asteroza + application   252

Microsoft recommended block rules (Windows 10) | Microsoft Docs
Oh hey, a list of known MS signed binaries that allow for unsigned execution, AKA LOLbins.
windows  defender  application  control  block  list  blocklist  security  hacking  pentesting  defense  blueteam  LOLbin 
january 2019 by asteroza
Worksmart — Crossover
Welcome to white collar hell, where they cap your screen every 10, and use the webcam to check if you are seated there.
WorkSmart  remote  worker  monitoring  security  time  logging  screenshot  webcam  capture  application  log  HR  team  outsourcing  management  Delicious 
may 2017 by asteroza
realparisi/WMI_Monitor: Log newly created WMI consumers and processes
Sets up a new WMI subscription to dump new WMI subscriptions/actions to windows application log, which can then be scraped by various SIEM means to detect persistence/lateral movement.
security  WMI  subscription  consumer  logging  monitoring  log  application  event  powershell  script  Delicious 
august 2016 by asteroza
Well, every WAF vendor trembled a bit just now...
AWS  WAF  web  application  app  webapp  firewall  security  service  amazon  Delicious 
october 2015 by asteroza
Active Directory Protection | Identity Theft Detection | Aorato™
Active Directory protection software, that looks for irregular logon or authentication behavior compared to learned profiles of users. Since AD stuff gets more exposed as you federate to outside services, squelching attacks by finding anomalous authentication behavior becomes more important.
DAF  AD  directory  services  application  firewall  dynamic  learning  behavioral  anomaly  detection  profiling  security  software  Delicious 
january 2014 by asteroza
Dream Cheeky USB Drivers for Webmail Notifier and Stress Button - View Discussion
Alternative software for the DreamCheeky Big Red Button (AKA stress button, self destruct button) USB plunger mushroom switch. Necessary since it turns out is isn't really a fake keyboard type USB device.
driver  windows  launcher  application  software  devices  electronics  hardware  destruct  button  USB  self  panic  red  big  DreamCheeky  Delicious 
october 2012 by asteroza
Looks like the ZigBee Alliance is punting using the 920MHz band for IEEE 802.15.4g compatible PHY/MAC layer services for ECHONETlite, the new japanese standard for electric appliance/equipment energy management and connectivity to HEMS applications.
ECHONET  ECHONETlite  ZigBee  802.15.4  802.15.4g  HEMS  home  energy  management  smart  appliance  electric  equipment  IP  layer  application  SmartHome  SmartMeter  SmartGrid  green  japan  Delicious 
august 2012 by asteroza
FlashVideoReplacer :: Add-ons for Firefox
Tool for forcing webM modes, or redirecting flash video content to an external app, rather than having flash run internal to a browser.
Firefox  addon  plugin  extension  flash  FLV  video  redirect  webM  mp4  external  application  Delicious 
january 2012 by asteroza
App that creates an embedded secure partition to isolate work apps/email/data. In theory allows a work/play divide on an otherwise personal phone. As to how safe it is, well, encrypted partition generally only provides you security for data at rest if implemented well, and various levels of security for data on teh move (when the secure partition is mounted). There's also the security issues between apps. Android may be UNIX multiuser, but it was designed fundamentally as a single GUI user/operator OS, with resulting design compromises. VMware's Horizon hypervisor setup is a slightly better security solution since that takes the OS out of the equation in theory...
enterproid  android  app  software  enterprise  business  device  security  remote  wipe  application  control  management  secure  partition  area  encryption  Delicious 
october 2011 by asteroza
For paranoid japanese girlfriends, this is a spyware app/service to keep tabs on a boyfriend's android phone. 3 day free trial, then needs a monthly payment to keep the logs (assuming the logs a trickled to their servers). Tracks app installation/usage, call logs, GPS location (this seems to push GPS location to their server pretty regularly), and a few other odds and ends. The privacy outrage is already starting, but the more interesting part is will it show up under various app killer apps/task managers, and is it killable?
japan  Karelog  android  spyware  app  service  software  monitoring  remote  location  tracking  call  log  application  usage  security  logging  Delicious 
august 2011 by asteroza
SANS: Application Security Procurement Language
Recommended language to tighten up software dev contracts to make the programmer responsible for security issues.
