jueves, 22 de junio de 2017

jueves, 4 de mayo de 2017

jueves, 23 de marzo de 2017

CRYPTOGRAPHHY

Confidentiality: consists of privacy, data is only visible for people that have the rights to see it.

Cryptography: consists of writing words in a different way, to have the data cofidentiality.

It is the set of techniques that allows you to encrypt the data:Encrypt and Decrypt:
Encryption consists of modifying the data using cryptography, so other people can't understand it.
Decryption consists of discovering the way that the data has been encrypt of.
Algorithm: steps or patrons that you can follow to decrypt a word or a phrase.
key: is the number you use in order to encrypt something using algorithms.

lunes, 20 de marzo de 2017

   Wifi protocols(versions):

802.11b= first wifi in the market.

802.11g=second wifi in the market.


802.11n=third wifi in the market. 


802.11ac=fourth wifi in the market.


 What speed is posible to get in each of them?


802.11b= 8 mbps


802.11g= 54 mbps


802.11n= 300 or 600 mbps.


802.11ac= 1`3 gbps


*    What do you need to connect to the Internet through Wifi?-       Wireless NIC


-       AP


-       Router


*    Wifi SSID (Service Set Identifier)
Wifi security:OPEN


WEP


WPA


WPA2



martes, 21 de febrero de 2017

What’s a keylogger
A keylogger is a software or hardware that can intercept and save the keystrokes made on the keyboard of a computer that has been infected. This malware is located between the keyboard and the operating system to intercept and record the information without the user to the note.
Keyloggers variety
Although there is a wide variety of keyloggers, the two main categories are keyloggers with software and keyloggers with hardware. The most used is the keylogger with software, which is part of other malware such as Trojans or rootkits. This is the easiest to install inside a computer, because you do not need to access the machine physically.
Keyloggers with hardware are less common and more difficult to install on a computer. This variety requires that the criminal has physical access to the computer, during the manufacturing process or during its use.
Other keyloggers can be installed via a USB or a fake connector that links the keyboard to the computer.

How do you infect the team?
Keyloggers with software are often part of older malware. They usually infect the computers through a malicious web, which attacks the vulnerable of the equipment and installs the malware. Another method of installation is by downloading a legitimate application, attacking the download channel or inserting the malware in that app. Hardware keyloggers, on the other hand, require the attacker to physically access the computer.

Elimination


Keyloggers are designed to remain hidden and go unnoticed. Anti-malware products can detect and eliminate some types of keyloggers. However, those keyloggers that have been created for a particular purpose are not usually recognized so easily. If a user suspects that his computer is infected with a keylogger, there are a number of techniques like using a spyware.

domingo, 29 de enero de 2017

PASSWORD POST
Usually, we use the password for socialnetworks or games.In these webs(you should sign up and create a password, each time you enter in the web you should log in and put your password):

-Twitter-Facebook-Minecraft-Playstation 


Your password should have 8 characters or more.Should have numbers and capital letters.

Password Manager is a program which sabe your password of all of your accounts. If you forget a password of a web the pw manager can gives you the pw if you introduce the director pw in the password managerCOMMON PASSWORD 2016:


123456


password


monkey


abc123


jueves, 19 de enero de 2017

There are two type of windows users.
Local users: only could be open in one machine.
Every time you log in a computer you have to remember to log off.


Domain users: you can open the same user in a group of computers (domain).
Domain controller: you need to be connected to the network and if the network falls you can’t access.
NIC IP CONFIGURATION
-          Every time you want to configure your computer you need four numbers. Each PC has its own IP ADDRESS.
-          You need another number that is called Network Mask.
-          In the Network Mask all the numbers start with: 255. For example: 255.255.255.0
-          The Network Mask allows you to know how many computers are connected



-          THE GATEWAY: here you should have the internal IP ADDRESS of the router. If the internet wires are not connected, you won’t be able to check your Gateway.

-DNS (Dynamic Name Server): We wouldn’t have internet without the DNS. If you have problems with your DNS, you can take your card and write: 8.8.8.8 on it to fix it. At school we have private DNS because we have our own DNS servers.
IP ADDRESSES
Today, in the ICT lesson we learnt what an IP ADDRESS is and its types, we also learnt how to change your NIC IP Configuration and the most important peripherals.
-          An IP ADDRESS is a group of four numbers separated by dots. The first number shouldn’t be higher than 256. Types of IP: Public and Private, Static and dynamic:

-          PUBLIC: they are the ones that can be found on the internet.
-          PRIVATE: it is something that you have to connect to a router without showing your IP Address on the internet. It usually starts with a 10 or 192, for example: 192.168.X.X or 10.X.X.X
-          STATIC:   it is manually configured.
-          DYNAMIC:  it is an IP ADDRESS that is configured externally and that changes every time you turn your router on.


-          A router has two IP ADDRESSES, one is Public and the other one is an internal IP ADDRESS, the Private one. 

miércoles, 11 de enero de 2017

NIC IP CONFIGURATION

To configure it you will only need four elements:
  • IP Address: 4 numbers separated by dots. The limit is 255.x.x.x

  • Network Mask: Its always 255.255.255.0

  • Gateway: It's the IP of the router; for example: 10.0.72.254

  • DNS (Dynamic Name Server): It's the public IP Address of a machine; for example: 8.8.8.8