user store and organizes passwords.
Using this you won´t forget your passwords because you’lljust
need to learn one of them, the rest will be saved in the application.
The problem will come if someone access to the
password manager because that person will know every password you’ve saved
there.
There’s
another help for you and your password, which is the two-step verification. This consists of a secondary question that
you can decide and answer every time you want to access to one of your
accounts to verify that the person who is accessing is you and no other one.jueves, 26 de enero de 2017
jueves, 19 de enero de 2017
Create a user account:
1-First search “account”
in the inicio and click on “create standard user account”.
2-Type you account’s
name and click on ”create account”.
3-Click on the account that you´ve just created.

4-Click on create a new password.

5-Just type your new password
6-Now click on logg
off and start your work with the now account that you’ve recently created.
An user profile is a virtual place with a name and usually a
password which you can work from. It´s in computers and there you can save all
your work. It can be administrator (that can change most things of the computer, such as wallpapers) or
standard (which doesn’t have administrator rights)

martes, 17 de enero de 2017
There are two types of users in Windows: Local users and domain users.
Local users:
Are those which you
can only use in the same machine they’ve been created.
Here you can be a standard user, who has limited rights, for
example it can’t change the IP address.
You also can be an administrator, who is more free at
working with the computer and with the security options.
Domain users:
A group of computers which you can access to from another
computer called Domain Controller. From this one you can allow or deny several
actions to the rest of the group, for instance changing the wallpaper. The password of these users is verified from
the Domain Controller. The disadvantage of this is that if you don’t have Access
to the network, the user’s name cannot be validated, so if this happens you
cannot work.
Every time you finish working from a Domain Controller you
must log off (search on the keyboard “ctrl”, “alt” and “supr” and press them
all at the same time to Access to a panel in which you’ll can log off).
sábado, 14 de enero de 2017
1-First of all, once
you’ve already opened the virtual machine, you should go to equipo from inicio.

2- At the right of the
picture there is “Loccal Area Connection”, just click there and then click on
“Properties”.

3-Now click on
“Internet Protocol Version 4” and then click on “properties” again.

4-Hereyou have to look
for the address that appears after the “Puerta de enlace predeterminada”

5-Now introduce the numbers.

jueves, 12 de enero de 2017
Suscribirse a:
Comentarios (Atom)