Friday, May 19, 2017

Iframes

An iframe is an option to put directly a video or a image in a document.


Video:  you go to Youtube, below the video is an opcion to share and to embed.


When you click on insert it shows an Iframe. You have to copy that Iframe, go to the document, click on " HTML"

                               Then you go to "redactar" and you will see the video.


Monday, May 15, 2017

Tools learned during first term

Hi! We are Cristoph, Lara and Maria E, and we are going to give you some tips about how to keep your personal information private in social media, so you can be safe. The problem is not just that we sometimes use easy passwords, which hackers can guess, we sometimes also share personal information in public spaces. That way people can know stuff about us with just a couple of clicks. So, when you are about to post something, always make sure that it is okay for it to be public. In fact, sometimes we think we are posting something privately, but actually people we don't even know can see it.
This video shows us that sometimes, we accept people to be our online friends just to have more followers and likes, but we don't know if we can trust them, so we shouldn't post things that could bother other people.



Also remember, that even if you have the "privacy settings" on, you are never 100% sure of what can happen!
We are going to show you some examples with Instagram. In this social media (like in many others) you can have a public or private account. We suggest you: if you want you account to be personal, then keep it private, but if it is for work, a blog or something else (like in the picture we have here), then leave it public, so many people can visit your page.



Also remember: even if you have a private account, people that don't follow you will be able to see your name, biography, profile photo and number of posts and followers. So, the only (but big) difference between having a private or a public account is that if it´s public, everybody can see your posts, and if it is private, only the people you accept are able to do this.

Never share your passwords or information that thieves could use to steal you!
To summarize
Here are some tips that are going to help you in the use of social media:

Tools learned during first term

Online safety tips

Banner (1).png

      Hi, we are Dante, Nacho and Nanu and in this post we are going to show you how to set your Cell Phone to be more secure. This post is not only for Apple/ios it is also for Android. We are going to explain everything about this Topig configurations. We also are going to talk about healthy tips: How much time you can uc for example: Siri configurations, passwords, apps, find my phone and another interestinse your cell phone, why…? , and how to use it properly. We hope this post is usefull for you. It´s very important to have your cell phone secured because it is your everyday Hardware and you have to have it protected.
ios-vs-android-logo.png

Tips for IOS/Apple

  • Use always passcode and Touch ID,  if you will you can also switch to this option who is showing the pictures below

Captura.PNG

  • Have always find my phone option enabled. Once it happened to one of us that he lost his Iphone and he hasn´t the Find my Iphone option enabled so he lost it forever
  • Have always a recent Icloud backup so you can restore your info whenever you want. For example if you do not remember the password of your Iphone you can restart it and then apply the Icloud backup.
  • Have also all this switches turned off.


  • You can also have the Erase Data turned on but we do not recommend it because if you forgot your password you will have to reset your Iphone and you will lost all of your contents.


Tips for Android

In Android Cell Phones it is different than Ios because in Android Cell Phones you can also use applications. All this apps are free.

Here you have the best three applications for Android for us (All this apps are free):

  • 1 Password:  
                               1 Password is app where you have to remember 1 password. When you enter to the app you have to create a password and remember it. In the app you have a type of “agenda where you can put all types of passwords for all the things that you want. For example: The bank password, the alarm password….

  • CM Locker:   
                             CM Locker is a app for the password of your phone. When someone put wrong the password of your phone, the application is going to send you automatically a photo to your mail of the person that enter wrong the password. This app has a bonus that is that you can personalize password.
Example:

  • Prey:
                    Is like a find your Iphone but for android. If someone steals your phone you can search it with that app. Do not forget to enable the location of your phone. You can make a sound or change the password from that application.


Healthy tips


account managment for internet security










We chose the subject of the users because the users are somewhat difficult to handle.
Nowadays harmful content is spread all over the internet and can appear to us in form of malware, viruses, hackers trying to steal information and other stuff.It is important to know which pages we can access and where the safezone ends but most of the times we dont even realize we are getting a malicious software or being hacked. this is why its critical to know how to stay as safe as possible as well as knowing how to protect our accounts from other people.As the internet is unpredictable and to take security measures to prevent something bad from happening.
This is what we are going to talk about in this post...
banner for the last work.png
I have a personal case, once I create a google mail account for the user of playstation and playstation network, what happened was that I forgot the password. The consequence was that I had to delete the user and the account.





