Hi! This is Saul Vidal and today I´m at IES Miguel Herrero doing my last ITC exam.
SAUL ITC BLOG
jueves, 22 de junio de 2017
jueves, 23 de marzo de 2017
CRYPTOGRAPHHY
Confidentiality: consists of privacy, data is only visible for people that have the rights to see it.
Cryptography: consists of writing words in a different way, to have the data cofidentiality.
It is the set of techniques that allows you to encrypt the data:Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to decrypt a word or a phrase.
A key: is the number you use in order to encrypt something using algorithms.
lunes, 20 de marzo de 2017
Wifi protocols(versions):
802.11b= first wifi in the market.
802.11g=second wifi in the market.
802.11n=third wifi in the market.
802.11ac=fourth wifi in the market.
What speed is posible to get in each of them?
802.11b= 8 mbps
802.11g= 54 mbps
802.11n= 300 or 600 mbps.
802.11ac= 1`3 gbps
What do you need to connect to the Internet through Wifi?- Wireless NIC
- AP
- Router
Wifi SSID (Service Set Identifier)
Wifi security:OPEN
WEP
WPA
WPA2
802.11b= first wifi in the market.
802.11g=second wifi in the market.
802.11n=third wifi in the market.
802.11ac=fourth wifi in the market.
What speed is posible to get in each of them?
802.11b= 8 mbps
802.11g= 54 mbps
802.11n= 300 or 600 mbps.
802.11ac= 1`3 gbps
WEP
WPA
WPA2
jueves, 9 de marzo de 2017
martes, 21 de febrero de 2017
What’s a keylogger
A keylogger is a software or
hardware that can intercept and save the keystrokes made on the keyboard of a
computer that has been infected. This malware is located between the keyboard
and the operating system to intercept and record the information without the
user to the note.
Keyloggers variety
Although
there is a wide variety of keyloggers, the two main categories are keyloggers
with software and keyloggers with hardware. The most used is the keylogger with
software, which is part of other malware such as Trojans or rootkits. This is
the easiest to install inside a computer, because you do not need to access the
machine physically.
Keyloggers with hardware are less common and
more difficult to install on a computer. This variety requires that the
criminal has physical access to the computer, during the manufacturing process
or during its use.
Other
keyloggers can be installed via a USB or a fake connector that links the
keyboard to the computer.
How do you infect the
team?
Keyloggers with software are often part of
older malware. They usually infect the computers through a malicious web, which
attacks the vulnerable of the equipment and installs the malware. Another
method of installation is by downloading a legitimate application, attacking
the download channel or inserting the malware in that app. Hardware keyloggers,
on the other hand, require the attacker to physically access the computer.
Keyloggers are designed to remain hidden and go
unnoticed. Anti-malware products can detect and eliminate some types of
keyloggers. However, those keyloggers that have been created for a particular
purpose are not usually recognized so easily. If a user suspects that his
computer is infected with a keylogger, there are a number of techniques like
using a spyware.
miércoles, 15 de febrero de 2017
https://www.youtube.com/watch?v=U2itUMDLVVU&t=83s
This is my video about keyloggers, hope you like it!
This is my video about keyloggers, hope you like it!
Suscribirse a:
Comentarios (Atom)