Nov 19, 2015

JavaScript Calculator

During the last days I have been working on a project. I have managed to succesfully program a calculator which is fully functional. I programmed it with JavaScript, HTML5 and CSS in a note pad. It consists of buttons which operate a function, which according to what has been pressed, will operate differently. When the operation has been done, then the code will evaluate each case to know what has been pressed as the arithmetical operator. Depending on the numbers and the operator, the result will be shown on top. The styling was done with CSS. The code is very simple to understand, at least most of it. I hope I can soon show you the calculator, but I need to find a platform to post it. I am open to suggestions. I offer you an image preview so you can get an idea of my project.

 Sources

  • Personal Knowledge

Nov 4, 2015

Graphic Design

   Graphic design is the process of visual communication, and problem-solving through the use of type, space, image and color. Graphic design is used for proyecting and making visual communications that allow you to communicate graphicly ideas, facts and values. The following text will give you further information about it.

Basic Elements

   The basic elements for a graphic designer are:
  • Visual language: it is a system of communication using visual elements. Humans can verbalize their ideas through speech. However, they can also visualize their thinking. Some examples are a map, a painting and a diagram.
  • Communication process: it is the steps we take to succesfully communicate our ideas. Communication is a process of conveying, and if the process breaks, the communication fails.
  • Visual perception: it is the ability to interpret the surrounding environment by processing information that is contained in visible light. The resulting perception is known as eyesight. The graphic designer must not only put information in an image, but also take care of the background, contrast, shapes, organization and more, to make the communication as effective as possible.
  • Resources administration: every graphic designer first thinks about an idea, and then he thinks how to make it. There are many ways of fulfilling an image or work. Depending on what the graphic designer has in mind, he can use different resources
Rhethorical figures


   Rethorical figures are images which have been alterated so they have a connection to the subject of an idea. It is the use of visual metaphores. Using rethorical figures entails playing with the meaning of images that beyond their meaning they will transmit new sensations and ideas. This way, the graphic designer can replace something for a similar object in order to communicate the idea.

Main Groups

   Design can be classified in 3 main groups:
  • Editorial Design: It may sometimes be called Layout. It is about organizing in a certain space a certain amount of different objects. This is important for newspapers and books. It is often used a grid, in which they accommodate all the objects and try different combinations to look for the best one. The text, images, titles, subtitles and others must be positioned in the best way so it is as legible as posible without tiring the sight, or so it calls the attention of sight easier. For example, a book written al in uppercase letters will result harder to read. However, if a title of a book is written in uppercase letters, it may call more the attention of people. Newspapers and magazines will usually mantain their design throughout all their editions. 
  • Advertising:It consists of creating the best adds. A good advertisement must be quickly readable, transmit all the ideas that the company desires, and call the attention of people. There are many ways of doing this, the only limit is one's creativity. The graphic designer must also take into account where the add will be. For example, if it is on a highway, it must be readable in less than 2 seconds to avoid any problems to the driver, but yet transmitting the full message to him. 
  • Identity: Corporate identity is the set of pieces, aspects, ideas, methods and techniques that a company uses to differentiate themselves from the rest. All the things from a company keep a system, an idea or a concept. An example of this is Coca-Cola, which is known for the classic red and white logo, which it uses everywhere.

Sources:
  • Wikipedia
  • Fernando Gómez (graphic designer)




Oct 28, 2015

Programming - Tutorials

   Programming is the process of creation of executable computer programs. Doing such requires a certain language, source codes can be written in 1 or more programming languages. Some examples are JavaScript, HTML5, PHP, Python and Ruby. The following text will teach you some things you should know for learning JavaScript.

Where to learn programming?

   Many people are interested in programming but yet they do not know where they could learn a language. Excluding learning in an institution, the most common way to learn might be through programming websites. Nowadays there is a wide variety of online courses which teach you a programming language, usually being focused in a single one or a bunch. Talking about JavaScript, some which you could visit are:
  • W3Schools: W3Schools is a web developers site, with tutorials and references on web development languages such as HTML, CSS, JavaScript, PHP, SQL, and JQuery, covering most aspects of web programming.W3Schools has focus on simplicity, practicing easy and straight-forward learning. It uses simple code explanations, and illustrates how to use it. The tutorials start from basic level, and move all the way up to complete professional references. I personally recommend this website to anybody who already knows the basics of programming in JavaScript or is looking to begin. To visit the page, you can click the logo.
  • Codecademy: Codecademy is an online interactive platform that offers free coding classes in 9 different programming languages including Python, PHP, jQuery, JavaScript, AngularJS, and Ruby, as well as markup languages HTML and CSS. Codecademy also provides a forum where enthusiasts, beginners, and advanced coders can come together and help each other. Each individual who joins has their own profile. To motivate users to participate, the site offers feedback, badges for completing exercises, as well as a function that keeps track of a user's total score and total day streak, and displays it to others. I only recommend this website for those looking forward to learning the basics of JavaScript, as the internal editor only supports basic operators and methods. If you would like to visit the website, you can easily do so by clicking its logo. 
  • Sololearn: Sololearn is an online platform which offers different programming languages  courses and about other things. For example: JavaScriptCSS, HTML, Excel, Photography and C++. Overall, although the content proved to be correct, the lessons move way to fast. Nobody without previous knowledge in programming could take part of this course of JavaScript and complete it. The explanations are usually short, way too summarized and hard to comprehend. On the other hand, it offers a video explanation of all the content so you can have extra information. I do not recommend this course to anyone looking forward to start programming. Instead, Codecademy or W3Schools can be a better option. If you wish to visit Sololearn, you can click its logo.
Where to write the code?

   JavaScript code can be written in any text editor. Even basic ones, like notepad, can be used. The only requirement is that when you save the file, you write ".html" at it's end to choose the format. Other text editors can be used, depending on your preferences. If you want to be more professional, you shouldn't use notepad and instead look for a more professional program. You will probably want to create something after you have learnt the basics. I totally support people who try to code something by themselves. Nevertheless, do not let that draw your attention from learning. The best thing you could do is learn what's possible with a language and test it as you know about it. Once you know the possibilities, try coding your own program and learn even more advanced stuff.

How to debug my code?

   Often, everyone gets a mistake in their code that doesn't allow them to run the program. There are multiple ways to debug your code. If you are looking for an online debugger, you could use Python Tutor. This website lets you visualize step by step your code and spot errors. It supports Python, JavaScript, TypeScript and Ruby. Moreover, you can temporaly disable your code by using comments. This way, you can aislate parts of your code and run part of it. If it still doesn't run, you know that the bug is in the rest of the code (supposing there's only one error). Another option are "flags". If your code runs correctly, but in a moment it gets an error and stops running, you can print random text in a console every some lines so you know up to where the code is correct. Finally, some programming languages offer a debugger, allowing you to spot mistakes and act according to it.

Sources


Oct 21, 2015

Programming - JavaScript

   Programming is the process of creation of executable computer programs. Doing such requires a certain language, source codes can be written in 1 or more programming languages. Some examples are JavaScript, HTML5, PHP, Python and Ruby. The following is a brief explanation on the JavaScript Basics.

Introduction

   JavaScript is the most popular programming language in the world. It was invented in 1995 by Brendan Eich. The official name is ECMA-262. JavaScript is the programming language of HTML and the Web, it allows us to program the behavior of web pages.

Variables

   JavaScript variables are containers for storing data values. Information must be stored somewhere, that is where variables take place. To create a variable you write 'var name = value;'
Values can be numbers, strings (characters), booleans (true or false), objects (multiple values with an assigned name), strings (multiple values without a name) or simply null or undefined (when there is no information). Variables can later be 'called' to take place in another part of the code by writing it's name. For more information you can click here.

Math

   Just like almost any programming language, JavaScript allows us to do calculations. For doing so it offers us some basic arithmetic operators, like + (addition), - (substraction), * (multiplication), / (division), as well as it allows us to perform other mathematical tasks with certain methods. There is a common misconception from non-programmers: the equal ( = ) does not mean equals to, but instead it is an assignment operator. This means something will take the value after it, just like with variables. For learning more you can click here or here.

Functions

   A JavaScript function is a block of code designed to perform a particular task. A JavaScript function is executed when "something" invokes it (calls it). The syntax to define a function is 'function name(parameter1, parameter2) { code to be executed }'. The benefit of functions is that they can be invoked and used as many times as needed in the program. To invoke a function, you write the function's name followed by a parenthesis, which may include parameters divided by commas. If you wish to know more about functions, click here.

Conclusion

   Although this explanation only explains the basics of JavaScript and they would probably not be understood by somebody new into the programming world, JavaScript is indeed an easy language to learn and is of great use in today's world. If you are interested in learning more about JavaScript, I personally recommend W3Schools, which offers a full explanation on many programming languages. However, there are some other websites, such as SoloLearn, which you can use to learn programming languages and save your progress.




Sources

Oct 8, 2015

Surface Pro 4

   This year, Microsoft has released the new Surface Pro. For many years, it has been trying to convince us that tablets can replace your laptop. The new Surface Pro 4 is an hybrid between a laptop and a tablet. It has a touchscreen and a Surface Pen, a pen which you can use to interact with the Pro 4. Moreover, you can buy a Type Cover, a portable keyboard and track pad which can be joint to the Surface. The following text will give some general information about the Surface Pro 4 of Microsoft.

Design

   The Pro 4 hasn't changed its overall appearance at all compared to the Pro 3. It is slightly wider in comparison, imperceptibly lighter and slightly thinner. It has the same shape and almost the same design, so only a really good trained eye would distinguish them. It could be considered like a portable PC with Windows 10 on it. Microsoft didn't worry much on changing the design, but instead, it focused on how you actually interact with the Surface.

Type Cover and Surface Pen

   The Type Cover is a portable keyboard with a trackpad. It is probably one of the biggest improvements from the Pro 3 to the Pro 4, but sadly it still doesn't come included. The keys are now raised and separated, so the Type Cover now feels more like a computer keyboard. The trackpad is now larger and has improved a lot. Moreover, fortunately, the Pro 4's display is still a touchscreen so you can use it whenever you want.
   The Surface Pen, opposite from the Type Cover, does come included with the Pro 4. Using it now feels more smooth, as it now works with new technology, making it feel like a real pen. The big downside on it, is that like it snaps magnetically to the side of the Pro 4, it has easily come out.

Performance and Battery

   The battery last for as long as the one from the Pro 3, although they are different. However, if you put test both under same conditions, you will notice the Surface Pro 4's battery lasts around 1 hour less. It can last for as much as 6 hours and 37 minutes.
   Secondly, inside, the Pro 4 includes sixth-generation Intel Core chips. There are many versions, the most expensive versions can come with a Core i7 processor and 16 GB of RAM. There is a big difference in the performance between the Pro 3 and the Pro 4. If you are looking to replace a desktop PC, you should at least be looking forward to getting one with 8GB of RAM and a Core i5.

Sources

Oct 7, 2015

Nexus 5X and Nexus 6P

   Last year, many Nexus fans were unpleased with the Nexus 6. It was a much larger and more expensive phone than the Nexus 5 that preceded it, and there was no guarantee that if you loved the Nexus 5, you’d also love the Nexus 6. This year, Google enrolled two new Nexus phones, the Nexus 5X, the first real successor of 2013's Nexus 5, and the Nexus 6P, a larger and more expensive phone than its predecessor.

Nexus 5X

   Neither the Nexus 5 nor the 5X have a great design. They don't look like a top-tier smartphone one would like to hold and spend money on. The fact that the screen used for it is the same as in its predecessor, brings down its possible durability, as the screen of the Nexus 5 has been proven to be not very effective against hits.
   On the other hand, the 5X has some advantages. Firstly, it has a fingerprint scanner in the back, making it fast to unlock without even having to look at the phone, as it is just where the index finger falls. Nevertheless, you can't unlock it this way when it is sitting on a table. Secondly, one of the biggest updates is the new 12MP camera. It is the same camera used in the 6P and is the best one in any Nexus phone. Even in strange lightning conditions it will take great photographs, but not always.
 
   The Nexus 5X has some great downsides. The charger must be used with an adapter, and it can't be charged with a wireless charger. Although the camera can take great photographs, opening it is clumsy, as it requires pressing twice the power button, which will turn it on, then off, to simply open the camera. In addition to that, it can be slow when taking photographs.

   The Snapdragon 808 processor and the 2GB of RAM have proved to be really good, making the smartphone quite fast. However, an extra Gigabyte of RAM wouldn't be bad, as some applications may open slowly. The battery lasts for many hours, more than the Nexus 5, lasting even for a whole day of use. Fortunately, the battery only takes 1 hour to fully load. The 5X comes with Android Marshmallow 6.0, and it takes full advantage of it.

Nexus 6P

   Unlike any of the previous Nexus phones, the Nexus 6P is a premium phone. It has none of the downsides of the previous Nexus versions. It is made on aluminum and it has chamfered corners and 90-degree angles, but they don't feel rough. It has a small "bulge" on the top of the back, where Huawei, the developer, has added many features. However, nobody can criticize this bulge, as it doesn't cause any harm and doesn't ruin the appearance, but instead, it makes it recognizable. It is almost the same size of the iPhone 6S Plus.
   It only has some plastic pieces, but almost all of them are for antennas, which highly improve its wireless performance. You can turn on a RGB indicator light on the upper lefthand corner, and the screen is one of those "you will never see the pixels" screen. The 6P has adaptable light settings, which work out perfectly for controlling the brightness and colours.
   The fingerprint scanner, just like in the 5X, is on the back. It is ridicously fast, but it can be annoying when you have the phone on a table, as you can't unlock it, or when you walk with the hands in your pocket, as it might get unlocked. Opposite to this, the fact that the fingerprint scanner is just where the index falls and that it is separated from the power button, makes it great. It allows you to turn it on quickly, but also to separate the function you want, either to just see notifications or the hour, or you just want to unlock it.
   Talking about the camera, Google has managed to succesfully step up with the other companies and make a great camera. The Nexus 5X has a 12MP camera, which can take great photographs, adapt to different lightnings, take a burst shot or even take 4K videos or slow-mo videos. Speaking about the burst shot mode, it is one of the new modes of the camera, which takes 8 pictures which can later be converted into a GIF or saved if you like any. Moreover, just like the Nexus 5X, you can easily open the camera by tapping twice the power button.
   Finally, the 2GHz Qualcomm Snapdragon 810 processor, the 32GB storage and the 3GB of RAM are perfect. The phone will strangly struggle with loading anything. The battery lasts for long, it charges really fast. It has a Type-C charging cable, just like the 5X. Talking about software, it has Android Marshmallow, which feels clean and natural in this phone. Taking everything said into account, you can perfectly say the Nexus 6P is a premium phone.

Sources

iOS 9.02


    Apple has released the new iOS 9.02 for iPhones, iPad and iPod touch. It is the forth update that was released for the iOS 9 in September. It comes with a bunch of bug fixes, as Apple has been working hard since the release of iOS 9. There are some reasons why you should install it inmediately and some for which you should wait.

Advantages and Disadvantages

   Probably one of the main reasons to install it right away is the security patch for the well-known passcode flaw that was discovered some days ago. Shortly after release, as it happens with everything, the users discovered a bug which allowed them to bypass the lock screen and look for contacts and photos. iOS 9.02 has fixed many problems that were present in iOS 9. However, the problems are inevitable and if you want to be more confident before installing it, you should probably wait a few days or weeks.
   Moreover, iOS 9.02 has stopped signing iOS 8.4.1 (the last version of iOS 8) and iOS 9. This means that it is impossible to go back to previous versions of the operative system, what can be useful for the users who experience some problems with a new update. Therefore, once you have installed it, you can uninstall it nor go back to your previous operative system. This fact is a great downfall for users. There isn't much information yet about iOS 9.02's bugs, but if you have already installed it, you have to know that there is no going back.

Conclusion

   Apple's new iOS 9.02 can be a great update for those who worry about the security flaw in the system of iOS 9. However, iOS 9.02 is really new and all the bugs haven't probably been discovered yet. Therefore, it is recommendable to wait for a few days or weeks, as there is no way of going back to your previous operative system.

Sources

Phone Hardware

   The hardware of a computer are all the physical components that constitute a computer system, such as motherboard, hard disk drive, monitor, mouse, etc. Depending on whether we are talking about cellphones or computers, the hardware we can find are different. The following text is an explanation on the components of a cellphone.

Screen

   Screens are one of the main parts of any phone, smartphone or not. They display information and are the way a user can interact easily with the phone itself. On cellphones, the screens are only an output device, like a monitor. Some screens, called touchscreens, also work as input devices. They allow the user to control or interact with the system with simple or multi-touch gestures which are recognized by the device.

Battery

   It is the power source of any portable phone. Due to the absence of a wire which can support it energy, it must have a battery so it can work. All cellphones have rechargable batteries, meaning the battery can be used hundreds of times before its lifetime ends.

Keyboard

   Keyboards are one of the main input components of cellphones. Nowadays, keyboards have been replaced for virtual ones, accesible through a touchscreen. We could almost be sure that there is no production of smartphones with physical keyboards.

Memory

   Memories are a technology consisting of computer components and recording media used to retain digital data. It is a core function and fundamental component of computers and smartphones. There are also other components which store information, but they are volatile, meaning that the date is lost when you turn off the device. However, this type of storage is permanent.

Camera

   Modern cellphones now have a camera. They usually have a rear camera, but sometimes they also include a front one. Normally, the rear camera will have a higher resolution. Just like digital cameras, phones have high-resolution image sensors.


SIM card

   Subscriber Identity Module (SIM) is an integrated circuit chip that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers onmobile telephony devices. These allows you to make phonecalls or receive them. Nowadays, some modern smartphones have 2 SIM cards.

PCB

   Printed Circuit Boards (PCBs) are the equivalent of mother boards of computers. They are used in most small electronic devices. They connect electronic components of the cellphone. If the cellphone has a high-density PCB, meaning that it has all the components connected in a small surface, the phone can be thinner.

Processor

   The processor are the electronic circuitry within phones that carry out the instructions of a applications by performing the basic arithmetic, logical, control and input/output operations specified by the instructions. Actual phones have a processor of about 1.5 Ghz.

RAM

   Random-access memories are a form of computer data storage. They are volatile memories, meaning that when you turn of the phone the information is lost. They allow the information to be accessed in a short amount of time. Therefore, they are usually fast, but can not store too much data. There are 2 types of RAMs, Static and Dynamic.

Speaker

   It is the output component for sound. All phones have one, as they are essential for phone calls.

Aug 26, 2015

Pirates of Silicon Valley

   Pirates of Silicon Valley is a 1999 film directed by Martin Burke. It is based on the book "Fire in the Valley: The Making of the Personal Computer" by Paul Freiberger and Michael Swaine. It was released in June 20, 1999. It stars Noah Wyle as Steve Jobs and Anthony Hall as Bill Gates.
   The film narrates the creation of the PC's and the past of both Steve Jobs and Bill Gates, as they build the first personal computers and they fundate Apple Inc. and Microsoft. It shows us the history to know how the current technology and their main corporations were created.

Plot

   The film starts with the 1984 Apple's advertisement announcing the first Macintosh computer. It then shows Steve Jobs in a conference in which he is announcing a new deal with Microsoft in 1997. In this scene, Bill Gates is compared to the "Big Brother" from the book "1984" from George Orwell. The following scenes in the movie are flashbacks to important moments in the process of creation of both companies. Steve Wozniak, played by Joey Slotnick, is the main narrator of the whole movie. The film concentrates more on Jobs, rather than Gates, who yet is not excluded.
   The main characters are portrayed along the movie as intelligent and competitive, with the idea that they will change the world. This can be seen in one of the first scenes of the movie, set on the riots from 1971 in the University of Berkley, when Jobs says "Those guys think they're revolutionaries. They're not revolutionaries, we are.". Both characters try their best to impose over the other companies and to revolutionize the world with their personal computers. That's why we are shown throughout the movie that Jobs and Gates steal each others ideas in some occasions, allowing Bill to become superior and become one of the richest men in the world. Some downsides from both characters are shown in the movie, such as Jobs, who in a scene is seen criticizing angrily his programmers who fall asleep after having been working for 50 hours straight. On the other hand, Bill Gates is portrayed as somebody with no creativity nor conscience who succeeds through theft.
   The movie ends with Jobs reconciliation with his daughter Lisa, who he didn't recognize as his in a first instance. Moreover, Steve returns to Apple and is shown in the MacWorldExpo from 1997 with Bill Gates' appearance.

Opinion

I believe this movie has managed to show the long competence between the companies in an extraordinary way, by showing not only the moments in which they create personal computers but also by portraying Jobs' and Gates' personalities in a way nobody would expect. Additionally, the film shows us things that probably not many knew about their history, such as theft, Jobs lost of friends, persistance and their beginnings. However, I think that the movie could have been more interesting and funner if the scenes of the beginning had been a little more fast moving, and the director had emphasized less on Steve Jobs and had balanced the plot by showing more about Gates. Nonetheless, Pirates of Silicon Valley is very interesting and I recommend it only to those keen on the computer industry.
 
If you would like more information, you can visit the following links: IMDB, Macworld, Wikipedia, Apple's First Macintosh Commercial.

Sources

IFTTT

   IFTTT is a web-based service that allows users to create chains of simple conditional statements. It is an abreviation of "If This Then That". They are triggered on one website, and have a result in another website. This allows users to obtain a result on a website different from the one they are using in the moment. An example are the e-mails sent to administrators when somebody wants to post a comment in a blog and there's comment moderation. It allows the automatization of actions due to its simplicity and unification of operations.
   For the correct working of IFTTT you need a recipe, which is a simple connection between products and applications. There are two types of recipes: IF recipes and DO recipes.
   IF recipes run automatically in the background by using a statement "If this happens, then do this". Therefore, a simple action has to happen in order to it be triggered. On the other hand, DO recipes will only work when the user explicitly orders a product or an application to do something, by pressing a button. For example, a button could be pressed while viewing an photo album for it to be uploaded instantly to a Facebook album.
   Recipes work with a huge amount of channels, which includes Location, Camera, Weather, Notifications, Facebook, Tumblr, Blogger, eBay, Spotify, YouTube and many e-mail platforms. However, this is just a small fraction of the total, as there are over 80 different channels.
   IF and DO recipes are available in many smart devices. To install one you have to download it from the website ifttt.com. However, you must first sign up.

   If you are looking forward to knowing more about IFTTT, you can visit one of the following links: IFTTT, Wikipedia.

Sources

Aug 12, 2015

Social Engineering

Social Engineering, in the context of information security, is the phychological manipulation of people in order to get them to perform certain actions or divulge confidential information. Hackers take advantage of this to obtain personal information or to distribute malware. There are multiple techniques, they are all based on known attributes of the human thinking, known as cognitive biases. This are exploited in different combinations to steal information in various attack techniques. The main ones are the following.

Pretexting

This technique consists in inventing a scenario which has the chance that the victim will divulge the information. This often needs a setup, consisting in creating the pretext and gathering information so that it is believable and it establishes legitimacy in the mind of the target. That's why, those who use this technique must imagine questions that could be asked to them, and elaborate the lie enough so it succeeds.

Phishing

Phising is the technique in which somebody impersonates an authority in order to obtain the confidential information. Typically, the phisher sends an e-mail to a victim asking for information. Due to the fact that the e-mails sent look legitimate and from an authority, the target will provide it. It can also be done through a phone call, in which case, it is called IVR phishing. In this situations, a system calls and recreates a legitimate-sounding phone call of an institution and insitates the victim to call back. When this is done, they are asked for the information. In both cases, people are warned that if they don't follow the instructions, something will happen.

Baiting

Baiting is a technique which consists in taking advantage from human's greed, curiosity or benevolence. The attacker leaves a labelled device in a public place. Somebody will find it and, in order to satisfy their curiosity, they will connect it to a computer, thus releasing the malware, unless the computer blocks the infection. In other cases, the person will give it to an authority, who will possibly also connect it to a computer or device.

For further information, you can click one of the following links: Social Engineering (2), Hackers, Hacker Types.

Sources

Hacker Types

   Hackers are people who seek and exploit weaknesses in a computer system or computer network. The reason why they do this varies, it may be for a profit, joy, as a part of a challenge, to protest or as a job. According to their knowledge and objective, we can classify them in the following way.

Black Hat Hackers

   They are the computer criminals, the "bad guys". They violate security for little reason beyond maliciousness or for personal gain. They form the known stereotype, often portrayed by the community. They often look for the most vulnerable part of a code, exploit
it and gain access to a system. Moreover, they also design viruses for computers. They have a wide knowledge of computing and their main motivation is money. They receive this name because in old films, this kind of hackers would wear black hats. Sometimes they are also called Crackers.

White Hat Hackers

   This kind of hackers would often be considered the "good guys". They usually begin as Black Hats. Sometimes, they hack into a company's system and then end up being hired by it, to inform about vulnerable points in the system, in order to reinforce it and avoid any future security breaches. Banks have a bigger amount of hired White Hat Hackers, because a small bug in their system could be enough to cause huge consequences. Their job is to stop Black Hat Hackers from succeeding.

Grey Hat Hackers

   Grey Hat Hackers are the ones that are in the middle between White Hats and Black Hats. Their actions may be malicious and benevolent at the same time. They have as much knowledge as a Black Hat and, usually, this kind of hackers are people who are just starting.

Crackers

   They are included in the group of Black Hat Hackers. They are the ones who vulnerate a system and find the way to make copies of it, and offer them publicly. In other words, they make illegal copies of propietary software and distribute it freely. For example, they distribute a version of an OS or a programme. Due to the fact they allow anyone to get the cracked version, they are not making any business out of this. Therefore, the income they are getting is through publicity or advertisements. They tend to identify themselves with a nickname, and use reverse engineering to successfully hack software.

Script Kiddies

   Script Kiddies are the hackers that only have some basic knowledge. They use programmes written by others to vulnerate systems, and if they succeed, they strangely know what is going on behind the screen. They know a few things about programming but not too much, usually they will follow a tutorial they find on the internet.

Newbies

   Newbies are those who have just started hacking, they strangely succeed and if they do, they don't understand what they have done. They know just the basic of programming, they are inoffensive and they are looking for more information about hacking. In many cases, they boast about having hacked and become a Lammer, but in other cases, they look for further knowledge and become a hacker.

Lammers

   This kind of "hackers" aren't actually hackers. They are just people who say they are hackers, boast about having been able to vulnerate a piece of software following a tutorial and have no knowledge at all about programming. They are way too far from being a hacker, as they miss the knowledge and also, if they were hackers, they wouldn't be saying it publicly.

For further information, you can click on one of the following links: Hacker, Hacker Hat Colors, Hacker Types (spanish).

Sources

Jul 15, 2015

Cellphone Operative Systems

All along the years, many companies have developed operating systems (OS) which instead of being for computers, they were made for cellphones. The next text is a brief explanation of the main aspects of them.

Symbian

It was the first operating system developed for cellphones. It was programmed on Java, by Symbian Ltc. It was launched to public in 1998. The fact that it allowed creating your own Java applications and run them successfully on the OS made it famous quickly. We could consider it the grandfather of all cellphone OS. It is open-source. The license for publishing applications for this OS is completely free. However, it was discontinued in 2012. Therefore, it is no longer posible to publish applications for it. It is considered to be an OS for developers and common users. There were 12 versions of it, ending in Symbian OS 10.1.

Android

Android is an OS based on Linux Kernel currently developed by Google. The first version was released in 2007. It is open-source, it is developed in secret by Google and then released publicly in versions allowing modifications and redistribution. However, the license doesn't grant rights to the "Android" trademark. Therefore, device manufacturers must get an individual license from Google. There were a total of 11 versions, some having updates. They are named after food.

It is considered to be for developers, businessmen and common users. To publish an application on the store for Android, you must pay 19.22€ for the license, which lasts a lifetime. The validation process takes around 5 to 30 minutes. According to some surveys, for the end of 2013, Android occupied 78% of the market.

IOS

It is a mobile OS developed by Apple Inc., exclusively for Apple products. It was first released in 2007 and since then there have been a lot of versions released, because it is not only for cellphones but for other devices too. It is closed-source. Apple Inc. considers it is for professionals and common users. In order to publish an application on the store for iOS, you need to pay 80€ every year, and you must wait 1 week in average for it to be validated. The validation process is long and very strict. According to some surveys, in 2012 it covered the 21% of the smartphone mobile operating system units.

Windows Phone

Windows Phone is an OS developed by Microsoft. It was released in 2010 and there are a total of 4 versions, with not more than 2 updates each. It should be friendly for people who know how to use Windows 8 for PCs due to its similar interface. It is supposed to be for developers and common users. It is closed-source. If you want to publish an application in its store, you must pay 80€ anually. The fact that both, iOS and Windows Phone, have this price for applications, gave Android a huge advantage. Moreover, the validation process is very strict and it takes from 1 to 2 weeks.


BlackBerry OS

It is an operating system developed by BlackBerry Ltd. for its BlackBerry smartphones. It is closed-source, it was released in 2000. There have been 7 versions. It is an operating system for professional, business and common use. The license to publish applications in its store is free. However, the validation process is long and very strict, lasting from 1 to 3 weeks. You need a special phone service, as BlackBerry Ltd. works in conjunction with the phone companies. It is estimated that it covers only 2% of the market.

Firefox OS

It is an open-source OS based on Linux Kernel. The developer is Mozilla. It was released in 2013. It is supposed to be for developers, users with low resources, amateurs and common users. It hasn't been developed too much, and it is unknown how many users own a device with Firefox OS. There are only Firefox OS 1 and Firefox OS 2, but with many updates each. Although the validation process for uploading applications is slow, there are no restrictions. Furthermore, the license to publish the applications in the store is free. The browser used in cellphones with Firefox OS should be Mozilla Firefox.

Tizen OS

Tizen is an operating system developed by Linux Foundation and it has the support from Intel, Samsung and Limo. It was launched to public in 2012, and there are 3 versions in total. It is easy to programme applications for this OS. The licenses to publish applications is free and the validation process is flexible. The OS is open-source and it is meant to be for developers and common users. As well as many other operating systems, it is based on Linux Kernel. It targets a wide variety of devices, such as smartphones, smart TVs, PCs and even smart home appliances like a washing machine.

Ubuntu Phone

Ubuntu Touch, also known as Ubuntu Phone is the mobile version of Ubuntu for PCs. It is developed by Canonical UK Ltd and the Ubuntu Community. It is for devices with a touchscreen, like smartphones and tablets. It was originally developed for the Nexus 4, 5 and 6. It tries to be as similar as possible to the Ubuntu for computers. The licenses to upload applications into the store and the validation process is completely free and with no restrictions. Therefore, they are uploaded in seconds. The OS is open-source. There's only one version, Ubuntu OS, released in 2013. It is supposed to be for developers and common users.

Brew MP


It is an operating system developed by Qualcomm. It is for normal cellphones, not smartphones. There are 2 versions, B.R.E.W. and Brew MP. It is open-source. The licenses to upload applications into the store is free, and the duration of the process of validation depends on the region. Brew MP. was released in 2010. It is mainly for common users.

For further information, you can click in one of the following links: Ubuntu Phone, Brew, Tizen (2), Firefox OS, BlackBerry OS, Windows Phone (2), iOS (2), Android (2), Symbian. operating system, software licenses, mobile operative systems (spanish).

Sources