jueves, 22 de junio de 2017

jueves, 4 de mayo de 2017

jueves, 23 de marzo de 2017

CRYPTOGRAPHHY

Confidentiality: consists of privacy, data is only visible for people that have the rights to see it.

Cryptography: consists of writing words in a different way, to have the data cofidentiality.

It is the set of techniques that allows you to encrypt the data:Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to decrypt a word or a phrase.
key: is the number you use in order to encrypt something using algorithms.

lunes, 20 de marzo de 2017

   Wifi protocols(versions):

802.11b= first wifi in the market.

802.11g=second wifi in the market.


802.11n=third wifi in the market. 


802.11ac=fourth wifi in the market.


 What speed is posible to get in each of them?


802.11b= 8 mbps


802.11g= 54 mbps


802.11n= 300 or 600 mbps.


802.11ac= 1`3 gbps


*    What do you need to connect to the Internet through Wifi?-       Wireless NIC


-       AP


-       Router


*    Wifi SSID (Service Set Identifier)
Wifi security:OPEN


WEP


WPA


WPA2



martes, 21 de febrero de 2017

What’s a keylogger
A keylogger is a software or hardware that can intercept and save the keystrokes made on the keyboard of a computer that has been infected. This malware is located between the keyboard and the operating system to intercept and record the information without the user to the note.
Keyloggers variety
Although there is a wide variety of keyloggers, the two main categories are keyloggers with software and keyloggers with hardware. The most used is the keylogger with software, which is part of other malware such as Trojans or rootkits. This is the easiest to install inside a computer, because you do not need to access the machine physically.
Keyloggers with hardware are less common and more difficult to install on a computer. This variety requires that the criminal has physical access to the computer, during the manufacturing process or during its use.
Other keyloggers can be installed via a USB or a fake connector that links the keyboard to the computer.

How do you infect the team?
Keyloggers with software are often part of older malware. They usually infect the computers through a malicious web, which attacks the vulnerable of the equipment and installs the malware. Another method of installation is by downloading a legitimate application, attacking the download channel or inserting the malware in that app. Hardware keyloggers, on the other hand, require the attacker to physically access the computer.

Elimination


Keyloggers are designed to remain hidden and go unnoticed. Anti-malware products can detect and eliminate some types of keyloggers. However, those keyloggers that have been created for a particular purpose are not usually recognized so easily. If a user suspects that his computer is infected with a keylogger, there are a number of techniques like using a spyware.