Final Portfolio
Throughout the first semester of ISR, I have been through tremendous growth as a student and have learned countless things that I never believed I would learn in my high school years. This portfolio highlights the countless things learned as a class, and as an individual.
We began the beginning of the year going through a tour of the ELAB which allowed the new kids to ISR to discover all of the world class tools we have in our grasp. Here we started to formulate ideas for where we wanted to put our attention. After some days, we briefly touched on meters and batteries and learned the uses for testing charges with a meter. We tested the volts of Dr. Bill's car following this lesson.
Following this, we created Ethernet Cables in which we got to take home. I still use mine on a daily basis with my PC and it runs faster than my previous, cheaply made, Ethernet Cable. This prompted some of the boys in our class to start working on the repairing of technology, where as: Zeke, Khoi, Ben, and I began learning KaliLinux and how to work in the terminal.
As we learned basic commands, we grew into understanding how to do a lot more than we thought. Within a short period of time, we were learning to plant secret folders in each other's computers, modify documents, and shut down each other. After we began to get a grip, we had a day where we swapped with the girls to learn about earthquakes, outlined below:
We collaborated with the quake girls and observed their recent studies. They explained to us how to read the charts from the seismograph. We experimented tapping and clapping near the seismograph which caused small spikes to tell us the waves and how big they were. Talked about CO2 monitors and how we need a certain level to be covid safe. On the contrary, in the following class, the girls joined us and learned about programming and we explained the basic commands to use in our terminals. Zeke and I explained to Ava simple file management and tried to give her a basic idea on the commands that can be useful to people in their everyday lives. She even experimented by putting a normal file and invisible file on Ben's computer. Us teaching her also helped our whole group brush up on basic commands we may not have experimented with in awhile.
Following that, we continued to work through our 30 Days Of Raspberry Pi booklet, but took a day break to look into IFTTT.
This photo was captured as Zeke, Edoardo, and I began to enter the first project we signed up for which was IFTTT. IFTTT is a program that makes it easy to connect all sorts of apps and softwares. It stands for “If this then that, which basically triggers a sequence of events that autonomously happen connecting you to a different server or app. To me, this is very useful for the simplicity and organization of my life and I’m glad we got the opportunity to learn about it. There are often times in which I struggle with managing all of the information I have amongst multiple apps and having to copy and paste different information among different apps is tiresome. You can enable a function that sends another function to another app or device which is something that can be so useful in saving time. I created my first simple function that had to do with Youtube and music to start. Often I find myself enjoying music in Youtube Videos, but sometimes the names are not in the description of the video, the Applet I discovered makes it easy for me to transfer a track I hear from Youtube instantly into Spotify by simply just liking the video. Although it is a simple, yet useful command, I think that there is a world of possibility when using IFTTT.
IFTTT is something I think has a lot of potential for the age we live in and I am interested in learning mor about similar programs in the second semester.
Here are some photos of the Cyber Security PDF, my notes for this module 2 of cybersecurity will be listed below:
Module 2
-
VM is an environment, a program or operating system that does not technically exist but is created within another environment
-
Running computer within computer
-
Physical machine: Memory, Ethernet, Ram
-
Snapshot, travel back or forward in virtual machine time
-
Multiple VM’s can live on a one physical machine
-
Less than buying multiple machines
Disadvantages
-
Purpose of machine known
-
How many users it will need to accommodate for (now and in the future)
-
Types of commands now and future that will be placed on the machine
-
vmware.com/products/player/
25 Security Dos Firewall
-
Internet was created with the idea that there are no bad guys
-
IP was found to be a exploited feature that made it possible to gain control of a device or server
-
Attacks can be facilitated by diverting traffic to malicious nodes these include black holes and eavesdropping
-
Work on cyber security stuff some more to set myself up to start a project for after christmas break
I finished off the year helping Edoardo with his drone mapping project that would allow him to map ski courses and help aid him in his performance in races, having prior knowledge of the course.
Overall, it was a great and enjoyable experience being in this class and learning all of the things that you don’t learn in your standard classes in high school. Next semester, I hope to really dive deep into cybersecurity to give me a head start on possible job opportunities in my near future.