<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.24pin.tech/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Agrace</id>
	<title>24PinTech Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.24pin.tech/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Agrace"/>
	<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/view/Special:Contributions/Agrace"/>
	<updated>2026-05-08T14:08:22Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Category:Cyber_Security&amp;diff=1767</id>
		<title>Category:Cyber Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Category:Cyber_Security&amp;diff=1767"/>
		<updated>2022-05-03T18:05:56Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== This category covers over all the pages that involve Cyber Security. ====&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Security_Policy&amp;diff=1766</id>
		<title>Security Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Security_Policy&amp;diff=1766"/>
		<updated>2022-05-03T18:03:57Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Cyber Security]]&lt;br /&gt;
= Group Policy =&lt;br /&gt;
&lt;br /&gt;
Security Policy is done within [[Group Policy]]. If you are unsure what [[Group Policy]] is, or what it does, etc., visit the [[Group Policy]] page or the page on our domain: [[CISCOACA.local]] for more information.&lt;br /&gt;
&lt;br /&gt;
= Global Security Policy =&lt;br /&gt;
&lt;br /&gt;
Our Global security policy is located in the Group Policy Objects folder, and is named Security Policy. All of the configurations made by this are too long to list, but they are all located in &amp;lt;code&amp;gt;Computer Configuration/Policies/Windows Settings/Security Settings&amp;lt;/code&amp;gt; within the object.&lt;br /&gt;
&lt;br /&gt;
== Default Domain Controllers Policy ==&lt;br /&gt;
&lt;br /&gt;
This policy controls the administration of the domain controllers. It has some security settings configured to disallow the Service Admins from accessing them.&lt;br /&gt;
&lt;br /&gt;
These configuration items are located in: &amp;lt;code&amp;gt;Computer Configuration/Policies/Windows Settings/Security Settings/Local Policies/User Rights Assignment&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The configurations that stop Service Admins from accessing the servers are: Deny access to this computer from the network, deny log on locally, Deny log on through Remote Desktop Services.&lt;br /&gt;
&lt;br /&gt;
=== Service Admins ===&lt;br /&gt;
&lt;br /&gt;
This is a group that is within the Users folder in our active directory. It is used to define users that should have admin rights, but should not have access the the servers. Users put in this group also should be in the Domain Admins group.&lt;br /&gt;
&lt;br /&gt;
==== Install ====&lt;br /&gt;
&lt;br /&gt;
The install account is the one that we currently use for our service account, and should currently be the only one in the Service Admins group. The install account is located in the Admins folder in CiscoAcademy.&lt;br /&gt;
&lt;br /&gt;
= Local Security Policy =&lt;br /&gt;
&lt;br /&gt;
Locally on all of the servers, I have edited their settings to require auditing, this is done on the GPO security policy as well, but just in case some settings do not configure properly it will always audit what is happening to the server.&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1765</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1765"/>
		<updated>2022-05-03T18:01:29Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Cyber Security]]&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pasted into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
