Arduino

Arduino is a programmable open source hardware and software interface, it allows free access to a certain type of files. It is based on programming language such as type « C ». For programming, the « JAVA’s » language is used.

The arduino card can be used to program various objects, such as alarms, oscilloscopes and everyday objects. Arduino shields can be used to extend the map’s features, such as a GPS, or WI-FI and protect the Arduino card.

deeded

Arduino Card

 

Shield

 

 

Enzo et Xavier

How to secure your Wifi network?


How to secure your Wifi network?

Here are the 5 points to secure Wi-Fi that I will detail later:

  1. Encrypt your Wi-Fi network

2. Change the default password of the box

3. Update the box

4. Make MAC filtering

5. Change the network name

 

  1. Encrypt your Wi-Fi network

We have seen that with a Wi-Fi network, any data sent or received can be intercepted by anyone with the necessary tools. Network sniffers are used to read the plaintext contents of messages that pass through. These messages can be passwords and other confidential informations.

2. Change the default password of the box

If you need to give a username and password to enter the control panel (at Free you must first login via your subscriber account), check to have chosen a complicated password and especially not the default one. Some ISPs may send the default password by email or mail.

It is a password that must be changed like any other default password. Some access credentials to modem administration are sometimes extremely obvious and known to all. Indeed, some sites list the default credentials of most providers.

3. Update your box

Access providers may provide software updates. These are updates that may be related to modem security. They are therefore to be taken seriously and to be done as soon as possible. For recent modems, updates should be automatic.

4. Make MAC filtering

A Mac address is an address stored in a network adapter that is unique to the world. Mac address filtering is therefore to tell your modem that only people whose network card contains the Mac address in question are allowed to connect.

There are advantages and disadvantages: Security is assured in the sense that you decide who is accessing the network for good, but you will need to add Mac addresses each time you change network cards or add devices to the Wi-Fi network.

5. Change the network name

While this only plays a small role in the security of the Wi-Fi network itself, changing the default network name (SSID) is a way to tell potential hackers that you take your security seriously. There is less chance of attacking someone who seems to know about a person who appears to be new to a default network name.

Mathias

 

 

Weld optical fibers together

Before starting you need to check a few steps.

  • Step 1 : The welder’s battery need to be charged at +20% & the working surface and the tools must be clean. Prepare the optical fiber.
  • Step 2 :  Denude the white sheath of the optical cable.

-Cut the Kevlar.

  • Step 3 : Remove the jacket on 15 cm.

  • Step 4 : Clean all the optical fibers with an alcohol wipe.

The cable contains 4 fibers. Select just one fiber.

  • Step 5 : Put a thermo-retractable sleeve named « smoove », uniquely on one fiber to weld.

 

  • Step 6 : Remove the buffer on 3 cm.

 

  • Step 7 : Clean the optical fiber with an alcohol wipe.

 

  • Step 8 : Cut very cleanly the end of the optical fiber with the cleaver.

Joining by fusion the optical fibers.

  • Step 9 : Put the two fibers in the welder, the « smoove » staying at the outside.

 

  • Step 10 : Preview the welder’s screen.

 

  • Step 11 : Wait the end of the tension test, then raise the welder’s protective cover.

 

  • Step 12 : Remove the welded fiber and slide the « smoove ».

 

  • Final step : Put the fiber in the oven, to the back of the welder. After doing that, the fiber can cool on the support located on the welder’s handle.

 

Albane & Enzo.

Phishing, what is it?

It can be unsolicited advertising, which is also called « spam ».It can also be attempts to scam emails or text messages. In this case their author will try to recover money by various means or incite you to open a file containing a computer virus.

How to avoid and identify this type of scam? 

The most common practices are referred to as « scam » or « phishing ». A stranger sends you an email to offer you to act as an intermediary against remuneration for a financial transaction or to recover your winnings from a lottery or to contact him to collect an inheritance. You are asked to provide your contact information then you will be asked to pay any fees without you getting anything back. If you have received spam on your email or if the message appears to be a phishing attempt, do not reply and do not open the attachments!

Lorenzo

Put Windows 7 in network with XP and Vista

  • Check the workgroup

To be in network, the computers (XP, vista, windows 7) need to be in the same workgroup.

  • Activate the sharing

Check that the options below are activated.

  • To share a folder:

You can easily share the files and the folders between several computers of your network even if they run Windows XP or Vista.

Select the concerned users for the sharing and choose the authorization level accorded to the users.

Albane & Enzo

HOLDALL BOX

My group is on the project of a box whose name is the « Boîte à fourre-tout ». In my group we are 5: Tommy, Joris, Julien, Mohamed-Amine and me Camille.

This locking box would be used to put some objects away. There will be a bluetooth padlock.

This padlock will be opened thanks to a smartphone application. The objects will be safely stored and nobody will manage to open it except you.

It is a simple object but it can be very useful.

You can buy this box on the Christmas market at the SEPR and on the Open Days.

This type of product can be used by all because it is very easy to use, even for children !

Camille

Chronology of Operating Systems (OS)

Résultat de recherche d'images pour "système d exploitation"1950s

1951 : LEO I (Lyons Electronic Office) 1, the commercial development of the EDSAC computer, supported by the British firm J. Lyons and Co.

