Monday, November 27, 2017

Make Up Ex.

Author's Name: DANGUISE ZULAUF
_________________________________________________________________________________

In this part of the Make Up, I will be writing about Audacity, which is the tool that we used this Term and the last one to edit all our audio tracks. We needed  to edit everything in this tool and then uploaded to SoundCloud, then we copy the link and paste it in our Blogger so that it can be listen. What we did all this time in Audacity was, record audio tracks, then edit everything so that it sound perfect and then add music and silences, it was very difficult for some of us, but for others it was easy.
























3rd Term: Make Up




Friday, November 24, 2017

Deliver and Debrief

Author's names: Vivian Bethke, Candela Echeverria, Agustin Ramirez Calvo and Agustin Danguise

Wednesday, November 22, 2017

deliver and debrief

Deliver %2F Debrief.jpg

Author's names: Moron, Caffarelli, Gutierrez and Holze
___________________________________________________________________

In the first post about Crypto (short for Cryptography)we talked about a game that had some clues, this clues were ciphered with different methods of Cryptography. To describe how we got to solve them and learn the different methods we made a video and an audio, besides this post. This post is to help you with basics concepts so you can understand better the video and audio. The audio was made with a program called "Audacity". Audacity is an audio editor, and for the video we used VSDC, a video editor. In the video you'll see some basic explanations so you can understand how we got to the solutions.







There are different methods to cipher a message, the most known are: Caesar Cipher, Polyalphabetic Cipher and Visual Telegraphs. Our personal favorite is the Visual Telegraph, because it uses numbers to encrypt the messages and is the most original one, at least that's what we think. 
Cryptography is an excellent way to send secret messages when you don't want that the whole world knows what you want to say so we think it's great, although they should be a webpage for "Crypto-fans" so we could post our ideas of new methods or exercise with old encrypted messages like the ones from wars, because the golden age of Cryptography was when the wars began so the armies could let their members know their plans without the enemies knowing. 




We had some trouble doing this video but if you want to see a little of our process here it is:

















Wednesday, November 15, 2017