-Protocols/version of the WIFI: it's always 802.11 followed by a letter. Ther first one was b, then g, then n and finally, which is the current one; ac. these letters indicate the WIFI's speed.
This is an example of an internet card in which the protocol is indicated:
The aproximatly speed that indicate those letters is:
b: 11 Mbps
g: 54 Mbps
n: 600 Mbps
ac: 1'3 Gbps
Anyway, this speed is not exactly, it can changes but only a little bit.
The name of the WIFI is called SSID (Server Set Identifier). I mean, the names that appear to you in a list for example when you try to connect your smartphone, tabler or computer to a router. Those names are SSID's.
To connect to the Internet through Wifi you need:
- Wireless NIC
- AP
- Router
About wifi security, we must know how to restinct the access to our router using an autentication password and you must also take care with confidentiality, because you don't want other people to know data about yo through ypur router. There are four metods to follow to keep yout security:
1-Open: there must be a password, if there is no autentication, there is no confidentially either.
2-WEP
3-WPA
4-WPA2
sábado, 11 de marzo de 2017
jueves, 9 de marzo de 2017
martes, 7 de marzo de 2017
CRYPTPGRAPHY
Confidentiality consists of privacy, in this way sniffing is not possible, so data is only visible for people that have the rights to see it.
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.
Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.
The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...
A key is the number you use in order to encrypt something using algorithms.
Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/
Cryptography consists of writing words in a different way, and its a way to keep confidentiality.
It is the set of techniques that allows you to encrypt the data.
Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to "cifrar" a word or a phrase.
The relation between an algorithm and cryptography is that you use algorithm to carry on cryptography. For example, there are some algorithms that move a letter one place forward or backward, other way to encript something is using numbers instead of letters and then, using algorithms, you mix those numbers and after that, turns them again into words. this way most people wouldn't be ablo to discover the data, but they can find a way to decrypt it too...
A key is the number you use in order to encrypt something using algorithms.
Here I leave you a link to enter in a web that shows a game to encrypt and decrypt data. Using the "cifrado cesar", you use a key (must be a number) and depending of that key you change a letter for another. for example, if you want to change an "a" using key 4, you must write an E, because you must move the "a" in the alphabet as places as the key indicates.
http://www.cryptoclub.org/
Suscribirse a:
Comentarios (Atom)
Pereza web
Today we made a web of Pererza Here´s the link: https://pereza777.wordpress.com/leiva-2/
-
There are two types of users in Windows: Local users and domain users . Local users: Are those which you can only use in the same m...
-
The parts of a website: Header: It's in the top of the website, it already has the logo of the page: Footer: It'...
-
Password strength: It´s important to create different passwords in different accounts to provide security to yourself. 1.- Think a...