viernes, 21 de abril de 2017

HTML WEB

Hi everyone, hope you are enjoying your holidays! This time we had to create a web using what we´ve learnt about html during this month. I decided to show you one of my favourite bands since I was little, so now I will post an image about the structure of the web and another one about the final look. This is the structure:
And this how the web looks:

viernes, 7 de abril de 2017

HTML TABLE

Hi again! Here we've made a table using html system and we've written our name, surname and ages inside the brackets. here you can see how it looks: The structure of the table is the following one:

viernes, 31 de marzo de 2017

HTML

Here there is our web. We´ve made it using html with this process: Carmen and Patricia

THIS WEB BELONGS TO A 4TH ESO STUDENT

Our hobbies are studyng ICT, English, watching american series and going to the library to read english books.

patri

viernes, 10 de marzo de 2017

WIFI SECURITY

-Protocols/version of the WIFI: it's always 802.11 followed by a letter. Ther first one was b, then g, then n and finally, which is the current one; ac. these letters indicate the WIFI's speed.
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.

The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.

To connect to the Internet through Wifi you need:
-  Wireless NIC
-   AP
-   Router


About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:

1-Open: there must be a password, if there is no autentication, there is no confidentially either.

2-WEP 

3-WPA

4-WPA2

martes, 7 de marzo de 2017

CRYPTOGRAPHY

Hi again! today I'm going to post a summary about what we have spoken of today


Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.

Encrypt and Decrypt:

Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.

Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.

The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...

key is the number you use in order to encrypt something using algorithms.

Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/

lunes, 13 de febrero de 2017

Cracking password






Hi everyone! This time I'm warning you with Asier of cracking password and its dangers! We've made a video to explain all of that. This is a very common topic and everybody should be informated about this thing beacause our security is very important!


Here you have the video's script:

Good afternoon! Here we are to prevent you about cracking password.
Cracking password consists of discovering information about people by knowing their passwords.
There has been lots of examples about cracking password, one of the most famous took place when someone access to an account of the actrice Jennifer Lawrence. There, the hacker could see photos of her where she appeared naked.
To prevent this kind of things, It's important to have a strong password.
You can use numbers instead of letters and use capital letters.
You mustn't use your name or your birthday.
There are websites that can help you to create a strong password.
You must turn on the two-step verification. This consists of answering a question added the password to increase your security.
That's everything you need to know to prevent yourself about cracking password.

miércoles, 1 de febrero de 2017

Password strenght

Last day we spoke in class about security. This is an important thing in our lifes, that's why we should use password as much as possible. We can use passwords, for instance, in social networks such as instagram, snapchat or twitter or even in games, in play station or in profiles.
By knowing your password some people who are called hackers can access to your personal data and can discover information about yourself, for example your address.
These things are the reason why is important to have a good password.

To create a strong password you must take in mind the following steps:
        -Try to make a long password.
    -Use numbers and letters.
    -Use capital letters and lowercase letters.
-Use a password that you’ll remember.
-Do not use your name or similar things.
-Do not use the same password for everything.
You can also be helped by a password manager; a software application or hardware that helps a user store and organizes passwords.
Using this you won´t forget your passwords because you’lljust need to learn one of them, the rest will be saved in the application.
The problem will come if someone access to the password manager because that person will know every password you’ve saved there.
There’s another help for you and your password, which is the two-step verification. This consists of a secondary question that you can decide and answer every time you want to access to one of your accounts to verify that the person who is accessing is you and no other one.
                                                                                                                   


jueves, 26 de enero de 2017

SHARED FOLDERS

It’s a special folder in your machine which that you can use to securely and easily share data with other people in your enterprise account.
These type of folders are typical in big companies.


jueves, 19 de enero de 2017

Create a user account:
1-First search “account” in the inicio and click on “create standard user account”.













2-Type you account’s name and click on ”create account”.




3-Click on the account that you´ve just created.
4-Click on create a new password.










5-Just type your new password
6-Now click on logg off and start your work with the now account that you’ve recently created.


An user profile is a virtual place with a name and usually a password which you can work from. It´s in computers and there you can save all your work. It can be administrator (that can change most  things of the computer, such as wallpapers) or standard (which doesn’t have administrator rights)


martes, 17 de enero de 2017

There are two types of users in Windows: Local users and domain users.

Local users:
 Are those which you can only use in the same machine they’ve been created.
Here you can be a standard user, who has limited rights, for example it can’t change the IP address.
You also can be an administrator, who is more free at working with the computer and with the security options.

Domain users:
A group of computers which you can access to from another computer called Domain Controller. From this one you can allow or deny several actions to the rest of the group, for instance changing the wallpaper.  The password of these users is verified from the Domain Controller. The disadvantage of this is that if you don’t have Access to the network, the user’s name cannot be validated, so if this happens you cannot work.
Every time you finish working from a Domain Controller you must log off (search on the keyboard “ctrl”, “alt” and “supr” and press them all at the same time to Access to a panel in which you’ll can log off).


sábado, 14 de enero de 2017

1-First of all, once you’ve already opened the virtual machine, you should go to equipo from inicio.

2- At the right of the picture there is “Loccal Area Connection”, just click there and then click on “Properties”.


3-Now click on “Internet Protocol Version 4” and then click on “properties” again.
4-Hereyou have to look for the address that appears after the “Puerta de enlace predeterminada”



5-Now introduce the numbers.

jueves, 12 de enero de 2017

Hi everyone, today I'm here to explain you the different types of IP address.
It can be public (everybody can see it) or private, when it's behind the router. At the same time it can be static (when you configuer it) or dynamic (when it's configuered automatically by the ISP.