1954 : The MIT operating system for UNIVAC 11032

1955 : The General Motors operating system for the IBM (= International Business Machines) 7013

1956 : GM-NAA I / O for the IBM 704, this system was based on the General Motors operating system for the IBM 701

1957 : Atlas Supervisor (Manchester University)
BESYS (Bell Labs), for the IBM 7090 and IBM 7094

1958 : University of Michigan Executive System (UMES), for IBM 704, 709, and 7090

1959 : SHARE Operating System (SOS), based on GM-NAA I / O

1960s

1961 : CTSS
1962 : GCOS
1964 : EXEC 8, OS / 360 (announced), TOPS-10
1965 : Multics (announced), OS / 360 (available), Tape Operating System (TOS)
1966 : DOS / 360 (IBM), MS / 8
1967ACP (IBM), CP / CMS, ITS, WAITS
1969 : TENEX, Unix

1970s

1970DOS / BATCH 11 (PDP-11)
1971OS / 8
1972 : MFT, MVT, RDOS, SVS, VM / CMS
1973Alto OS, RSX-11D, RT-11, VME
1974MVS (MVS / XA)
1976 : CP / M, TOPS-20
1978 : Apple DOS 3.1 (first Apple OS), Tripos, VMS, Lisp machine (CADR)
1979 : POS

1980s

1980 : IBM S / 38, OS-9, QDOS, SOS, XDE (Tajo) (Xerox Development Environment), Xenix nineteen eighty one, MS-DOS
1982SunOS (1.0), Ultrix
1983 : Lisa OS, Coherent, ProDOS
1984 : AMSDOS, Macintosh OS (System 1.0), QNX, Únicos
1985 : AmigaOS, Atari TOS, MIPS OS, Microsoft Windows 1.0 (first Windows)
1986 : AIX, GS-OS, HP-UX
1987 : Arthur, IRIX (3.0 is the first SGI version), Minix, OS / 2 (1.0), Microsoft Windows 2.0
1988A / UX (Apple Computer), LynxOS, MVS / ESA, OS / 400
1989 : NeXTSTEP (1.0),  RISC OS, SCO Unix (release 3)

1990’s

1990 : AmigaOS 2.0, BeOS (v1), OSF / 1
1991 : Linux 0.01
1992 : 386BSD 0.1, AmigaOS 3.0, Solaris (2.0 is the first to not be called SunOS), Windows 3.1
1993 : Plan 9 (First Edition), FreeBSD, NetBSD, Windows NT 3.1 (first version of NT)
1993 : Linux 1.0
1995 : Digital Unix (aka Tru64), OpenBSD, OS / 390, Windows 95, Linux 1.2
1996 : Windows NT 4.0, Linux 2.0
1997 : Inferno, Mac OS 7.6 (first officially named Mac OS version), SkyOS
1998 : Windows 98
1999 : AROS (Boot for the first time in Stand Alone version), Mac OS 8

2000s

2000 : AtheOS, Mac OS 9, MorphOS, Windows 2000, Windows Me (Millennium Edition)
2001 : Linux 2.4, AmigaOS 4.0 (May 2001), Mac OS X 10.0 Cheetah (Cheetah) in March, Mac OS X 10.1 Puma, in September, Windows XP, Z / OS
2002 : syllable, Mac OS X 10.2 Jaguar
2003 : Mac OS X 10.3 Panther, Windows Server 2003, Linux 2.6
2005 : Mac OS X 10.4 Tiger

2007 : Windows Vista, Mac OS X 10.5 Leopard

2009 : Windows 7, Mac OS X 10.6 Snow Leopard

Years 2010

2011 : Linux 3.0, Mac OS X 10.7 Lion
2012 : OS X 10.8 Mountain Lion (renamed « Mac OS X » to « OS X »), Windows 8 (released October 26, 2012)
2013 : OS X 10.9 Mavericks
2014 : AmigaOS 4.1 Final Edition, OS X 10.10 Yosemite, RedHat 7
2015 : Windows 10 (since July 29, 2015), Mac OS X 10.11 El Capitan
2016 : Windows Server 2016, MacOS Sierra 10.12

Brandon

The Babiol Chest

The Babiol Chest is a box where we can store every object. It is an hexagonal wooden box which contains a motion detector.

Here are two copies: one in natural wood finished and another one in painted coulour. Here is an electronic card which controls movement, it opens the door when an object reaches it field of vision.

The Babiol Chest is designed for a very wide audience. You will find it during the « Open days of the SEPR »

Benoît

How does a Switch function?

The SWITCH

  1. The routing switch draws up and updates a table of MAC addresses, indicating on which ports to direct the intended screens for a given MAC address.
  2. MAC physical adresses are stored in map network or an interface network similar to the machines. All the machines have a different MAC address.
  3. A switch, also called network switch, is a endowed with several ports, mainly four. Ethernet serves to connect several cables or fibers in a computer network.
  4. This is what a Switch looks like :

Julien

Measuring device

Measuring devices serve to make different tests on components or machines.

There are a many measuring devices :

  • first : The multimeter is the universal measuring device for electrical trades. It can check the ( volt -> V ) alternating tension and direct current. It can also test the resistor ( ohms -> ? ) and the intensity too ( ampere -> A )

 

  • second : An absence of tension tester is useful to know if there is a presence of voltage in a circuit. It is mainly used by electricians because it’s a practical device. To perform a voltage check, insert probe tips in a power outlet or electrical panel (in a breaker circuit).

 

  • third : The oscilloscope allows to visualize the frequency of an electrical signal. To visualize  a signal on a good scale, it is necessary to take into account several characteristics.

 

multimeter

 

VAT

 

oscillo

 

Enzo et Xavier

buy windows 11 pro test ediyorum