Thursday, October 15, 2020

Morse Code

 Cipher - Morse Code



Minecraft

 Cipher







Spaceman



Rules
Spaceman Rules - Alternative to Hangman

1 - Draw Spaceship Base
2,3,4 - Draw 3 engines
5 - Draw Spaceship Top
6,7,8 - Draw 3 Windows
9 - Finally Draw Antennae to allow the spaceship to radio home and fly away

 


Pictionary

 Website

https://quickdraw.withgoogle.com/

Rules

  • Take turns assigning a player that will be asked to draw the image on the board
  • Teammates now can start guessing the word
  • The other teammates have to guess the right word in the stipulated time to get a point.
  • Once the answer is guessed the next player will draw the image

Tuesday, April 7, 2020

Index

A+

Chapter 1 - The Path of the PC Tech
Defined
Blank

Chapter 2 - Operational Procedures
Defined
Blank

Chapter 3 - The Visible Computer
Defined
Blank

Chapter 4 - Microprocessors
Defined
Blank

Chapter 5 - RAM
Defined
Blank

Chapter 6 - BIOS
Defined
Blank

Chapter 7 - Motherboards
Defined
Blank

Chapter 8 - Power Supplies
Defined
Blank

Chapter 9 - Hard Drive Technologies
Defined
Blank

Chapter 10 - Implementing Hard Drives
Defined
Blank

Chapter 11 - Essential Peripherals
Defined
Blank

Chapter 12 - Building a PC
Defined
Blank

Chapter 13 - Windows Under the Hood
Defined
Blank

Chapter 14 - Users, Groups. and Permissions
Defined
Blank

Chapter 15 - Maintaining and Optimizing Operating Systems
Defined
Blank

Chapter 16 - Working with the Command-Line Interface
Defined
Blank

Chapter 17 - Troubleshooting Operating Systems
Defined
Blank

Chapter 18 - Virtualization
Defined
Blank

Chapter 19 - Display Technologies
Defined
Blank

Chapter 20 - Essentials of Networking
Defined
Blank

Chapter 21 - Local Area Networking
Defined
Blank

Chapter 22 - Wireless Networking
Defined
Blank

Chapter 23 - The Internet
Defined
Blank

Chapter 24 - Portable Computing
Defined
Blank

Chapter 25 - Understanding Mobile Devices
Defined
Blank

Chapter 26 - Care and Feeding of Mobile Devices
Defined Coming Soon
Blank Coming Soon

Chapter 27 - Printers and Multi-function Devices
Defined
Blank

Chapter 28 - Securing Computers
Defined
Blank

Network+

Chapter 2A
Defined
Blank

Chapter 2B
Defined
Blank

Chapter 3
Defined
Blank

Chapter 4A
Defined
Blank

Chapter 4B
Defined
Blank

Chapter 5A
Defined
Blank

Chapter 5B
Defined
Blank

Chapter 6A
Defined
Blank

Chapter 6B
Defined
Blank

Chapter 7A
Defined
Blank

Chapter 7B
Defined
Blank

Chapter 8A
Defined
Blank

Chapter 8B
Defined
Blank

Chapter 9A
Defined
Blank

Chapter 9B
Defined
Blank

Chapter 10
Defined
Blank

Chapter 11A
Defined
Blank

Chapter 11B
Defined
Blank

Chapter 12A
Defined
Blank

Chapter 12B
Defined
Blank

Chapter 13
Defined
Blank

Chapter 14
Defined
Blank

Chapter 15
Defined
Blank

Chapter 16
Defined
Blank

Chapter 17
Defined
Blank

Chapter 18
Defined
Blank

Chapter 19
Defined
Blank

Chapter 20
Defined
Blank

Chapter 21
Defined
Blank

Thursday, March 12, 2020

Network+ Chapter 19 Power Words - Defined

Chapter 19 - Protecting Your Network

1. Mantrap: A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall. 
2. Monlistdebugging command that allows to retrieve information from the monitoring facility about traffic associated with the NTP service. 
3. NAC: An approach to computer security that attempts to unify endpoint security technology. 
4. Network-Based anti-malware: The broadening use of social media, messaging and other, non-work related applications introduces a variety of vectors that can be used to propagate viruses, spyware, worms and other types of malware. 
5. Network-based firewall: controls traffic going in and out of a network. 
6. Network Closet: a closet or a small room where electrical wiring and computer networking hardware is installed. 
7. Non-persistent agent: a software the client runs as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect. 
8. Ntpdc: used to query the ntpd daemon about its current state and to request changes in that state. 
9. OUI: the first 24 bits of a MAC address for a network-connected device, which indicate the specific vendor for that device.  
10. Outbound traffic: In the view of a server firewall, inbound means other server or client in front of the wall, initiate connection with own server. 
11. PDos: an attack that damages a system so badly that it requires replacement or reinstallation of hardware. 
12. Persistent agent: a software updater utility designed to keep the program up to date. 
13. Phishing: the fraudulent use of electronic communications to deceive and take advantage of users. 
14. Posture Assessment: refers to the act of applying a set of rules to the posture data to provide an assessment of the level of trust that you can place in that endpoint.  
15. Proximity Reader: transmit a low-level fixed radio frequency (RF) signal that provides energy to the card. 
16. Quarantine Network: a set of services and utilities available for Windows Server 2003 that lets you prevent remote users from connecting to your network with machines that aren't up to date and secure by quarantining them in a secured area 
17. Reddit Effect:  more users on each side result in more possible network connections the platform can provide.  
18. Reflection: the process of accessing information about loaded assemblies and the types defined therein to create, invoke and access type instances at run time programmatically. 
19. Cipher lock – Used to limit control accesses 
20. Cleartext credential – A password stored in clear text. 
21. Closed circuit television – Used as security cameras that can send information between each other. 
22. Cloud - virtual server run in a cloud environment  
23. DZ - Demilitarized zone  
24. DOS – Denial of service  
25. DHCP snooping – Layer 2 technology used to prevent unauthorized access.  
26. DDOS – Distributed denial of service  
27. DAC – Door access control 
28. DAI – Dynamic ARP inspection 
29. Edge – The limit that can be set for browsing. 
30. Effective permission – Set of permissions to access a file in particular. 
31. External firewall – Used to block access from the external instead of the internal 
32. Fail close – The valve will close when signal is lost. 
33. Fail open – The valve will remain open when the signal is lost. 
34. Fault tolerance – How much impact the fault can take. 
35. Firewall - Used to block out unauthorized connections. 
36. Guest network – A Access point for your router. 
37. Hardening – Reduces security risk by eliminating surface of vulnerability 
38. Hardware Appliance – A device that has a specific purpose or use. 
39. Honeynet – A network set up with intentional vulnerabilities 
40. Honeypot – A place to which people are attracted 
41. Host-Based Anti-Malware – A two component product used to detect threats and malware 
42. Host-Based Firewall – A product used to prevent viruses. 
43. Implicit Deny Any – When a user or group is not given specific permissions 
44. Inbound Traffic – Internet traffic coming into a machine 
45. Inheritance – A feature that represents the “is a” relationship between classes 
46. Internal Firewall – An anti-malware system put in place on the inside of a machine 
47. IP Camera – A camera that receives control data 
48. Key Fob – Displays a randomly generated access code, which changes periodically 
49. Keypad – A pad that has keys on it, usually numerical or alphabetical 
50. Macro – A single instruction that expands automatically into a set of instruction to do something 
51. Malicious Employee – An employee that improperly uses a computer in the network 
52. Malicious User – An end user with a malicious intent or with a malicious program attached to their machine 
53. Malware – A malicious software, program, or virus 
54. Man-In-The-Middle – like monkey in the middle, but with emails and data, but the man in the middle is hidden, usually 
55. Reddit effect – state of mind of short time 
56. Quarantine network – set of services for windows services 
57. Proximity reader – it reads proximities in a lot of different ways 
58. Posture assessment – a assessment for your posture 
59. Pashing – it’s a type of security 
60. Persistent agent – a agent that helps you and is persistent 
61. Permanent dos – it slows down the systems hardware 
62. Outbound traffic – things not going well and aren’t moving in the right direction and it backed up 
63. OUI – it identifies any problems or any sort of help you may need 
64. Ntpdc – a certain command that you will need to use often 
65. Non-persistent agent – a agent that isn’t very persistent and isn’t very useful and you won’t need it 
66. Network closet – a closet of electrical wiring and servers 
67.Network based firewall – it blocks viruses from harming your computer 
68. Anti-malware – detects malicious software 
69. Nac – controls the network access 
70. Mon list – it means to be alone 
71. Mantrap – a trap for catching and giving viruses 
77. Reflection: the process of accessing information about loaded assemblies and the types defined therein to create, invoke and access type instances at run time programmatically. 
73. Threat – a POTENTIAL attack against the network. 
74. TEMPEST – standards developed by the NSA for defining how to protect signals being sent and received. 
75. Tail gating – when an unauthorized person enters the building by pretending to be an employee. 
76. Stateless inspection - An older firewall where the packets were looked at but not in relation to one another. 
77. Stateful inspection – capability to tell if a packet has relations to others being sent. 
78. Spyware – any program that sends information about your computer. 
79. Spoofing – the process of pretending to be someone else by sending false information in one or more packets. 
80. Reflection – A mirror of one component or another 
81. RF emanation – Any modulated signal (sound or electromagnetic radiation) leaking from a device that may be used to reconstruct information being processed or transmitted by that device. 
82. Rootkit – software used by a hacker to gain constant administrator-level access to a computer or network. 
83. Security Guard – an organization's strategy that enables guaranteeing the security of its assets including all network traffic. 
84. Services – a structure that brings together several entities to deliver a particular service. 
85. Session Hijacking – the exploitation of a valid computer session—sometimes also called a session key- to gain unauthorized access to information or services in a computer system. 
86. Signature – a process that guarantees that the contents of a message have not been altered in transit. 
87. Slash dotting – occurs when a popular website links to a smaller website, causing a massive increase in traffic. 
88. Social Engineering – an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain. 
89. SOHO firewall – designed for small company or home networks, typically less than 25 computers. 
90. Smurf attack - An early form of a DoS attack. 
91. Traffic spike – A spike in traffic 
92. Trojan horse - A type of malware that is often disguised as legitimate software. 
93. Trusted user – A user that is trusted 
94. Unencrypted user - A user that is unencrypted 
95. Unified Threat Management (UTM) - a term first used by IDC to describe a category of security appliances which integrates a range of security features into a single appliance 
96. Untrusted user – A user that is untrusted 
97. Video monitoring – Monitoring video 
98. Virus - a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code 
99. Virus shield – A shield for a virus 
100.  VLAN hopping – Virtual Local Area Network hopping 
101.  Vulnerability - A weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system 
102. Worm - A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers 
103. Zero-day attack - A computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability 
104. zombie - A computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.