Last day in class, we start with programing.
<!DOCTYPE html>
<html>
<head>
<title>Marcos González</title>
</head>
<body>
<h1>Marcos González Web</h1>
<p>This web belong's to a 4 ESO student </p>
<p title="Marcos González">
In my free time, when I don't have to study anything,
I like do cycling, go out with my friends and play videogames.
I also read something, but not much.
</p>
<h2>Alberto Contador, an idol</h2>
<img src="alberto contador.jpg" alt="this is a picture"
style="width:150px;height:150px;">
</head>
</html>
Saturday, 25 March 2017
Saturday, 18 March 2017
Wifi security II
Friday in class we talked about WIFI security.
Here are my notes
WEP: It’s the less secure
It’s the most popular
WPA: It’s more secure than WEP but less than WPA2
It’s the system that replaced WEP
It has an intermediate security and it was a temporally
solution.
There are two types: TKIP and PSK
WPA2: It’s the most secure, but it has vulnerability. There are two types PSK and AES
Saturday, 11 March 2017
Wifi Security I
Hi! Last friday, in class we talk about Wifi security:
There are some protocols:
802.11b with 11 Mbits/s of speed
802.11g with 54 Mbits/s of speed
802.11n with 600 Mbits/s of speed
802.11ac with 1000 Mbits/s of speed
What do we need to connect to Internet through WIFI?
With a wireless NIC, AP and a router.
The SSID is the name of the WIFI
There are some types of Wifi security:
WEP/WPA/WPA2
There are some protocols:
802.11b with 11 Mbits/s of speed
802.11g with 54 Mbits/s of speed
802.11n with 600 Mbits/s of speed
802.11ac with 1000 Mbits/s of speed
What do we need to connect to Internet through WIFI?
With a wireless NIC, AP and a router.
The SSID is the name of the WIFI
There are some types of Wifi security:
WEP/WPA/WPA2
Byee
Tuesday, 7 March 2017
Confidentially
Today in class we talked about confidentially. Here are the notes that I've taked
Confidentiality = privacy
It’s only visible for the people that have autoritation.
Cryptography: It’s the set of techniques that allows you to encrypt data.
How to have it: With cryptography
Encrypt: Modify to do it unreadeable
To encrypt you need:
Algorithm: They are a set of steps to do cryptography.
We need a key(clave), numbers.
Digital certificate
Decrypt: Recover the original way
I'll return to write Cortana's jokes, here are today's joke:
Confidentiality = privacy
It’s only visible for the people that have autoritation.
Cryptography: It’s the set of techniques that allows you to encrypt data.
Encrypt: Modify to do it unreadeable
To encrypt you need:
Algorithm: They are a set of steps to do cryptography.
We need a key(clave), numbers.
Digital certificate
Decrypt: Recover the original way
I'll return to write Cortana's jokes, here are today's joke:
A boy approaches a man: "I want to tell him that I'm in love with his daughter, and it's not for the money." The man asks, "Which of the four?" "Ah well ... of anyone."
Byeee!
Subscribe to:
Comments (Atom)