top of page

Makaila Miller

Writer: CyberAcademyCyberAcademy

I learned a lot about hardware. The main content in the computer is the mother board. The ram stands for random access memory. The ram is like a school bus. The ram takes the ram to the north or south bridge to the CPU. The CPU stands for central processes unit. The CPU processes it and sends it to the processer. The USB port stands universal serial bus. The Ethernet is the flow of the network. The ZIF- socket stands for zero input force. Zga stands for land grid a ray. The more pins you have the more power you get. The cord is mostly a calculator for the code word. The word STA is expansion card slot. PSU stands for power supply unit. ATX port look like honey comb. But the most thing you want to know is that when your wiring computers DO NOT wear any type of jewelry, hoodies, or long hair it might get you electrocuted or get lit on fire. It will damage the computer terribly. There are many jobs in I.T. I also learned about lots of the students here. Mr. Woo was talking about the phones and how they relate to I.T. When viruses come on your phone are most likely from hackers.

I learned a lot about hacking today. I learn about what type of hackers. There are three of hacking such as black hat hackers, grey hat hackers, white hat hackers. I also learned about pentation it means that someone pays you to hack them and act like a black hat hackers. I lean many website that help me get good passwords or see if your WIFI got hack. I think social engineering would be the job that I major with.

Today we had a speaker that taught us about social engineering. Social enigeering is the art of social hacking. It is also manipulating people into doing something rather than by breaking in technical means. There are different types of social engineering. The first one is is Quid Pro Quo is something for something. Phishing is a fraudulent webpage. Spear phishing is going for one person. Baiting is when you use physical media. Pretexting is building up a story to influence people to give you info.You can manipulate people to trust you. Attackers might seem nice. Attackers also rises human interaction to obtain or comprises info. Attackers might appear unassuming or respectful. There is also a book about a hacker that went to jail. His name is kevin miric. He talked his way into a a central office. He also talked his way into getting free food from from mcdonalds. Criminal go for the weakest people. Geotag and location is a base social network. When you post pic online that can let hackers no more about you and where you live. Windows is a operation system. Window os features is Areo, sidebar, window xp, pinning, side by side apps, charms , windows defence, bit locker, one drive. There is also mac mission, keychain, spotlight, icloud, finder, dock, bootcamp, screen sharing disk utility. There is also linux it has linux workspace, operation system. And fun fact back then people got internet conection by doing dial up and people would hate the sound it made.

I learned about social engineering yesterday. We learned internet safety. not to share password or important information. I also learned about a virus. Its name is zero day. And I think that social engineering is the subject that I want to focus on.

Recent Posts

See All

Zariah Cooper

Reflection Day 1 Today I learned Trouble Shooting Theory, Safety Rules, and Windows, Mac, and Linux Features and Tools. In Trouble...

Warrick DeGroft

Computer software is pretty cool, and I’m glad I learned a lot of these things. I don’t think I’ll work in computer software ever, but...

Tobias Matthews

I learned a lot of stuff like about people who make computers. Also how computers work I was surprised how big a mother board is. Today...

Comments


RFK Solutionz
 3500 Tejo Ln.
Chesapeake, Va. 23321

© 2018 by RFKCYBERACADEMY. Proudly created with wix.com

bottom of page