Our tips:

  •  Don't chat or talk with strangers.
  •  Only search in save pages.
  •  Do not download stranger apps.
  •  Don't give your name or localitation a strangers persons
  •  Change your passwort regulary
  •  Have your profil private
  •  Only give access to known persons
  •  Don´t put your real name on the web







User security on the Net


Nowadays harmful content is spread all over the internet and can appear to us in form of malware, viruses, hackers trying to steal information and other stuff. Its important to know which pages to access and where the safe zone ends, but most of the times we dont even realize we are getting a malicious software or being hacked. this is why its critical to know how to stay as safe as possible as well as knowing how to protect our accounts from other people. This is what we are going to talk about in this post.
An example:
To verify who is looking your post, you should go to "share" icon and click "off-specific people" and only the persons who are invited will watch it.   

To protect your Gmail account, you can change the password regularly every month or week.
You can do this when you are login and it is very simple. A other thing what you can do is don´t put your real name on a publish account. To don´t give a localization how in Instagram, you need to click  the option to not give the place who you take the photo.

I will share  a personal experience. This happen for a year. When I was in the school a person called me by the phone and say me that he have a my little brother and I need to pay him. It was ridiculous because my brother was at this moment at the school in his class. The person say me that he has my brother in a place who I have take a photo and publish it in Instagram. Surely he know the place because I give the place who i did the photo. 












by: Mateo Burger, Fabio  Rühe, Julian Finsterbusch  

Tools learned during the first term

Online Safety Tips


Viruses are computer programs and their objective is alter the operation of the computer, without the user do not know. A computer virus is a type of software program, but they are malicious. These usually infect computer programs, other files on the system with the intention of modifying them to intentionally destroy files or data stored on your computer. It is said that the affected area is with a computer virus infected. There are some more harmless than others, that are characterized just by being annoying. Each year computer viruses cause billions of dollars of economic damage,  due to causing system failure, corrupting data, etc..






There are a lot of ways that a computer can be infected or exposed to a virus. Some of there are:
- Messages left on social networks like Twitter or Facebook
- Attachments in email messages
- Suspicious websites
- Insert USBs, DVDs or CDs with viruses
- Download applications or internet programs
- False advertisements

Antivirus software:
Many users install anti-virus software and are designed to prevent, detect, or remove software viruses and other malicious programs. An antivirus software is one of the most important tools to protect your computer and your personal data. Antivirus software also needs to be updated regularly to recognize the latest threats. This is because malicious hackers and others are always creating new viruses.




What kind of damage can a virus do?
- Make a computer run slowly.
- Prevent computers from booting up.
- Damage parts of the system or modify how the system operates.
- Be used to steal personal details.
- Send out unauthorized messages.
- Move from machine to machine on a network.
- Damage your personal data or files.

Types of virus:
The Worms are programs which copy themselves to other computers on a network. They tend to slow things down as they consume more and more computer resources. The Trojans perform functions (sometimes malicious) on the computer without the knowledge of the user (Horse of Troy). The Malware are technically not classed as a virus. This software is used to spy on computer user's activities and collect personal information. More commonly known as "spyware".

Steps for preventing viruses:
Preparation: includes making backups of all software (including operating systems) and making a contingency plan.
Prevention: includes creating user awareness, implementing hygiene rules, using disk authorisation software, or providing isolated 'quarantine' PCs.
Detection: involves the use of anti-virus software to detect, report and (sometimes) disinfect viruses.
Containment: involves identifying and isolating the infected items.
Recovery: involves disinfecting or removing infected items, and recovering or replacing corrupted data.


