Entradas

Mostrando entradas de febrero, 2023

Security: DANGERS

Imagen
  Trojan: A Trojan horse is a type of malicious software or code that masquerades as another program and allows a remote control for the hacker , from there its name.  Password thief Password stealers use a  virus(software)  that people often install on their computers by accident. Once installed, password stealers collect personal information about the person and this virus replicates.  Key logger Is a virus that records every keystroke you make on your computer and sends it to the hacker.  Sniffer Sniffers  capture and inspect the "packets" of data traveling through the network. It can be by software or by hardware using cables.   Spoofer Spoofer is a cybercrime that uses the technique  of changing the IP or the MAC address for not knowing that it´s him/her.  Hoax They are fake news that spread through social media in order to attract highly attention, and they cover all types of topics.  Phising Phising is a cybercrime ...

Processing programs

  Click  here to have access to the different programs for processing

Computer networks

Imagen
 COMMANDS AND DIRECTIONS - PING(windows/linux) The PING(Packet Internet Groper)  is a very useful tool to diagnose connection problems. The ping command will tell us if we are arriving correctly at our destination, or if there is a problem with the routing table of our computer(stores the information of the different nodes connected to the network) or the router that has established the VPN(Virtual Private Network) tunnel. -MAC(windows/linux) The MAC(media access control) address, sometimes referred to as a physical address is a unique, 12 -character alphanumeric attribute that is used to identify individual electronic devices on a network.  An example of a MAC address is: 00-B0-D0-63-C2-26. - IPCONFIG(windows) The IPCONFIG  allows you to get the IP address information of a Windows computer, the IP address of your router and its MAC address. It also allows some control over your network adapters, even your DNS cache. -NET MASK(windows) A netmask is a 32-bit...

Juego bola

  LINUX Click  aquí  para comenzar a jugar al juego.  WINDOWS Click  aquí  para comenzar a jugar al juego.  SYNTAX JUEGO int xbola=0; float ybola=0; int diametrobola=50; int vx=4; float vy=4; int xr=0; int yr=550; int puntos=0; void setup() {   size (800, 600);   fill(0, 65, 89);   textSize(40); } void draw(){ background(120, 203, 240);       crearbola();   movimientobola();   crearraqueta();   movimientoraqueta();   rparedes();    rraqueta();   puntos();   finaljuego(); } void crearbola(){ ellipse(xbola,ybola,diametrobola,diametrobola); } void movimientobola(){    xbola=xbola+vx;   ybola=ybola+vy; }    void crearraqueta(){   rectMode(CENTER);   rect(xr,550,100,30); } void movimientoraqueta(){   xr= constrain(mouseX,50,750); } void rparedes(){ if(xbola<0 || ...