jueves, 5 de junio de 2014

Video Pad

VideoPad is a video editing application developed by NCH Software for the home and professional market.
VideoPad is part of a suite that integrates with other software created by NCH Software. This other software includes WavePad, a sound-editing program; MixPad, a sound-mixing program and PhotoPad, an image editor.


miércoles, 7 de mayo de 2014

Computer security

1.Definition
       Computer Security is the protection of computing systems
    and the data that they store or access.
   
    Computer security  is information security as applied to 
    Computing devices such as computers and smartphones,
    as well as computer networks  such as private and
    public networks, including the Internet as a whole.

Types:

Hardware security:
 A hardware security module (HSM) is a physical computing device that safeguards and manages digital security for strong authentication and providescryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

Software security:
Computer security software covers a wide variety of potential risks, including hacker intrusions, destruction of data, harmful viruses, Trojan horses and other malicious attacks. Computer security software is available either within the computer's operating systemhttp://images.intellitxt.com/ast/adTypes/icon1.png or add-ons freely downloaded or purchased. Computer security software offers peace of mind amid a growing array of risks that increase exponentially as more PCs become accessible through the Internet.

2.Malware
“Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, 
trojans, rootkits and so on.



1.1 Types of malware:
Viruses and worms the contagious threat

Viruses and worms are defined by their behaviour – malicious software designed to spread without the user’s knowledge. A virus infects legitimate software and when this software is used by the computer owner it spreads the virus – so viruses need you to act before they can spread. Computer worms, on the other hand, spread without user action. Both viruses and worms can carry a so-called “payload” – malicious code designed to do damage.    

Trojans and Rootkits the masked threat

trojans and rootkits are grouped together as they both seek to conceal attacks on computers. Trojan Horses are malignant pieces of software pretending to be benign applications. Users therefore download them thinking they will get a useful piece of software and instead end up with a malware infected computer. Rootkits are different. They are a masking technique for malware, but do not contain damaging software. Rootkit techniques were invented by virus writers to conceal malware, so it could go unnoticed by antivirus detection and removal programs. Today,antivirus products , like bullguard Interner Security,strike back as they come with effective rootkit removal tools.



Spyware and keyloggersthe financial threat
Spyware and keyloggers are malware used in malicious attackslike identity theft, phising and social engineering - threats designed to steal money from unknowing computer users, businesses and banks.
The latest security reports for the first quarter of 2011 put Trojan infections at the top of the malware list, with more than 70% of all malicious files detected on computer systems, followed by the traditional viruses and worms.
The popularity of rogue antiviruses has been decreasing over the end of 2010 and beginning of 2011, but the number of downloader Trojans significantly increased. The detection rates of new malware have increased 15% in the first quarter of 2011 compared to the last quarter of 2010


3.Antivirus:
Antivirus software is a type of utily used for scanning and removing viruses from your computer. While many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found.


Types:

Avast

AVG

Avira


4.Adware
Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser. They include features like advanced searching of the Web or your hard drive and better organization of your bookmarks and shortcuts. Adware can also be more advanced programs such as games or utilities. They are free to use, but require you to watch advertisements as long as the programs are open. Since the ads often allow you to click to a Web site, adware typically requires an active Internet connection to run.

5.Dangers of Using the Internet

There are several ways in which the computer can be dangerous to users. The following is a partial list:
·        It is possible to bring viruses into an individual computer or an entire network. These viruses can seriously disrupt or even destroy important work.
·        Users can be spammed with vast quantitities of useless email. This overabundance of useless information can cause people to miss important information or to waste time wading through the useless information.
·        People can be cheated by con artists who advertise seductive products on the Internet.
·        Information that is presented as accurate or important may be inaccurate and misleading.
·        Children may encounter information that their parents and teachers don't want them to encounter. Examples include sexually explicit content, hate literature, bomb-building information, confusing religious prosylitization, and misinformation about cults and satanic materials.
·        People can be tempted to do illegal or improper things on the the Internet. Examples include gambling and the perpetration of pranks or criminal activity.
·        Users can become addicted to the Internet.




6.Wi-fi password
WPA
Wi-Fi Protected Access (WPA) is a security standard to secure computers connected to a Wi-Fi network.
WPA2
Wi-Fi Protected Access (WPA) is a security standard to secure computers connected to a Wi-Fi network.
Free wi-fi dangers
Use of Wi-Fi in coffee shops, libraries, airports, hotels, universities, and other public places pose major security risks. While convenient, they’re often not secure. You’re sharing the network with strangers, and some of them may be interested in your personal information. If the hotspot doesn’t require a password, it’s not secure. If it asks for a password through your browser simply to grant access, or it asks for a Wired Equivalent Privacy (WEP) password, it’s best to treat it as unsecured. You can be confident that a hotspot is secure only if it asks for the Wi-Fi Protected Access (WPA and WPA2) password. WPA2 is the most secure.



Also, unsecure laptops and smart phones make it easy for a hacker to intercept information to and from the web, including passwords and credit or debit card numbers. They are also vulnerable to virus and spyware infections, and to having their contents stolen or destroyed.





7.How to shop safely and securely online
Before you type your card details into a website, ensure that the site is secure. Look out for a small padlock symbol in the address bar (or elsewhere in your browser window) and a web address beginning with https:// (the s stands for 'secure').
You also need to check that the website is trustworthy



                                   

sábado, 3 de mayo de 2014

PREZI

Prezi is a cloud  presentation software and storytelling tool for presenting ideas on a virtual canvas. The product employs a zooming user interface, which allows users to zoom in and out of their presentation media, and allows users to display and navigate through information within a 2.5D or parallax 3D .

jueves, 20 de marzo de 2014

Gimp

Gimp is a photo editor,it´s free.Is difficult the first time but you can learn it quickly if you want.
The most used tools are scissors to cut things,the baryta is for select depends of the colour,the smudger,the pencil and the brush.

In the class we did three works,the first was simple,we had to mix pictures,we put a similar light and shades.The second consisted in mix pictures too but the background was a picture of highschool and the others was pictures relationited with Don Juan Tenorio.
And the last work consisted in mix pictures of a face a with a background of fruit.



viernes, 14 de marzo de 2014

networks

a network is a set of computers and electronic devices connected  together aimed and sharing resources,information and services.
The smallest network that can do consist of two computers.

types of networks:
1. Networks by administrator:
1-1peer to peer network
Peer to Peer Networks. Each computer on the network can freely share their own resources. A computer that is connected to a printer can even share it so that all computers can access it by the network.
1-2 client-server network
It is the technology that provides the end user transparent access to applications, data, computer services or any other resources the workgroup and / or through the organization, across multiple platforms. The model supports a distributed environment in which the service requirements made ​​by intelligent workstations or "customers'', resulting in a paper by other computers called servers.


2. networks according to their size                                                                 


2-1 PAN

Personal area network

2-2 LAN

Local area network

2-3 MAN

Metropolitan area network

2-4 WAN

Wide area network                                                                                                                                              
3.Networks according to the typology
3-1 Bus


3-2 Star

3-3 Mesh

3-4 Ring

3-5 Tree















domingo, 29 de diciembre de 2013

phubbing

Phubbing es una situación que se produce cuando un tú y sólo attetion pago de su teléfono móvil hace caso omiso.

QR code

Código QR (Quick Response Code) es la marca registrada de un tipo de código de barras de la matriz (o código de barras bidimensional) primero diseñado para la industria automotriz en Japón. Un código de barras es una etiqueta óptica legible por máquina que contiene información sobre el elemento al que está unido. El sistema de código QR se ha convertido en popular fuera de la industria del automóvil, debido a su facilidad de lectura rápida y una mayor capacidad de almacenamiento en comparación con los códigos de barras estándar UPC. Las aplicaciones incluyen el seguimiento del producto, la identificación del artículo, el tiempo de seguimiento, gestión de documentos, marketing en general, y mucho más.