asteroza + guard   18

"VMware Workstation and Device/Credential Guard are not compatible" error in VMware Workstation on Windows 10 host (2146361)
Because VMware are jerks and still haven't fixed hyper-v VHP support, you have to STILL disable credential guard
VMware  workstation  windows  10  hyper-v  credential  guard  sysadmin  tips  tricks 
july 2019 by asteroza
The Space Review: Space guardians
Decent argument for a Space Guard, an analogue to the Coast Guard
space  guard  spaceguard 
july 2018 by asteroza
VMWare Workstation cannot run on Windows 10 after recent update to Windows 10 - Stack Overflow
So the correct way to get VMware workstation running on Windows 10 1803 is disabling credential guard/device guard and the hyper-v role
VMware  workstation  windows  host  10  1803  HVCI  credential  device  guard  bypass 
june 2018 by asteroza
Enable virtualization-based protection of code integrity | Microsoft Docs
HVCI requires hyper-v, effectively locking out VMware workstation, but the HVCI security is top notch, and now available for all windows 10/2016 SKU's
windows  10  hyper-v  security  HVCI  control  flow  guard  credential 
december 2017 by asteroza
Standards for a highly secure Windows 10 device | Microsoft Docs
New MS minimum specs for high security Windows 10 setups. Nothing terribly surprising, but the push to hypervisor based security means they are slowly starting to push towards a Qubes approach?
windows  10  hardware  requirement  security  TPM  secure  boot  SLAT  IOMMU  64bit  hypervisor  guard 
november 2017 by asteroza
windows-itpro-docs/deploy-code-integrity-policies-steps.md at master · Microsoft/windows-itpro-docs
Protection script/guidelines for windows 10 device guard to try to hold off/block bypass methods
windows  10  device  guard  bypass  block  script  code  integrity  policy  security  pentesting  hacking 
june 2017 by asteroza
Tor Cloud
I dunno, it is cheap and rapidly increases the potential number of nodes, but you start to create observation choke points and single points of failure. it's one thing to be running tor on real hardware in a colo somewhere, it's quite another to be running tor in virtualized instances in a cloud computing cluster owned by a corporation that regularly assists law enforcement without a court order, which would allow memory peeping. The only defense against this is that these seem to be bridge/relay nodes and not exit nodes normally, but that doesn't solve the network monitoring issue.
amazon  EC2  tor  guard  exit  bridge  relay  node  setup  guide  howto  tutorial  reference  cloud  computing  security  privacy  anonymity  Delicious 
november 2011 by asteroza

Copy this bookmark:



description:


tags: