viernes, 9 de diciembre de 2016

Scratch Program

Hi people, this is another Scratch program but this time is different because this time is a GIF program.

martes, 22 de noviembre de 2016

Proprietary software vs free software

A classic. What is better: proprietary software or free software. Let's see.

Benefits of free sotfware:


  1. Cheaper than commercially marketed products.
  2. Created by skillful and talented people.
  3. Highly reliable.
  4. Help you become more flexible

Disadvantages of free sotfware

  1. Vulnerable to malicious users.
  2. Might not be as user-friendly as commercial versions.
  3. Don’t come with extensive support.

Benefits of proprietary sotfware.

  1. Simplifed User Experience
  2. User Multiplier Effect
  3. Quicker software or code debugging
  4. It's better tailored to the firms or traders' expectations and needs

Disadvantage of proprietary software

  1. Cost
  2. Developer Support

  3. Security Issues

  4. Customization

In my opinion, I think that free sotfware is better that proprietary software in all aspects, 

Habits of effective network security

Here are some tips of habits of effective network security

  1. Use a VPN everywhere (Virtual Private Network)
  2. Enable two-step or two-factor authentication for your online accounts
  3. Always lock your PC
  4. Encrypt your drive
  5. Make sure your own Wi-Fi network is secure
  6. Don't use the same password for every online account
  7. Change you passwords regularly
  8. Don's use obvious passwords like 123456, football, password, qwerty, abc123 or 123456789.

Types of software license

A software license is a document that provides legally binding guidelines for the use and distribution of software.


Proprietary

When dealing with proprietary software, the owner of the application grants access to his product via an end-user license agreement (also known as EULA). As we’ve seen last week, this type of agreement details what your customers are entitled to do when using your software, and in which context they are able to use the application. However, users do not own the software itself. Before using an application, the customer will need to agree to the Terms & Conditions of the EULA.

Open Source

Open Source licenses work differently and allow software to be used, modified, and shared, without restriction. This also includes access to the source code of the application.

However, it’s important to make the distinction between free software and open-source software. Open-source software is free, of course, but any free software is not necessarily open-source and can be proprietary.
The distribution terms of open-source software must comply with specific criteria which are listed and available on the official on OpenSource.orgwebsite. If a piece of software meets these criteria, then it can be set as open source.

miércoles, 16 de noviembre de 2016

Risks of Social Networking. Cyber Bullying

Cyberbullying is when someone bullies others using electronic means, this might involve social media and messaging services on the internet, accessed on a mobile phone, tablet or gaming platform. The behaviour is usually repeated.
Like any form of bullying, cyberbullying can be horrible for the children involved and hard for them to talk about.
Cyberbullying can happen via text, email and on social networks and gaming platforms. It can consist of: 
  • Threats and intimidation
  • Harassment and stalking
  • Defamation
  • Rejection and exclusion
  • Identify theft, hacking into social media accounts and impersonation
  • Publically posting or sending on personal information about another person
  • Manipulation
One of the biggest differences between cyberbullying and face-to-face bullying is that it can be hard to get away from. Young people could be bullied anywhere, anytime – even when they’re at home.
  • It can reach a vast audience in a matter of seconds
  • It has the potential to draw in large numbers of people
  • It takes ‘repetition’ to a different level, with hurtful comments and images being shared multiple times
  • It has the potential to impact at any time of day or night
  • It can offer a degree of anonymity to the perpetrator
  • There are very few children that have not been impacted in some way, either as the perpetrator or the victim
  • It’s difficult to police and to punish
  • There is often some form of evidence (e.g. screen shot, text message).
Some examples are catfishing, cyberstalkin or griefing

Risks of Social Networking. Access to unsuitable content

Access  to unsuitable content

Children and young people spend a lot of time online – it can be a great way for them to socialise, explore and have fun. But children do also face risks like cyberbullying or seeing content that's inappropriate.
That’s why we’ve teamed up with O2 to give you everything you need to know about keeping children safe online.
Whether you're unsure about what happens online or are up to speed with new technology, it's important that you talk to your child about staying safe.
It may feel daunting, but you don't need to be an expert on the internet. Understanding what children do online and the risks they face will help you keep your child safe online.

What children do online and through social networking

Children and young people go online to connect with friends, and make new ones, to browse the internet for information, chat with others and play games. They may: 
  • Search for information or content on search engines like Google and Bing
  • Share images and watch videos through websites or mobile apps likeInstagramPinterestVine and YouTube
  • Use social networking websites like Facebook and Twitter
  • Write or reply to messages on forums and message boards
  • Play games alone or with others through websites, apps or game consoles
  • Chat with other people through online games, BBM (Blackberry Messenger), game consoles, webcams, social networks and tools like Whatsapp
When online, children and young people can learn new things, get help with homework, express themselves creatively and connect with friends and family.
There are also risks, but by understanding and talking about the dangers you can help keep your child safe online.

Risks of Social Networking. Loss of privacy

Loss of Privacy

Social media users believe that convenience comes first. Users do not have any reservations about providing personal information as part of their profile.  When the user gives personally identifiable information (PII), such as address and date of birth, the intent is for the benefit of friends. Users believe that their friends already know the PII and they are sharing something that only provides clarity to their circle of friends.

The concept of privacy in general dictates that no one should be able to observe things about a person without that person’s knowledge. In social networks, privacy is greatly ignored unwittingly. Many people perceive that rejecting a request to be your friend based on one of your other friends’ recommendations might be considered rude.20 It is important to recognize that friendships are dynamic. A typical scenario in Facebook could be that a friend posts “Five Things About Me” and encourages the recipient to do the same. In response to this suggestion from a friend, the posting by the recipient states, “I attended Valley High,” and, “My cat’s name is Myra.” It is likely that the user has chosen these two answers as his/her challenge response for an online bank account. This simple scenario points to the vulnerability of exposing personal information unwittingly.21
Social networks realize the importance of security and provide some tools to protect the information. However, the overwhelming goal is ease of use and rapid dissemination of information. It is clear from various statistics on the use of social networks that younger people use it extensively. The prior comment concerning the goals of social networks comes as a result of this observation as well as the fact that older adults also use social networks for ease of use and rapid communication capabilities.26 These aspects pose an inherent security problem in social networks.

Social networks have revolutionized communication among an extended circle of friends. This technology has many benefits to offer society. Millions of people around the world are benefiting from the use of social networks. An analysis of this new technology shows that it has many positive aspects, but at the same time it has significant problems with respect to privacy of information and security. Social networks themselves are evolving and, as such, some of the settings that could offer the necessary security and privacy are still emerging. The ease of use aspect of the major social networks, such as Facebook, Twitter and LinkedIn, undermines their privacy and security features. The discussion established in this article also sheds light on some of the steps users can take to protect both privacy and security.

For more information visit this webpage


Another Scratch Program

Hi people.
This is another Scratch program for my Programming class, now, is about create symemetries with pencil.

The controls are easy:
1º Like always, press the green flag to start the program
2º Move and press the mouse to create symmetries
3º For change the colour, press the right bottom squares
4º If you want to change the thickness, move the left upper botton and press space

miércoles, 9 de noviembre de 2016

Risk of Social Networking. Identity Theft

Let's continue with Identity Theft

Identity theft is when someone pretends to be someone else to get a benefit or cause harm. An identity thief collects personal information about another person, such as their name, address, date of birth and passwords, and uses that information to take on the other person’s identity.


Examples of identity thief

Making fake profiles
Creating or using profiles on social networking sites under a fake name or using another person’s identity is ‘identity theft’ and can be illegal.
Some social networking sites also have their own rules about creating more than one profile per person or creating profiles under fake names. Profiles breaking those rules may be removed from the site.
Hacking into real profiles
An identity thief may be able to get into your online accounts in a few different ways. For example, you or someone you know might give them your password. Or they might use a computer or smart phone that has your log-in information saved.
An identity thief may also be able to hack into your online accounts by guessing the answers to your security questions. Any details you post to your profile - like your school and your favourite bands - may be used as clues to guess the answers to these questions. Once a person answers the security questions correctly, they can change your password and lock you out. A number of Facebook accounts have been taken over this way.
Finally, some computer viruses are programmed to record your login details and pass them along to identity thieves.

What can I do to prevent identity theft?

  • Be careful with passwords. Avoid sharing them with others. Pick passwords that aren’t easy to guess, and that have a combination of numbers, symbols and capital and lower case letters.
  • Be careful when picking security questions. Avoid questions that can be answered using the information on your profile. Pick questions that
    aren’t easy to guess.
  • Be careful when using a public computer, or when letting other people use your computer or smart phone. Make sure to log out of your accounts on public computers, and to click "don’t remember my password". Think about setting up a pin number for your smart phone or a password for your computer so people can’t use them to getinto your accounts without your permission.
  • Be careful when shopping or banking online. Avoid buying stuff on websites that seem dodgy.
  • Be careful with your information on social networking sites. Avoid adding people you don’t know or trust and limit the amount of information you share.
  • Be careful when clicking links or downloading files. Avoid downloading files from people or sites you don’t know or trust.
  • Use antivirus software and keep it up-to-date.



Risks of Social Networking. Fraud

Hello again people!!!!!!

This and the next posts are going to talk about things like the risks of social networking, the types of software license, habits of effective network security or propietary software vs free software. For convenience reason, we will divide the parts into several parts.

We are going to talk about the risks of social networking.
Social networking are defined by the Cambridge dictionary as: the use of websites and other internet services to communicate with other people and make friends.

Is undiniable that the social network has brought us a lot of beneficts like: instant information, the capacity of communicate with our family and friends independently of if they are near, if they are far, or the freedom of expression.

But also the have created a lot of problems, like fraud, identity theft, loss of privacy, acces to unsuitable content or cyber bullying.

Let's start with fraud:
Posting too much personal information in your social networking profile could result in identity theft, financial fraud and monetary losses.
You should consider whatever you post as being accessible to the entire world. If you would not put it on a public bulletin board, then do not post it online. Even if you delete your profile, it can still remain on the Internet.
The easiest way for fraudsters to get access to your information is to send you a “friend request” or something similar. Many people assume that only people who know you or have contacts in common would send you a request, and accept it without questioning. You should never accept a friend request if you do not know the person sending it or would not be comfortable with that person having access to your personal information and photos.
How to reduce your r​isks:
  • Do not post your home address, telephone number, children’s names, names of schools or employers, or specific details about when you will be absent from home on business trips or vacations.
  • If you have to post your date of birth, do not include your year of birth.
  • Use different passwords for different applications like social networking sites, email and online banking. Change your passwords often.
  • Use secure Internet access only when you access social networking sites. Do not use public Wi-Fi hotspots to link to your social networking pages.
  • Use the social networking site’s enhanced privacy settings and only allow approved people to access your profile.
  • Do not accept friend requests from people you do not know.
  • If you do not want the world to know something or to see a specific picture of you, do not post it or let any friends post it. 
  • Be aware of a site’s privacy settings and policies when you are creating a profile or setting up an account. It is important to know how they protect your data and what they are allowed to do with it. Check whether the site is allowed to sell your information to other companies.
  • Learn what you should do if you think your account or profile has been hacked or taken over. It’s important to do this before you become a victim of fraud. That way if your account gets hacked, you will be able to follow the proper steps to get your account returned to you.


miércoles, 2 de noviembre de 2016

Scratch 2

Hi people! This is another proyect for the Programming class. It's called Simetrías (in English Symmetries). It's easy to play. You move and press the mouse and you will create symmetries. Easy and beautiful! And please, comment!
Bye!!!!!!


miércoles, 26 de octubre de 2016

Scratch

Hi people!

I have put here my first scratch proyect for my Programming class.
The rules are easy. You must explode the ballons before they reach the upper border in order to win points and avoid that the ballons reach the upper border for no losing lives.
The controls are:
1. Press the green flag in order to start the game
2. Move the mouse to explode the ballons
3. If you finish the game press the space button to restart the game
4. Have fun and coment!!!!!


miércoles, 19 de octubre de 2016

The Computer Generation

Hello again people.
This time I have do an timeline about computer generation with Timetoast for an ICT proyect. I put the link to see the proyect here. I hope that it will be useful for you.
http://www.timetoast.com/timelines/1373272

Note: The 6º Generation of Computer appers as an event because I don't how to put an timespan from an date to our times. If you use Timetoast and know to put things like that as an timespan please tell me how to do.
See you!!!

miércoles, 28 de septiembre de 2016

Hello Everybody!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Hello Everybody!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I'am Miguel Ángel and this is my first blog.
I am from Spain. My favourite hobbys are: the reading, the basket, the computers and the nature.
If you wanna start a blog I recommend you to see this video: How to Start a Blog on Blogger.com for Begginers.
See you on the blog.