lunes, 22 de mayo de 2017

Pereza web

Today we made a web of Pererza
Here´s the link: https://pereza777.wordpress.com/leiva-2/

Parts of a website

The parts of a website:

Header: It's in the top of the website, it already has the logo of the page:




Footer: It's where the contacts and mails of the person who created the web page.















Sidebar: It's a bar where usually has links related to the content of the page.






Content area:It's the central part of the web page and that have the information or the content of the web.





Images: It's an image, a video that makes attractive the page
















Widget: It's usually a little box that help you to find something, mentions to Facebook, Twitter..

domingo, 23 de abril de 2017

HTML web page

Hi everyone! In class we created a web page using html:

the result:













the structure:

<!DOCTYPE html>

<html> </html>

<head> </head>

<body style="background-color:#99bbff;">

<title>Sabaton</title>

<body> </body>

<p> Hi everyone! Today I´m going to talk about Sabaton</p>

<h1>What is Sabaton?</h1>

<p>Sabaton is a Swedish power metal band formed in 1999 in the city of Falun.
The group is characterized by its militarized aesthetics and the band´s main lyrical themes are based on war and historical battles.
Even its name comes from the part of the medieval armor that covers the instep of the foot (that in Spanish is called escarpe).
Currently Sabaton has its own festival which is held in autumn and its own cruise-festival which is held in winter</p>

<img src="logo_sabaton.jpg" alt="Logo Sabaton" style="width:304px;height:228px;">
<img src="Sabaton-Promo.jpg" alt="Group" style="width:304px;height:228px;">

<head>
<style>
table {
    font-family: arial, sans-serif;
    border-collapse: collapse;
    width: 100%;
}

td, th {
    border: 1px solid #99bbff;
    text-align: left;
    padding: 8px;
}

tr:nth-child(even) {
    background-color: #;
}
</style>
</head>
<body>

<table>
  <tr>
    <th>Members</th>

  </tr>
  <tr>
    <td>Joakim Broden (vocals)</td>
<td>Par Sundstrom (bass)</td>
<td>Chris Rorland (guitar, backing vocals)</td>
<td>Tommy Johanson (guitar, backing vocals)</td>
<td>Hannes Van Dahl (drums)</td>
</table>

<p>The armor and battle theme is heard in the albums: Primo Victoria(2005), Attero Dominatus(2006), Metalizer(2007), The Art of War(2008), Coat of Arms(2010), Carolus Rex(2012), Heroes(2014) and The Last Stand(2016) in which all of the songs contain these motifs, except final tracks which are tribute songs to influential heavy metal bands.
Lyrical content drawn from the World War I and World War II</p>

<head>
<style>
table {
    font-family: arial, sans-serif;
    border-collapse: collapse;
    width: 100%;
}

td, th {
    border: 1px solid #99bbff;
    text-align: left;
    padding: 8px;
}

tr:nth-child(even) {
    background-color: #;
}
</style>
</head>
<body>

<table>
  <tr>
    <th>Year</th>
    <th>Award</th>
<th>Result</th>
  </tr>
  <tr>
    <td>2011</td>
    <td>Best Breakthrough Band</td>
<td>Won</td>
  </tr>
  <tr>
    <td>2012</td>
    <td>Best Live Band, Best Live Band, Best Swedish Group, Best Swedish Live Act</td>
<td>Won, Won, Won, Won</td>
  </tr>
  <tr>
    <td>2013</td>
    <td>Best Live Band, Best Swedish Album, Best Swedish Live Act, Best Swedish Group</td>
    <td>Nominated, Won, Won, Won</td>
</table>

<html>
<body>
<p><a href=http://www.sabaton.net/>Official web page</a></p>
<p><a href=https://en.wikipedia.org/wiki/Sabaton_(band)>Click here to know more about this band</a></p>
</body>
</html>




viernes, 7 de abril de 2017

HTML TABLE

Hi again! Here we've made a table using html system and we've written our name, surname and ages inside the brackets. here you can see how it looks:




The structure of the table is the following one:




sábado, 1 de abril de 2017




Here there is our web. We´ve made it using html with this process:

THIS WEB BELONGS TO A 4TH ESO STUDENT

Our hobbies are studyng ICT, English, watching american series and going to the library to read english books.

patri

sábado, 11 de marzo de 2017

WIFI SECURITY

-Protocols/version of the WIFI: it's always 802.11 followed by a letter. Ther first one was b, then g, then n and finally, which is the current one; ac. these letters indicate the WIFI's speed.
This is an example of an internet card in which the protocol is indicated:

 The aproximatly speed that indicate those letters is: 
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps

Anyway, this speed is not exactly, it can changes but only a little bit.

 The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.

 To connect to the Internet through Wifi you need:
- Wireless NIC
- AP
- Router

 About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security: 

1-Open: there must be a password, if there is no autentication, there is no confidentially either. 

2-WEP

 3-WPA

 4-WPA2

martes, 7 de marzo de 2017

CRYPTPGRAPHY

Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.

Encrypt and Decrypt:

Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.

Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.

The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...

A key is the number you use in order to encrypt something using algorithms.

Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/

lunes, 20 de febrero de 2017

Spoofing is the set of techniques that are used to supplant the identity of a user or server.
News:One boy called Navinder Sarao was placing large sales orders (sometimes hundred of million of dollars in one day)He created a company in the island ‘Levis’.And he manipulate the market in England illegally.
How avoid spoofing?A way to avoid spoofing is enter in secure web pages(https)
FOr example we known that the web page of amazon isn’t have spoof.

jueves, 2 de febrero de 2017

Security

Security is the protection you need to defend hardware, software or data on your computer.
You need to protect  data, hardware, networks or yourself.

What do I have to protect the data from?
From spoofing, phishhing and malware and backdoors.

What do I have to protect the hardware from?
From hits and balckouts.

What do I have to protect the networks from?
From the people that don't know how use a computer.

What do I have to protect myself from?
From the people that don't know how use a computer.

martes, 24 de enero de 2017


Password strength:

It´s important to create different passwords in different accounts to provide security to yourself.

1.- Think about 5 services you use with a password.

Instagram, gmail, twitter, facebook and snapchat


2.-  6 recommendations to create secure password.

Use a long password
Use alphanumeric combinations
Mix capital with lowercase letters
Interleave keyboard sings
Don´t put personal information in it
Don´t use the same password for everything


3.-  What is a password manager? Adventages and disadvantages.

A password manager is a program that is used to store a large number of user / password pairs.
The database where this information is stored is encrypted using a single key, so the user only has to memorize one key to access to all the others.

Advantages: Allows users to choose complex keys without fear of not being able to remember them later

Disadvantages: We can compromise our security by storing all our passwords
 
 
4.- Which were the most common passwords used in 2017?

123
123456789
qwerty
111111
1234567
password
123123
987654321


5.- Write 5 strong passwords. Check the strength here: https://howsecureismypassword.net/


M1f3ch4d3n4c1m13nt03s29032001  ⇨  8 Decillion years




 ⇨ 1 Trillion years
 P4s5w0RdDr0Ws5@p

Bu1137Pr0ºF        983 Thousand years 
 
#h#4#$#7#4#G         34 Thousand years
 
  ⇨3573Rn0cl31D0M4570iD3o          2 Sextillion years
 
 
 
6.- Two-step verification. What is it?
 
2-step verification is a method of computer access that helps you to protect by making it harder for someone to sign in to your account

Use two different forms of identity: your password and a contact method
Even if someone discovers your password, they will not be able to log in if they don´t have access to your security information. That's why it's important that you use different passwords for all your accounts.

jueves, 19 de enero de 2017

Create a user account:
1-First search “account” in the inicio and click on “create standard user account”.













2-Type you account’s name and click on ”create account”.




3-Click on the account that you´ve just created.
4-Click on create a new password.










5-Just type your new password
6-Now click on logg off and start your work with the now account that you’ve recently created.


An user profile is a virtual place with a name and usually a password which you can work from. It´s in computers and there you can save all your work. It can be administrator (that can change most  things of the computer, such as wallpapers) or standard (which doesn’t have administrator rights)


miércoles, 18 de enero de 2017

There are two types of users in Windows: Local users and domain users.

Local users:
 Are those which you can only use in the same machine they’ve been created.
Here you can be a standard user, who has limited rights, for example it can’t change the IP address.
You also can be an administrator, who is more free at working with the computer and with the security options.

Domain users:
A group of computers which you can access to from another computer called Domain Controller. From this one you can allow or deny several actions to the rest of the group, for instance changing the wallpaper.  The password of these users is verified from the Domain Controller. The disadvantage of this is that if you don’t have Access to the network, the user’s name cannot be validated, so if this happens you cannot work.
Every time you finish working from a Domain Controller you must log off (search on the keyboard “ctrl”, “alt” and “supr” and press them all at the same time to Access to a panel in which you’ll can log off).


1-First of all, once you’ve already opened the virtual machine, you should go to equipo from inicio.

2- At the right of the picture there is “Loccal Area Connection”, just click there and then click on “Properties”.


3-Now click on “Internet Protocol Version 4” and then click on “properties” again.







An IP address is a serie of 4 numbers separate by dots and less than 256 :
300.124.1.2 This is wrong
125.124.1.2 this is good

There are two different types Public and Private (a router has a private and a public IP Address)
·         Private:   10.x.x.x   192.168.x.x  and  172.16.x.x but the last one is not comun.
·         Public: Every computer has a different one and people can see yours in the internet.
·         Static: Is manually configured by the ISP(orange, Ono, Yoigo…)
·         Dynamic: Is automatic configured


How to change the IP of a computer?

NIC IP Configuration:
1.    IP Address  10.0.72.10
2.    Network Mask:  255.255.255.0 (normalmente suele ser con tres veces 255, el tercero marca la cantidad de ordenadores que están conectados)
3.    Gateway: “IP of the router”
4.    DNS:-Dinamic  -Name  -Server  Is theIP Address of a machine (Sin DNS no hay internet, son IPs públicas)
 


Flecha derecha: Number 2


Pereza web

Today we made a web of Pererza Here´s the link:  https://pereza777.wordpress.com/leiva-2/