Tools learned in the first term



meio buhy.PNG

  Instagram. It is a social media network where you can publish videos, pictures and boomerangs. Your profile can be private or public. We chose this theme because a friend we know had experiences with Bullying and pedophiles. When she was twelve years old she had a public account, so everybody  could see her pictures, videos and boomerangs. One day someone texted her in direct message and said:’’ Hey, I am from a Model companyI saw your pictures and I thought you could be great model. Do you wanna meet somewhere like in the Bosques de Palermo to do a photo session, but don’t tell it to someone because it is a surprise to your parents and friends. It would be at nine pm. and please don't bring your cellphone because you can lose it in the woods.’’ She knew immediately it couldn't be right so she told it to her parents. They told her to block him
That is reason  we want  to share some tips to prevent this type of situation.
1) Have a private Instagram account  
2) Make sure you're chatting with someone you know face to face 
3) If someone tries to talk to you even tho you don't know him, block him
4) If something weird is happening tell an adult you trust
5) Don't trust someone with a nice profile photo
6) If a person you don't know wants to follow you should't follow him/her back

Bullying  
We know that bullying can be hurtfullhorrible and can make you feel uselless. And it can be very difficult to affront all alone. All persons have friends or family, and we have them to help us. Helping each others. That is the best way to affront difficult situations.
Bullying it is a way to hurt someone Physically or psychologically continuously. There are  a lot of types of bullying:
-Physical bullying includes hitting, kicking and pushing or damaging property.
-Verbal bullying includes name calling, insults, intimidation.
-Social bullying: damages in someone's acceptance in the society 

Image result for cyber bullying cartoon images

But we are  going to talk about cyberbullying.
-Cyber bullying happens when someone with bad intentions bother a person with technology tools.
In cyberbullying cases you can find :   
 1) Abusive or hurtful posts 
 2) Exclude you or a lot of persons in an online platform 
 3) Imitating others online 
 4) Hurtful rumors, messages etc...

Tips to stop it
1) Don't be shy about telling it to your parents tutors etc. and asking for help.
2) Never answer to bullying with violence, stay neutral and go away.
3) Tell it to someone. Don't keep it as secret, you will feel sad or angry if no one can understand what you are feeling. 
4) Say to the person who is bullying you to stop. You have to say it looping her/him into the eyes, with a calm clear voice and without using any kind of aggression.


Tools learned during the first team

Online safety tips

Dibujo sin título (1).png



Hi, we are Camilo Casares, Leo de Artiagoitia and Alex Mayer and we are going to show you how to stay safe in your daily use of Social Medias. We choose these theme because it is being very popular to expose yourself with photos and videos in your profile. We all use social medias, but, do you know how to stay safe? The social medias are like the street, there are bad people and good people, you can have a lot of fun, but also they are very dangerous places. That is why we are going to give you some tips to stay safe.



Our Tips:
  • Not to talk with strangers.
  • Don’t put your location in your Photos, Videos or Profile.
  • Don’t open weird links or links that someone you don’t know sent you.
  • Put your profile private, but if someone you don’t know sends you a friendship request do not accept him.
  • Don’t publish Photos and/or Videos that expose you.






We recommend you to follow our tips and do the following:
If someone you don’t know chats you do not respond him because it could be a hacker or someone who is using a friends account. If he or she sends you something weird or inappropriate do not open that link. You only have to ignore that or block that person. Because if you block him, he would not be able to see your profile or contact you again. You should only unblock the account of your friend again, if you are sure that he or she controls it again.



My real story (Camilo Casares):

When I was 10 years old, I was surfing in the Internet, more specifically, in Facebook. I was checking the recently posts and suddenly a message showed up in my screen. The message was of a kid attending a higher year, I knew him, but I only talked with him one time, about curiosities and weird things, in another social media. The message said something like this: “This is for you, you like the curiosities and weird things” and a link.
Dibujo sin título.jpg
I, like a fool, opened the link. It was a facebook page about curious data, but in the same moment the “Hacker’’ started to control my facebook and a message was sent to all my contacts: “Where did you take this picture?’’ and a link. Some friends open the link, a terrible idea. The link was a page, about downloading inappropriate videos and in the moment you entered, an inappropriate video for our 10 years started to play.


For having a better of what we are talking about, check out this video: