miércoles, 9 de noviembre de 2011

Final Assignment:


Anonymous (used as a mass noun) is an international hacking group, spread through the Internet, initiating active civil disobedience, while attempting to maintain anonymity.


VIDEO LINK

During the past years anonymous made lots of different hacking threats to some web pages; Facebook, to bank accounts and lots of other technological items.



















WIKILEAKS WEB PAGE

On 4 October of 2006, Julian Assange, as "The Sunshine Press" launched WIKILEAKS, an international non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources, news leaks, and whistle blowers. This is also an example of hacking as a way of communicating different ideas or thoughts to the society.

The web page shows lots of different images and videos. Nowadays the organization lacks of money for it to keep communicating the United States leaks and secret plans. In my opinion WIKILEAKS is in its right for it to show what the world is hiding and its bad for the government to make it difficult for the organization to transmit its ideals and opinions.

VIDEO



jueves, 20 de octubre de 2011

Technology in education

a) A password protected site is a page which requires users and passwords so as to log in and be able to operate the web page.


b) The user would need: - Username and password, otherwise he wont be able to get in the page. Other thing they will need is the need to using the page, because it will make no sense in creating a user if the info


c) Students can access useful information, such as homework or any stuff in case the student is absent, then he can easily catch up.


d) Nowadays most of the teachers do not have many IT skills making password protecting their web pages very difficult and time wasting. Teachers also return from schools tired to protect their web pages and they eventually leave their sites without protection. In conclusion I think that the security method of some web sites should be more accessible for people with IT limitation skills and knowledge.

Iñaki Rigou and Iñaki Sanchez Lopez

miércoles, 5 de octubre de 2011



             GAME
 
This game can be applied to any subjects.It is effective for students to excersice, learn and put in practice the knowledge about the different school topics; math, geography, english, science and history. A teacher could perfectly use this site as its very practical, it is free and fun and can also be use for testing children on their skills.
In case of geography, for example, a student can enter the web page and discover games and quizzes about rivers, landscapes, countries, continents, capitals and lots of other stuff. 


Santos Gassiebayle and Iñaki Sanchez Lopez

miércoles, 28 de septiembre de 2011

Assigment September 28


Optional Topics


3.6 Political and government
• Political process: voting and elections, lobbying, open government and free movement of information
• Government administration: record keeping, tax collection, policy implementation
• Legislation: policy development, enactment, enforcement and analysis
• Police: DNA data collection, video surveillance
• Military: cyber warfare, smart weapons development, espionage
• Rebel and terrorist use of IT


1.      Political Process
      The fist site explains the different types of technology that could be implemented when voting, lobbying which is persuading legislators to vote for something, and the free movement of data. It shows pros and cons and it seems to be a reasonable web page.

2.       Government Administration
This website also shows the different uses of technology. There may not be exact definitions and ideas of the statements but it give a good general idea. It may be outdated and unreliable
4.       Police
It shows a few ways on the technology used in the police such as video surveilance and DNA tests. Its shows very few information and it may not be very reliable
6.       Rebel and Terrorist
It shows a lot of data but it may be too much. It doesnt go straight to the point but it defines the concepts properly. It is a reliable source.
7.       Politics - Berlusconi Google Bombing Video
This is a perfect example of "Google Bombing", where an user types 'miserable' and it is redirected to Italy's Government website. This method can be used to show contempt towards a group or organism, rebellion or just for having fun. In most of the cases these attacks are towards governments.

8.       Online Data Collection Video
This video talks about how data collection has improved since 20 years ago. The video talks about the KGB and how has technology improved since. This is very useful for every government

jueves, 15 de septiembre de 2011

hardwares in classrooms

VIDEO PLAN

LINKS
http://www.ruthtrumpold.id.au/itgswiki/pmwiki.php?n=Main.ClassroomHardware
In this link we can see the different advantages and disadvantages of each devices in a classroom or an office. Another important thing that is visible in this link is that each device has been separated by a rank of usefulness.
http://www.ehow.com/info_7929530_hardware-devices-can-used-classroom.html
In this link we can see what is the use of each device that is used in a class. Printers, networks, projectors and removable storage data are very well explained.
http://eduscapes.com/tap/topic78.htm
In this web page we can see a greater list of the different devices that are used in class and offices.
DIFFERENT IDEAS FOR THE VIDEO:
·         TALK ABOUT DIFFERENT DEVICES THAT CAN BE USED IN THE CLASSROOMS AND SHOW DIFFERENT IMAGES OF DIFFERENT DEVICES.
·         TALK ABOUT ADVANTAGES AND DISADVANTAGES OF HARDWARES IN CLASSROOMS.
·         HOW DO HARDWARES DEVELOPED DURING TIME.
·         DIFFERENT CASES OF SCHOOLS OR OFFICES THAT DEVELOPED AND USE NEW HARDWARES.
·         SOME INTERVIEWS TO TEACHERS OF THE SCHOOL ASKING IF THE HARDWARES CHANGED THE WAY THEY TEACH.
·         SOME INTERVIEWS TO STUDENDS OF THE SCHOOL ASKING IF THE HARDWARES CHANGED THE WAY THEY LEARN, PRACTICE AND STUDY.
·         SOME INTERVIEWS TO SCHOOL HEADQUARTERS ASKING IF BUYING THE HARDWARES IS A GOOD INVESTMENT.
·         TALK ABOUT INTERESTING FACTS OF HOW THE SCHOOLS AND OFFICES START USING DEVICES.




  

Tutorials and wizards

I think that the tutorials are step by step instructions that can be found in different programs or games,  this tutorials are useful the individuals that do not understand the steps to follow or how to  engage something, like for example in a game, a tutorial can instruct an individual to use different controls or to know what to do. In the case of wizard this is a program or application that is downloaded that helps an individual to improve his uses of computer systems or other programs.


2)      In my opinion the tutorials and wizards are very useful for people that have no access to learn about computers and how to use them, or to use different programs and learn ,like for example Microsoft Office word or other software’s, in an easy way and effective with no use of a teacher or an extra individual. Wizards can also be useful to decrease technological damage like for example viruses that can damage the computer by generating step by step instructions of what to do when a virus attack or tries to enter a computer.

3)
·         Talk about different example of tutorials on software’s
·         Name 2 different Wizards
·         Explain how a Wizard works in at least 3 sentences
·         Can tutorials be seen in the day to day life?
·         Do wizards create dependence on individuals?

simulations


www.investopedia.com has a stock exchange simulator. It doesn't run a very complicated system as it takes all the data from the real stock market, using all the figures and values the market contains. This simulator can be used to start understanding and practicing in the stock exchange market as it treats with virtual money. Each user starts with $100.000 and can be invested in any way. It is very reliable as all the values are updated real time but the feel is not the same as the user is not earning or losing any real money.
Simulators can also be used for training methods, such as complex surgery where no mistake can me done so the doctor can see the reactions of the body. An other very common simulator is in the Formula 1 teams, where the drivers practice in a simulator to know better the track. It is much cheaper than practicing with the real car in the real circuit.
There may be some simulators that are not much real as the algorythms may not be very complex so the user will not find it useful but as time is passing by, simulators are getting much complex and the graphics are getting each time more real and at some point in the future they will be even better than real situations, so the users will find it very useful and reliable

miércoles, 22 de junio de 2011

slavehack in real life

SLAVEHACK LEARNINGS

Playing slavehack we learned different ways in which to hack computers remotely.  By doing this we could erase our logs to prevent getting hacked.  Most of this techniques exist nowadays but it isn’t so simple as it looks.
- DDOS attacks: 
Software: DosHTTP 2.0
- Bruteforce cracking:
Software:  Dsniff or Hyda
Social Engineering: This is technique implemented without any software.
 Erasing of logs and records:
Software:  Winzapper.
-Firewall Bypasser/Proxy Server:
Software (online): HideMyAss
All tools are methods are possible to use, however some are harder than others.
Cracking passwords is probably the most unlikely of all: this is really difficult and nearly impossible since this method consists on trying different password combinations to get a certain password.  Most web pages nowadays have a limit in tries.

The risks and threats of hacking are well-known and really risky. If you get caught you can pay from monetary penalties to jail penalties.  This is possible and has passes many times in hacking history.

jueves, 7 de abril de 2011

Multimedia search engines

As we have briefly discussed, one of the most interesting futuer developments in the area of search engines consists in the capability to search for images, video, etc., based on pattern recognition. A futuristic application of search engiens can be Tin Eye: http://www.tineye.com/about


Another application is Pix Match: http://ideeinc.com/products/pixmatch/
This applications are very useful and are a very futuristic and technological way of search.

jueves, 31 de marzo de 2011

Constructing Queries

ITGS - Constructing queries

Is there life in other planets?

When looking at Google about life in other planets than the planet Earth we find out that there is a high possibility that there is life in planets like Mars or Saturn where salty liquid oceans are found.
This point is enforced by saying that if microbes can live in many different environments with different climates and temperatures there is a strong possibility that they could live in other planets.
A web page named Universe Today says that;
 “A lot of information can be gained by analyzing the surface composition for the materials required by life (as we know it) to survive.”
This shows how different spaceships and different machines are landing in Mars (like THE PHEONIX) to investigate and gain information about the subject.
Some digital newspaper’s talk about this discovery and give some information about the happening.
A heading of TIME talks about “The Salty Waters of Saturn's Moon Hint at Life” and how “in recent years, scientists have come to learn that by some measures, the solar system fairly sloshes with water. Mars, we now know, was once as wet as Earth and still harbors ice and perhaps liquid water.”
We also find out that there could be life at Mars because they have the same seasons and similar climates and weathers. Also there could be existing life because Mars is composed by Carbon and Nitrogen, this elements are essential for having living animals or life.

DIFFERENT URL USED:

jueves, 17 de marzo de 2011

Search engines blog post

Google bombing:


BBC News 
Wednesday, 13 March, 2002, 11:05 GMT
"Google hit by link bombers
Popular search site Google is being exploited by some net users to mount protests and play jokes on their friends.
The users have found a way to "bomb" Google to improve the rankings of particular webpages, and ensure a site is near the top of the results for particular search phrases.
Google screen grab, GoogleBefore now Google's method of ranking webpages was thought to make it largely immune to the tactics that many businesses use to improve their position in web searches.
Some fear it is only a matter of time before businesses start using the bombing tactic to influence their standing in search results."






In this quotation is important to remark the danger of Google bombing this can hurt people, individuals, and also companies. 
An example of Google bombing is the next;
French military victories (http://www.google.com/search?q=french+military+victories&btnI) - hoax, Google look-a-like page saying "no results found for French military victories, did you mean French military defeats?"
http://www.linksandlaw.com/technicalbackground-google-bombing.htm

Last Updated: Sunday, 7 December, 2003, 15:04 GMT
BBC News
'Miserable failure' links to Bush

George W Bush pauses during a press conference with Tony Blair in London
Bush has been the target of similar pranks before
George W Bush has been Google bombed.Web users entering the words "miserable failure" into the popular search engine are directed to the biography of the president on the White House website.


 In this article we can see how Google bombing can have political purposes and also expresses the different comedic purposes this has. In my opinion google bombing is a method of violence we Google users have and how a simple joke or prank can be enlarged like in the snow-ball effect by the press.
 http://www.digitaljournal.com/article/302725
The digital journal talks about  how the use of Google information (public / virtual information) in bad hands can be a terrible and strong weapon. "if put to malicious use against someone, it can be a paralyzing weapon".
I agree with what this digital journal says because google bombing is a very important issue and it can hurt lots of people.





miércoles, 16 de marzo de 2011

Search Engine Rankings


SEARCH ENGINE RANKINGS

Search: Electric Cars


Search Engine: GOOGLE vs. BING
GOOGLE: GOOGLE
BING: MICROSOFT
Comparisons:

Google:

1º page: http://en.wikipedia.org/wiki/Electric_car                                                                                                                                          

2º page: http://www.teslamotors.com/                                                                                                                                                                          

3º page: http://www.made-in-china.com/products-search/hot-china-products/Electric.html                                                                             

4º page: http://www.google.com.ar/images?hl=es-419&biw=1280&bih=677&q=electric+cars&um=1&ie=UTF-8&source=univ&sa=X&ei=VwB5TdulOYK70QHsxbnYAw&ved=0CEEQsAQ

Bing: 
                                                                                                                                                                        
1º page: http://en.wikipedia.org/wiki/Electric_car                                                                                                                                         

2º page: www.electriccars.com/main.cfm                                                                                                                                                                                                                           

3º page :  http://www.teslamotors.com/                                                                                                                                                                            

4º page: http://www.facebook.com/pages/Eve-Electric-Cars/100720443320158                                                                              


1) A. We can see that the crawlers of this search engines find data that is constantly being updated (frequency). Also that the web pages crawled by the search engine have their full length untouchable and also its depth (this can be stated by showing that the different branches of links are untouched). 
In Google we can see that there are jpg1 and jif when in Bing this isn’t found. While in Bing we can see images at the web pages but no videos.

B. In Google we can see that this search engine has an arrangement with Wikipedia by putting its information at the beginning and then the other web pages. In the case of Bing it’s notable that this search engine copies the results from Google. When looking at the other 3 results in both search engines we can observe the same web pages; Wikipedia, electriccars and tesla motors. This also shows how Bing copies Google results demonstrating why Google accuses this firm of replicating their results.
Google results are ranked in this way because of different financial agreements. In the case of Tesla motors it’s very common this firm pays Google a certain amount of money to be in the front page and well ranked also the Meta tags of this page may concord with the search “Electric cars”. At “www.electriccars.com” we can find the same scenario than Tesla motors.  Finally we can perceive that Google is in a way showing it own page images by increasing its popularity and advertise its different uses. In the case of bing we can notice that Microsoft has an arrangement with facebook and that’s why it appears in the front page, and also if watching it with a different point of view (POV) the meta tag  could also have something to do (Is the same as the search “eve electric cars”).

C. In conclusion both Santos and I could observe the different arrangements each search engine has with different companies or firms. Also the ranking algorithms work in a certain way so that the web page with a common meta tag as the one that is searched by a user or common information appears in the front page. Also Google in the example of the images tries to promote itself by different ways and making the consumer exploit the different uses this web page has.


3) In this different search we could observe that google bombing is to use the ranking results at this search engines by using different meta tags in order to communicate a message which could be either business, political or comedic purposes. This has different effects on individuals and/ or organisations this differs  from the message that is tryig to be shown to the user. In the case of the search "miserable failure" the ex president of the united states Bush is being discriminated. (has a political and comedic purpuse). In conclusion we could see that google bombing is an actual problem of discrimination and segregation that has to be stopped this is because it harms firms and individuals and has no good end (encourages violency).


jueves, 3 de marzo de 2011

itgs/ validating sources

Validating sources
1st Statement:

“When a person excrete, a computer can analyze it and it

can tell what you have inside”

The statement below demonstrates that the statement above is not true.

The introduction of new medical technology has not been so rapid in developing countries, but the sense of ambivalence is the same – technology represents both progress and threat. In countries with multiple healing systems patients can choose whom to consult, depending on their illness. In these countries a technological approach may be chosen as a first or last resort. 


2nd Statement:

That a person can travel through the universe in less

than 10 minutes”

First of all it is necessary an impossible amount of

energy to travel as fast as speed of light and if this can

be achieved in the future (it is nearly impossible) the

human body wont resist it. (If the person reaches this

velocity its mass will be transform in energy, and it will

be capable of travelling in time.) 


No we cannot. No matter how close you are to the speed

of light if you have all the thrust in the universe you

cannot get going past the speed of light. "The famailar

notions of absolute space and absolute time

independent of your relative motion must give way." -

Carl Sagan. There is a nice thing that happens though.

As you mentioned time slows down when you approach

the speed of light. This is because atomic particles dont

decay as quickly near the speed of light.