contract  legal  form  template  application  security  software  procurement  document  language  outsourcing  guidelines  coding  development  programming  management  business  Delicious 
february 2010 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  2K3  3D  3D-GAN  3G  4.3  4.4  802.15.4  802.15.4g  abstraction  acceleration  accelerator  access  account  ACL  acoustic  active  activecollab  ActiveGrid  Activelock  activeX  Acunetix  ad  addon  admin  administration  admission  adobe  advertising  advice  affiliate  agent  aggregator  air  airlock  AIST  Ajatus  ajax  ajaxlaunch  alert  altcoin  alternative  Altiris  amazon  analysis  analytics  analyzer  android  anomaly  antispam  antispyware  antivirus  Apex  API  app  AppEngine  appliance  application  applications  AppRemover  apps  appstream  AR  archiving  Ardence  arduino  area  art  articles  ASIC  ASP  Associates  assurance  asterisk  attack  audit  auditing  auth  authentication  automated  automation  autopackage  autorun  avant  aware  awareness  AWS  Axsh  backend  backframe  background  backup  Baidu  balancer  balancing  bandwidth  base  based  batch  battery  BCOP  BeAware  BeepBeep  BeFF  behavioral  Beryl  beta  big  bigbrother  binary  bitcoin  BitVault  blackberry  blackbox  blacklist  block  blocker  blocking  blocklist  blog  blogging  blueteam  bluetooth  BMP  border  Boston  box  bridge  browser  bufferzone  bug  builder  building  bulk  bundle  Bungee  business  button  BYOD  bypass  C#  C-300  calculation  calendar  call  cap  capture  carat  CAS  Cascading  catalog  CD  Ceedo  cellphone  central  certification  chat  checkpoint  china  chroot  CI  CIO  circle  CircleDock  circular  circumvention  citrix  clamwin  class  classifier  click  click-to-run  clickthrough  client  clock  cloud  CloudBees  cluster  clustering  CMS  CoApp  cocoa  code  codec  coding  coexistence  colabolo  coldfusion  collaboration  collection  command  commodity  common  communications  companion  compass  compile  compliance  computer  computing  concurrent  conferencing  configuration  console  consulting  consumer  container  content  ContentExchange  context  continuous  contract  control  conversion  cookie  coprocessor  copy  corporate  cost  couchDB  course  CPS  CPU  creation  creative  creator  CRM  crowdsourcing  cryptocurrency  cunsumption  customer  customization  Cybozu  daemon  DAF  dashboard  data  database  datacenter  datamining  Datasynapse  db  deb  debian  debug  debugging  decision  defender  defense  Delegate  delegated  delete  Delicious  delivery  demand  demo  democrakey  deploy  deployment  design  desktop  destruct  detection  developer  development  device  devices  devops  DFA  diary  dictation  Digital  dimdim  directory  disable  disk  distance  distributed  distribution  DLP  DNet  dock  docker  docomo  document  dotFX  download  draganddrop  DRC  DreamCheeky  drive  driver  DriveSentry  DRM  drone  dynamic  EC2  ECHONET  ECHONETlite  ECM  editor  education  ejabberd  EK  ektasis  elasticsearch  electric  electronics  email  embedded  embedding  encrypted  encryption  endpoint  energy  engine  english  enhancement  enterprise  enterproid  environment  EPS  equipment  ERP  escalation  ethereum  evaluation  event  executable  execution  experimental  extension  Extentrix  external  Extravis  eyecandy  facebook  FastScale  fat  feature  FeliCa  file  filesystem  filter  filtering  finding  fingerprint  fingerprinting  firefox  firewall  flash  flex  flow  Fluke  FLV  follow  FOMA  forensic  form  FPGA  framework  free  freeDOS  freelancing  freeware  fring  FTP  funambol  fusion  fuzzer  FX  gadget  gateway  geolocation  gesture  gmaps  GNOME  GNU  GnuWin32  GO-Global  goo  google  googleapps  googlemaps  googletalk  GP  Gpdisable  GPO  GPRS  gps  graphic  graphing  green  grid  GridASP  group  groupware  growl  GSM  GTD  GTK  guard  Guardian  GuardianEdge  GUI  guide  guidelines  Gush  gypsy  H.324m  HA  hack  hacking  hacks  hadoop  hagiwara  hamachi  hand  handoff  handover  handset  handsfree  HAProxy  haptic  hard  hardware  hawkscope  HCI  HDD  headset  helper  HEMS  heterogeneous  home  host  hosted  hosting  howto  HPC  HR  html  HTML5  HTTP  Hudson  human  hybrid  hypertransport  i-appli  ICA  iCall  identification  identity  IE  ignition  ILP  IM  image  individual  industry  information  infosec  infoviz  inline  input  inspection  inspiration  install  installation  installer  InstallPad  instant  integrated  integration  intelligence  interactive  interface  internet  internet-of-things  invasion  invoice  ion  iOS  Iotum  IP  iPad  iPhone  iPod  iPohne  IPS  iptables  iShadow  ISO  isolated  IT  j2me  Jaiku  jail  jailbreak  japan  japanese  java  javaFX  javascript  jcluds  jenkins  Jott  joylent  jquery  kagemai  karelog  keitai  kerberos  kernel  Keychain  keynote  kibana  kiseki  Klik  knowledge  Koral  KPI  kubernetes  L7  lab  labs  language  launcher  launching  Launchy  layer  LBS  ldap  learning  least  lecture  legal  level  library  licensing  Lifehacker  lifehacks  lifelog  lightweight  limit  limited  limiter  line  link  linux  list  lithium  littlesnitch  live  load  local  location  lockdown  log  logging  LogMeIn  LOLbin  Loopt  loss  low  Lua  lucene  lumberjack  Lumen  mac  machine  maintenance  MAM  management  manager  manufacturer  map  mapreduce  maps  marketing  mashup  masking  massive  matching  materials  McAfee  MDM  meebo  meeting  memory  menu  message  messaging  messenger  messing  Meta  metasploit  metaVNC  METI  MF  mgmaps  microframework  microOS  microservice  microsoft  Migo  migration  Mob4Hire  mobile  mockup  model  modeling  module  mogilefs  MojoPac  monitor  monitoring  mp4  MR  MSI  msking  MSN  MSpaint  multitier  mysql  mytop  NAC  navigation  navigator  NDFS  netjaxer  NetKernel  nettools  network  networking  NetworkMiner  networks  news  Ninite  Nivio  no  NodalCore  Nokia  notebook  notetaking  notice  notification  notifier  NSlog  NTT  Nutch  Oakley  object  ocntrol  office  offline  OmniFocus  on  ondemand  one  online  Open  OpenGL  OpenGoo  openldap  opensocial  opensource  opentransit  OpenVZ  operations  OPSWAT  opteron  OptiView  Orchestria  orelog  organizer  OS  OSC  osx  outsourced  outsourcing  OVD  Ovi  OWASP  p2p  PaaS  pack  package  packaging  packet  panic  parallels  paretologic  partition  patent  payload  PC  PCIexpress  penetration  pentest  pentesting  performance  perl  permission  persistent  personal  phone  photo  PHP  picture  planning  Plash  platform  plugin  pocketpc  policy  popup  port  portable  portfolio  posgresql  potentially  Power  powerpoint  powershell  presence  presentation  presentations  prevention  printer  printing  privacy  priviledge  priviledges  privilege  privledge  probe  process  processing  processor  procurement  productivity  profile  profiling  program  programmer  programming  project  proofpoint  protection  protocol  prototype  provider  provisioning  proxy  published  publishing  purchase  push  python  Pyxis  QA  QoS  quality  quicktime  rails  randomization  ranging  Raytheon  rdesktop  RDP  reader  receptionist  recognition  recorder  recording  red  redirect  redirection  reference  RegERx  reggy  reinvigorate  relevance  reminder  remote  RemoteApps  removal  rental  reporting  repository  research  resource  REST  restricted  restriction  review  rewrite  rewriting  RFID  RIA  RIAforge  rich  rider  ringside  rocket  RocketDock  RoR  ROS  router  routing  RSA  RSS  rsync  ruby  s60  SaaS  salesforce  sandbox  Sandisk  SBC  scan  scanner  scanning  scoop  screen  screenshot  script  scripting  seamless  SeamlessRDP  search  searchable  searching  secure  security  self  SEO  sequence  server  service  services  setting  setup  shaping  ShareToDo  shareware  sharing  shell  shopping  sideline  sigle  signed  signon  simulator  single  SIP  skipfish  skype  SLA  slack  sleeve  slingshot  smart  SmartGrid  SmartHome  SmartMeter  smartphone  SMTP  snapshot  sniffer  sniffing  SNS  SOA  social  socket  SoftGrid  softphone  Softricity  software  solaris  sonata  Sony  source  specific  specification  speech  spring  SpringSource  spyware  SRP  ssh  SSL  SSO  stack  standard  start  StartKey  startup  statistics  status  storage  store  streaming  string  subgraph  subroutine  subscription  subversion  support  SVG  SVN  swipe  switch  switchboard  switcher  Symantec  symbian  synchronization  sys-com  sysadmin  sysinternals  system  systray  tagging  task  taskbar  team  technology  telephony  template  terminal  test  testing  testiphone  text  thick  thin  thinktank  thinstall  threadmaster  thunderbird  time  tips  todo  token  tokyo  toolkit  tools  trace  tracker  tracking  traffic  transcription  trick  tricks  trigence  trigger  Triggit  trinket  trusted  trustzone  TS  tunnel  tutorial  tweaks  TweetDeck  twitter  U3  UAV  ubuntu  UDRW  UI  UIzard  ulteo  uninstall  uninstaller  unstructured  unwanted  update  upload  URL  usage  USB  USB-IF  user  userspace  uTest  utilities  utility  valet  vault  VDI  Verdasys  Vericept  version  video  viewer  views  virtex  virtual  virtualbox  virtualization  virtuozzo  vision  Visionys  visualization  visualizer  Vitaero  VM  VMware  VMWare  vnc  voice  voicemail  VoIP  Vontu  vulnerability  WAF  wakame  Wakame-fuel  Wakame-vdc  WASP  WDS  wearable  web  webAPI  webapp  webapps  webcam  webconferencing  webdev  webM  websense  website  webtop  whitelist  whitelisting  widget  wifi  wiki  window  windowed  windowopenss  windows  wipe  wireshark  WMI  word  worker  workflow  WorkSmart  wrike  write  WYSIWYG  X11  XGL  xilinx  XML-RPC  XMPP  XP  Xpra  XSS  yahoo  yubizo  YUI  Zembly  ZigBee  Zoho  zooomr 

Copy this bookmark: