Advanced Search
Search Results
651 total results found
4fecta Guide (by flesh liker in italian food item)
Step 1: Download the Modpack Step 2: Play the modpack Step 3: Create a world Step 3.5 optional: Make an explorer's compass for finding structures Step 4: Find a verrucous rock (With or without the compass) Step 5: Make a base near the rock Step 6: Go min...
Fast Identity Online
An open standard for passwordless authentication. The latest version of FIDO (FIDO2) relies on WebAuthentication (WebAuthn) and Client to Authenticator Protocol 2 (CTAP2) to enable user website, application and/or service login without the use of traditional ...
Smart Card Authentication
The usage of plastic cards (similar to credit cards) to store and use encrypted authentication information. Smart cards use PKI technology to store asymmetric keys, digital signatures, and identification codes. They can authenticate a user when used with a sm...
Unit 4
Linux Group Commands
Manage group accounts and group membership in the Linux operating system. Command Function Flags groupadd Creates a new group. -g (Defines the group ID)-p (Defines the group password)-r (Makes the new group a system group) groupmod ...
Network Federation
The notion that a network needs to be accessible to more than just a well-defined group of employees. Organizations might need to open parts of it network to partners, suppliers, and customers. It's relatively easy to manager your own employees, but managing ...
Windows Software Update Services
A patch management tool that allows client on a network to download software updates from an internal WSUS server in their organization. Organizations manage Windows updates from a central management point, and can pick and choose which updates their clients ...
Identity Services Engine
A Cisco-owned NAC solution that uses policy-driven decision making to authenticate and authorize devices connecting to a network.
Unit 5
NAC Agents
How can devices connect to a network that has a robust access control configuration? NAC doesn't only do authentication and authorization, like previously stated. It also checks and enforces compliance with a group of security policies. It usually checks: ...
NAC Process
A terribly complicated four-step process that requires forethought when implementing network access control. Plan - A committee should convene and make decisions that define how NAC should work. Define - The roles, identities, and permissions (policies) mu...
Art
Can it be AI-generated?
Homework
Taken from Diddy's measurements
P. Drippy
8========q
Projects
A collection of notes on coding projects and ideas I have.
Homelabbing
A collection of notes regarding homelabbing, intended for the public view.
Implementing Switch Security
Learn what to look out for when hardening a switch.