12  Activities

Activity: Investigating your home network

By signing in and enrolling on this course you can view and complete all activities within the course, track your progress in My OpenLearn Create. and when you have completed a course, you can download and print a free Statement of Participation - which you can use to demonstrate your learning.

Activity: Network devices and protocols – Packet Tracer

We connect our devices to the Internet and the Internet connects them all together. But what is the Internet made of? We say it interconnects all the devices, but how?

Network devices are mainly hubs, switches or routers. There are lots of other specialist bits, but the bulk of the interconnectivity is done by switches and routers. In this course you have looked at client server models, web requests and emails. What do these messages look like and how are they sent?

For each type of communication over the network there are a set of rules and specifications as to what format and order the information is sent. These are called protocols and they are fundamental in understanding how the Internet works.

This Packet Tracer lab explores the devices and protocols used in computer networks. You will need:

Activity: Password hints

Companies do not store a user’s passwords in clear text – they send it through a scrambling algorithm to produce a 'hash', and the hash is then saved. The hash algorithm does not work in reverse, so you can't unscramble a hash to get the original password. When you enter your password the site uses the same algorithm to make a hash, which it then compares to the hash saved against your details.

Some sites allow you to store password hints, and they save these as clear text. Adobe was hacked in 2013, and its hashed passwords and hints were stolen for thousands of customers. The hackers looked at all the hints that gave the same hash (hence were the same password). Because they had lots of hints for the same password it was easy to guess what they were.

Can you guess the passwords used in this puzzle based on the stolen hints?