====Step-by-Step Scripted Server Hardening====&lt;br /&gt;
&lt;br /&gt;
#Open an Elevated PowerShell instance.&lt;br /&gt;
#If this is a first time instillation, use the following commands to install vital modules&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
###If unable to install required modules, use the command: &amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
#Copy and Paste the script into the Elevated PowerShell instance and press enter, after a brief delay, you should see the path that the .MOF was saved to.&lt;br /&gt;
#Use the command &amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt; and use the path that was given to you in place of the path used in the example, and press enter.&lt;br /&gt;
#The .MOF should now be running, wait for the timer to finish, and it should be opperational.&lt;br /&gt;
&lt;br /&gt;
==Linux==&lt;br /&gt;
Hasn't been publicly documented due to security concerns.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://docs.google.com/document/d/1GyCaeNv9F3taE8jpmVNqJ8JlcXy79q_S8GATVvzKFUE/edit?usp=sharing &amp;lt;nowiki&amp;gt;[1]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Suricata&amp;diff=1758</id>
		<title>Suricata</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Suricata&amp;diff=1758"/>
		<updated>2022-05-03T16:53:50Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Cyber Security]]&lt;br /&gt;
Suricata&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=CyberPatriot&amp;diff=1756</id>
		<title>CyberPatriot</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=CyberPatriot&amp;diff=1756"/>
		<updated>2022-05-03T16:51:17Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Cyber Security]]&lt;br /&gt;
''This page is a work in progress.''&lt;br /&gt;
&lt;br /&gt;
==What is CyberPatriot?==&lt;br /&gt;
&lt;br /&gt;
======'''&amp;lt;u&amp;gt;Basic Information&amp;lt;/u&amp;gt;'''======&lt;br /&gt;
- Established by the [https://www.afa.org/ Air Force Association (AFA)], [https://www.uscyberpatriot.org/ CyberPatriot] or the National Youth Cyber Defense Competition, is part of the National Youth Cyber Education Program, a program designed to inspire students from levels K-12 towards a career in cybersecurity. CyberPatriot, the nation's largest cyber defense competition, places high school and middle school students in Windows and Linux based environments, tasking these students with securing a virtual machine. All scenarios are designed to replicate real life threats, providing students with the training necessary to secure not only virtual machines, but physical hardware as well.&lt;br /&gt;
&lt;br /&gt;
======'''&amp;lt;u&amp;gt;CyberPatriot Competition&amp;lt;/u&amp;gt;'''======&lt;br /&gt;
- The CyberPatriot competition is composed of several rounds. Each of these rounds consists of several tasks, in which teams will partake in two challenges in earn points:&lt;br /&gt;
&lt;br /&gt;
*Network Security Challenge&lt;br /&gt;
*Cisco Networking Challenge&lt;br /&gt;
&lt;br /&gt;
======'''&amp;lt;u&amp;gt;Network Security Challenge&amp;lt;/u&amp;gt;'''======&lt;br /&gt;
- The network security challenge tasks students in locating and eliminating vulnerabilities found in a variety of operation systems. Each vulnerability fixed grants the team points, placing them higher up on the leader board. Vulnerabilities can range from removing unauthorized users to uninstalling malicious software. Operating systems utilized in the CyberPatriot competition include the following:&lt;br /&gt;
&lt;br /&gt;
*Windows 10&lt;br /&gt;
*Windows Server&lt;br /&gt;
*Ubuntu&lt;br /&gt;
*Debian&lt;br /&gt;
&lt;br /&gt;
======'''&amp;lt;u&amp;gt;Cisco Networking Challenge&amp;lt;/u&amp;gt;'''======&lt;br /&gt;
- The Cisco networking challenge on the other hand, tasks students with completing an online quiz. As well as configuring a virtual network utilizing the program Packet Tracer. &lt;br /&gt;
&lt;br /&gt;
==MHS CyberPatriot==&lt;br /&gt;
- Maricopa High School is proud to partake in the nation CyberPatriot competition. Having competed for several years, we strive to aim higher each year. Go RAMs! The CyberPatriot program here at MHS is made possible by the (insert class name) and ROTC. &lt;br /&gt;
&lt;br /&gt;
===&amp;lt;u&amp;gt;MHS CyberPatriot 2021 - 2022&amp;lt;/u&amp;gt;===&lt;br /&gt;
'''Teams:''' Participating in the 2021-2022 competition, MHS currently has two registered teams, consisting of many awesome students, each bringing their own skills to the table. The MHS CyberPatriot team is managed and lead by the one and only Mr. Chamberlain!  &lt;br /&gt;
&lt;br /&gt;
- &amp;lt;u&amp;gt;'''Coach:'''&amp;lt;/u&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
- '''&amp;lt;u&amp;gt;Team A / Warriors of the Net (The Dream Team)&amp;lt;/u&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
- '''&amp;lt;u&amp;gt;Team B / 24PinTech Alpha:&amp;lt;/u&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== CyberPatriot Set-Up Process ==&lt;br /&gt;
- Before beginning the CyberPatriot competition, several steps must be completed. This steps include the following:&lt;br /&gt;
&lt;br /&gt;
* Image Download: About a week before the competition, the images used will be available to download. Mr. Chamberlain will provide the document with download links and passcodes. Download these images to your computer and upload them to the network drive. This process can be completed the fastest if each student downloads one image. Not everyone needs to download the image as it will be available on the network drive. &lt;br /&gt;
* Location: Competitions will take place in the (insert classroom name) here at MHS. Students will typically arrive at the gate between culinary and the library at 9:00 a.m. &lt;br /&gt;
* Image Download and Set-up: Once seated at your computer, access the network drive and drag the image to your desktop. Using the provided decryption code, unlock the folder and extract it. Open VMWare and (insert instructions)&lt;br /&gt;
* Beginning the Round Image: Once you have booted up your virtual machine, enter your team's unique identifier. Congratulations, you have begun, this applies to all images. Your team will have 6 hours (check to see if right) to complete the images. Make sure to submit all images before the deadline, or your team will lose points. &lt;br /&gt;
__FORCETOC____FORCETOC__&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Category:Cyber_Security&amp;diff=1754</id>
		<title>Category:Cyber Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Category:Cyber_Security&amp;diff=1754"/>
		<updated>2022-05-03T16:48:20Z</updated>

		<summary type="html">&lt;p&gt;Agrace: Created page with &amp;quot;yes&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;yes&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Three_Letter_Acronym_(TLA)&amp;diff=1658</id>
		<title>Three Letter Acronym (TLA)</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Three_Letter_Acronym_(TLA)&amp;diff=1658"/>
		<updated>2022-04-01T18:02:26Z</updated>

		<summary type="html">&lt;p&gt;Agrace: /* Misc: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Topic ==&lt;br /&gt;
This page will be used for you to make yourself knowledgeable on a variety of tech acronyms. A wide array of acronyms, whether it be on hardware, networking, protocols, etc. These will be very important for any tech in 24Pintech.  Learn them and know them well, otherwise you will fall victim to the ether whip.&lt;br /&gt;
&lt;br /&gt;
== Cloud Computing: ==&lt;br /&gt;
'''DaaS:''' Desktop as a Service&lt;br /&gt;
&lt;br /&gt;
'''IaaS''': Infrastructure as a Service&lt;br /&gt;
&lt;br /&gt;
'''ICaaS''': Integration Capabilities as a Service&lt;br /&gt;
&lt;br /&gt;
'''NaaS''': Network as a Service&lt;br /&gt;
&lt;br /&gt;
'''PaaS''': Platform as a Service&lt;br /&gt;
&lt;br /&gt;
'''SaaS''': Software as a service&lt;br /&gt;
&lt;br /&gt;
== Hardware: ==&lt;br /&gt;
'''CLI''': Command Line Interface&lt;br /&gt;
&lt;br /&gt;
'''CMOS''': Complementary Metal-Oxide Semiconductor&lt;br /&gt;
&lt;br /&gt;
'''CPU''': Central Processing Unit&lt;br /&gt;
&lt;br /&gt;
'''CRT''': Cathode Ray Tube&lt;br /&gt;
&lt;br /&gt;
'''DIMM''': Dual In-line Memory Module&lt;br /&gt;
&lt;br /&gt;
'''GPU''': Graphics Processing Unit&lt;br /&gt;
&lt;br /&gt;
'''NAS''': Network Attached Storage&lt;br /&gt;
&lt;br /&gt;
'''NIC''': Network Interface Card&lt;br /&gt;
&lt;br /&gt;
'''POST''': Power-on Self Test&lt;br /&gt;
&lt;br /&gt;
'''PC''': Personal Computer&lt;br /&gt;
&lt;br /&gt;
'''RAM''': Random Access Memory&lt;br /&gt;
&lt;br /&gt;
'''ROM''': Read-only Memory&lt;br /&gt;
&lt;br /&gt;
'''TPM''': Trusted Platform Module&lt;br /&gt;
&lt;br /&gt;
== Hypervisor/ Virtual ==&lt;br /&gt;
'''VDI''': Virtual Desktop Infrastructure&lt;br /&gt;
&lt;br /&gt;
'''VM''': Virtual Machine&lt;br /&gt;
&lt;br /&gt;
'''VNC''': Virtual Network Computer&lt;br /&gt;
&lt;br /&gt;
'''VPN''': Virtual Private Network&lt;br /&gt;
&lt;br /&gt;
== Networking: ==&lt;br /&gt;
'''DNS''': Domain Name Service&lt;br /&gt;
&lt;br /&gt;
'''ISP''': Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
'''LAN''': Local Area Network&lt;br /&gt;
&lt;br /&gt;
'''MAN''': Metropolitan Area Network&lt;br /&gt;
&lt;br /&gt;
'''UC''': Unified Communications&lt;br /&gt;
&lt;br /&gt;
'''WAN''': Wide Area Network&lt;br /&gt;
&lt;br /&gt;
== Organizations: ==&lt;br /&gt;
'''ANSI''': American National Standards Institute&lt;br /&gt;
&lt;br /&gt;
'''CCIA''': Computer and Communications Industry Association&lt;br /&gt;
&lt;br /&gt;
'''CompTIA''': Computing Technology Industry Association&lt;br /&gt;
&lt;br /&gt;
'''DEC''': Digital Equipment Corporation&lt;br /&gt;
&lt;br /&gt;
'''EIA''': Electronics Industry Alliance&lt;br /&gt;
&lt;br /&gt;
'''FCC''': Federal Communications Commission&lt;br /&gt;
&lt;br /&gt;
'''IANA''': Internet Assigned Number Authority&lt;br /&gt;
&lt;br /&gt;
'''IEEE''': Institute of Electrical and Electronics Engineers&lt;br /&gt;
&lt;br /&gt;
'''IETF''': Internet Engineering Task Force&lt;br /&gt;
&lt;br /&gt;
'''ITU-T''': International Telecommunication Union&lt;br /&gt;
&lt;br /&gt;
'''MoCA''': Multimedia over Coax Alliance&lt;br /&gt;
&lt;br /&gt;
'''OSI''': Open System Interconnect&lt;br /&gt;
&lt;br /&gt;
'''TIA''': Telecommunications Industry Alliance&lt;br /&gt;
&lt;br /&gt;
'''W3C''': World Wide Web Consortium&lt;br /&gt;
&lt;br /&gt;
== Protocol: ==&lt;br /&gt;
'''DHCP''': Dynamic Host Configuration Protocol&lt;br /&gt;
&lt;br /&gt;
'''FTP''': File Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
'''HTTP''': Hypertext Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
'''HTTPS''': Hypertext Transfer Protocol Secure&lt;br /&gt;
&lt;br /&gt;
'''IP''': Internet Protocol&lt;br /&gt;
&lt;br /&gt;
'''PAP''': Password Authentication Protocol&lt;br /&gt;
&lt;br /&gt;
'''PPP''': Point-to-Point Protocol&lt;br /&gt;
&lt;br /&gt;
'''SMTP''': Secure Mail Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
'''TCP''': Transmission Control Protocol&lt;br /&gt;
&lt;br /&gt;
'''TCTP''': Trivial File Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
== Security: ==&lt;br /&gt;
'''ACL''': Access Control List&lt;br /&gt;
&lt;br /&gt;
'''AES''': Advanced Encryption Standard&lt;br /&gt;
&lt;br /&gt;
'''DDoS''': Distributed Denial of Service&lt;br /&gt;
&lt;br /&gt;
'''DES''': Data Encryption Standard&lt;br /&gt;
&lt;br /&gt;
'''IDS''': Intrusion Detection System&lt;br /&gt;
&lt;br /&gt;
'''IPS''': Intrusion Prevention System&lt;br /&gt;
&lt;br /&gt;
'''MFA''': Multi Factor Authentication&lt;br /&gt;
&lt;br /&gt;
'''RMM''': Remote Monitoring Management&lt;br /&gt;
&lt;br /&gt;
'''SIEM''': Security Information and Event Management&lt;br /&gt;
&lt;br /&gt;
'''TFA''': Two Factor Authentication&lt;br /&gt;
&lt;br /&gt;
'''WPA''': Wi-Fi Protected Access&lt;br /&gt;
&lt;br /&gt;
== Misc: ==&lt;br /&gt;
'''CA''': Conditional Access&lt;br /&gt;
&lt;br /&gt;
'''IB''': Install Base&lt;br /&gt;
&lt;br /&gt;
'''PII''': Personally Identifiable Information&lt;br /&gt;
&lt;br /&gt;
'''RTT''': Round Trip Time&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Three_Letter_Acronym_(TLA)&amp;diff=1647</id>
		<title>Three Letter Acronym (TLA)</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Three_Letter_Acronym_(TLA)&amp;diff=1647"/>
		<updated>2022-03-31T18:15:37Z</updated>

		<summary type="html">&lt;p&gt;Agrace: Everything&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Topic ==&lt;br /&gt;
This page will be used for you to make yourself knowledgeable on a variety of tech acronyms. A wide array of acronyms, whether it be on hardware, networking, protocols, etc. These will be very important for any tech in 24Pintech.  Learn them and know them well, otherwise you will fall victim to the ether whip.&lt;br /&gt;
&lt;br /&gt;
== Cloud Computing: ==&lt;br /&gt;
'''DaaS:''' Desktop as a Service&lt;br /&gt;
&lt;br /&gt;
'''IaaS''': Infrastructure as a Service&lt;br /&gt;
&lt;br /&gt;
'''ICaaS''': Integration Capabilities as a Service&lt;br /&gt;
&lt;br /&gt;
'''NaaS''': Network as a Service&lt;br /&gt;
&lt;br /&gt;
'''PaaS''': Platform as a Service&lt;br /&gt;
&lt;br /&gt;
'''SaaS''': Software as a service&lt;br /&gt;
&lt;br /&gt;
== Hardware: ==&lt;br /&gt;
'''CLI''': Command Line Interface&lt;br /&gt;
&lt;br /&gt;
'''CMOS''': Complementary Metal-Oxide Semiconductor&lt;br /&gt;
&lt;br /&gt;
'''CPU''': Central Processing Unit&lt;br /&gt;
&lt;br /&gt;
'''CRT''': Cathode Ray Tube&lt;br /&gt;
&lt;br /&gt;
'''DIMM''': Dual In-line Memory Module&lt;br /&gt;
&lt;br /&gt;
'''GPU''': Graphics Processing Unit&lt;br /&gt;
&lt;br /&gt;
'''NAS''': Network Attached Storage&lt;br /&gt;
&lt;br /&gt;
'''NIC''': Network Interface Card&lt;br /&gt;
&lt;br /&gt;
'''POST''': Power-on Self Test&lt;br /&gt;
&lt;br /&gt;
'''PC''': Personal Computer&lt;br /&gt;
&lt;br /&gt;
'''RAM''': Random Access Memory&lt;br /&gt;
&lt;br /&gt;
'''ROM''': Read-only Memory&lt;br /&gt;
&lt;br /&gt;
'''TPM''': Trusted Platform Module&lt;br /&gt;
&lt;br /&gt;
== Hypervisor/ Virtual ==&lt;br /&gt;
'''VDI''': Virtual Desktop Infrastructure&lt;br /&gt;
&lt;br /&gt;
'''VM''': Virtual Machine&lt;br /&gt;
&lt;br /&gt;
'''VNC''': Virtual Network Computer&lt;br /&gt;
&lt;br /&gt;
'''VPN''': Virtual Private Network&lt;br /&gt;
&lt;br /&gt;
== Networking: ==&lt;br /&gt;
'''DNS''': Domain Name Service&lt;br /&gt;
&lt;br /&gt;
'''ISP''': Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
'''LAN''': Local Area Network&lt;br /&gt;
&lt;br /&gt;
'''MAN''': Metropolitan Area Network&lt;br /&gt;
&lt;br /&gt;
'''UC''': Unified Communications&lt;br /&gt;
&lt;br /&gt;
'''WAN''': Wide Area Network&lt;br /&gt;
&lt;br /&gt;
== Organizations: ==&lt;br /&gt;
'''ANSI''': American National Standards Institute&lt;br /&gt;
&lt;br /&gt;
'''CCIA''': Computer and Communications Industry Association&lt;br /&gt;
&lt;br /&gt;
'''CompTIA''': Computing Technology Industry Association&lt;br /&gt;
&lt;br /&gt;
'''DEC''': Digital Equipment Corporation&lt;br /&gt;
&lt;br /&gt;
'''EIA''': Electronics Industry Alliance&lt;br /&gt;
&lt;br /&gt;
'''FCC''': Federal Communications Commission&lt;br /&gt;
&lt;br /&gt;
'''IANA''': Internet Assigned Number Authority&lt;br /&gt;
&lt;br /&gt;
'''IEEE''': Institute of Electrical and Electronics Engineers&lt;br /&gt;
&lt;br /&gt;
'''IETF''': Internet Engineering Task Force&lt;br /&gt;
&lt;br /&gt;
'''ITU-T''': International Telecommunication Union&lt;br /&gt;
&lt;br /&gt;
'''MoCA''': Multimedia over Coax Alliance&lt;br /&gt;
&lt;br /&gt;
'''OSI''': Open System Interconnect&lt;br /&gt;
&lt;br /&gt;
'''TIA''': Telecommunications Industry Alliance&lt;br /&gt;
&lt;br /&gt;
'''W3C''': World Wide Web Consortium&lt;br /&gt;
&lt;br /&gt;
== Protocol: ==&lt;br /&gt;
'''DHCP''': Dynamic Host Configuration Protocol&lt;br /&gt;
&lt;br /&gt;
'''FTP''': File Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
'''HTTP''': Hypertext Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
'''HTTPS''': Hypertext Transfer Protocol Secure&lt;br /&gt;
&lt;br /&gt;
'''IP''': Internet Protocol&lt;br /&gt;
&lt;br /&gt;
'''PAP''': Password Authentication Protocol&lt;br /&gt;
&lt;br /&gt;
'''PPP''': Point-to-Point Protocol&lt;br /&gt;
&lt;br /&gt;
'''SMTP''': Secure Mail Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
'''TCP''': Transmission Control Protocol&lt;br /&gt;
&lt;br /&gt;
'''TCTP''': Trivial File Transfer Protocol&lt;br /&gt;
&lt;br /&gt;
== Security: ==&lt;br /&gt;
'''ACL''': Access Control List&lt;br /&gt;
&lt;br /&gt;
'''AES''': Advanced Encryption Standard&lt;br /&gt;
&lt;br /&gt;
'''DDoS''': Distributed Denial of Service&lt;br /&gt;
&lt;br /&gt;
'''DES''': Data Encryption Standard&lt;br /&gt;
&lt;br /&gt;
'''IDS''': Intrusion Detection System&lt;br /&gt;
&lt;br /&gt;
'''IPS''': Intrusion Prevention System&lt;br /&gt;
&lt;br /&gt;
'''MFA''': Multi Factor Authentication&lt;br /&gt;
&lt;br /&gt;
'''RMM''': Remote Monitoring Management&lt;br /&gt;
&lt;br /&gt;
'''SIEM''': Security Information and Event Management&lt;br /&gt;
&lt;br /&gt;
'''TFA''': Two Factor Authentication&lt;br /&gt;
&lt;br /&gt;
'''WPA''': Wi-Fi Protected Access&lt;br /&gt;
&lt;br /&gt;
== Misc: ==&lt;br /&gt;
'''CA''': Conditional Access&lt;br /&gt;
&lt;br /&gt;
'''IB''': Install Base&lt;br /&gt;
&lt;br /&gt;
'''RTT''': Round Trip Time&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Report.png&amp;diff=1462</id>
		<title>File:Report.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Report.png&amp;diff=1462"/>
		<updated>2021-11-17T18:14:45Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Showing what the report section is.&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Email.png&amp;diff=1461</id>
		<title>File:Email.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Email.png&amp;diff=1461"/>
		<updated>2021-11-17T18:13:58Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Image showing what it is.&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:ELK.png&amp;diff=1456</id>
		<title>File:ELK.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:ELK.png&amp;diff=1456"/>
		<updated>2021-11-09T20:14:37Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is shows where to be looking for on elasticstack.&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Suricata&amp;diff=1417</id>
		<title>Suricata</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Suricata&amp;diff=1417"/>
		<updated>2021-09-27T19:41:53Z</updated>

		<summary type="html">&lt;p&gt;Agrace: Created page with &amp;quot;Suricata&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Suricata&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Printer_Issues&amp;diff=1379</id>
		<title>Common Printer Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Printer_Issues&amp;diff=1379"/>
		<updated>2021-08-27T03:54:20Z</updated>

		<summary type="html">&lt;p&gt;Agrace: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There is a large list of things that could be wrong with a printer. This guide can be used to diagnose and solve some of the common issues that tend to happen with printers. If none of these work, then it is recommended to do further research on the issue, documentation on the some fixes, or even call the manufacturing company's help center for further assistance.&lt;br /&gt;
&lt;br /&gt;
== Common problems ==&lt;br /&gt;
&lt;br /&gt;
=== Unable to connect to the printer ===&lt;br /&gt;
&lt;br /&gt;
# Restart/Shutdown the printer.&lt;br /&gt;
# Reconnect the printer to the internet by using the menu on the printer and going to internet settings.&lt;br /&gt;
# Make sure that the right printer is connected to the computer.&lt;br /&gt;
# Configure the settings of the printer on the computer by accessing control panel&amp;gt;Hardware and security&amp;gt;Device and Printers&amp;gt;Printer and making sure it is set up properly.&lt;br /&gt;
&lt;br /&gt;
=== Low ink/replace cartridge ===&lt;br /&gt;
&lt;br /&gt;
# Replace the cartridge.&lt;br /&gt;
# Reset the counter if it has already been replaced by using the settings on the printer and going to printing options.&lt;br /&gt;
&lt;br /&gt;
=== '''Bad Print Quality''' ===&lt;br /&gt;
&lt;br /&gt;
# Match printer settings when printing by configuring the resolution, size, and format.&lt;br /&gt;
# Make sure paper quality is standard as mixing different types of paper brands can cause low quality&lt;br /&gt;
&lt;br /&gt;
=== Printer wont print. ===&lt;br /&gt;
&lt;br /&gt;
# Readjust the paper tray.&lt;br /&gt;
# Make sure the printer has a stable connection to the computer and internet&lt;br /&gt;
# Make sure the right drivers are installed or if the need to be updated by going to Settings&amp;gt;Devices&amp;gt;Printers and Scanners&amp;gt; Printer Server Properties&lt;br /&gt;
# The printer may not be added, to do so in Windows 10 go to settings&amp;gt;Devices&amp;gt;   Printers and Scanners and add.  &lt;br /&gt;
&lt;br /&gt;
=== Paper jams ===&lt;br /&gt;
&lt;br /&gt;
# Make sure the paper tray is not overfilled&lt;br /&gt;
# Turn off printer and unplug &lt;br /&gt;
# Open access doors and remove any jammed paper&lt;br /&gt;
# Do a test print to make sure it is working&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Common_Printer_Issues&amp;diff=1378</id>
		<title>Common Printer Issues</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Common_Printer_Issues&amp;diff=1378"/>
		<updated>2021-08-27T03:43:35Z</updated>

		<summary type="html">&lt;p&gt;Agrace: Created page with &amp;quot;l&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;l&lt;/div&gt;</summary>
		<author><name>Agrace</name></author>
	</entry>
</feed>