• Do not use any resources created outside of the designated 24-hour hacking window