asteroza + movement   62

LAteral Movement Encryption technique (a.k.a. The "LAME" technique)
I wonder why let's encrypt didn't isolate the internal IP range DNS entry SSL certificates to a child CA cert that enterprises could explicitly distrust, which would quash this in a heartbeat.
internal  IP  range  SSL  TLS  certificate  letsencrypt  lateral  movement  encryption  security  hacking  pentesting 
september 2018 by asteroza
ClearMotion - Home
Really active suspension, similar to the telescopic spoke smartwheels in Snowcrash, where active sensors map upcoming road surfaces and plan suspension travel to maximize adhesion. Perhaps now a logical consequence of autonomous driving sensor technology, which must map the local road environment anyways?
Bose  active  suspension  automotive  technology  research  transportation  car  predictive  movement  stability  augmentation 
april 2018 by asteroza
TechNet ATA Suspicious Activity Playbook
This article will walk through the credential theft attack techniques by using readily available research tools on the Internet.
windows  security  credential  theft  lateral  movement  detection  guide  reference  information  pentesting 
october 2017 by asteroza
JPCERT/CC Blog: Verification of Windows New Security Features – LSA Protection M...
So the short story is the increased security from LSA Protection Mode or Credential Guard protects domain users mostly, if domain password caching is disabled. But local passwords are still vulnerable to Mimikatz, and password reuse is a thing...
Windows  domain  logon  password  hash  security  research  lateral  movement  pentesting  hacking  Delicious 
november 2016 by asteroza
Configuring Additional LSA Protection
So this one registry change can stop a lot of lateral movement apparently...
windows  security  microsoft  LSA  lateral  movement  pentesting  registry  Delicious 
january 2016 by asteroza
Bit By a Mouse: Data Via Pointer Motion | It's Every Bit For Himself
Interesting... Wonder if a little Nethunter rubby ducky action might work, if keyboard logging was enabled on the PC...
mouse  pointer  movement  side  channel  data  transfer  security  research  hacking  Delicious 
october 2015 by asteroza
MYO - The Gesture Control Armband
Interesting hardware that tries to detect lower arm muscle contraction consistent with hand gestures as a means of handsfree gesture control. Bluetooth, but it looks like it needs gesture interpretation software so it isn't using a standard HID profile probably.
control  hardware  armband  muscle  gesture  remote  HID  bluetooth  contraction  wireless  Myo  detection  movement  handsfree  arm  devices  electronics  Delicious 
february 2013 by asteroza
ESTOMAD - Home
Interesting work on reducing energy consumption of mechanical movement in industrial machines via software simulation. For a business though, there is the balance between production throughput and energy savings that would need to be considered.
mechanism  robot  machine  simulation  software  industrial  movement  ESToMaD  arm  low  kinetics  energy  design  Delicious 
february 2013 by asteroza
株式会社MUJIN
So apparently these guys are behind the hot open source python based robot arm motion control/planning software OpenRAVE right now in industry. They do it all, from individual arm movement, to workspace layout optimization, to multi arm coordination, all to cut down manufacturing time, and the time to reconfigure a line. Apparently they also provide the optimization as a cloud based service, where you can get them to run hardcore layout optimization simulation much faster at a fraction of the cost.
OpenRAVE  robot  arm  motion  controller  movement  plan  planning  cloud  service  python  opensource  IREX  robotics  manufacturing  line  layout  optimization  multi  multiple  coordination  production  system  lifecycle  analysis  Delicious 
march 2012 by asteroza
モバイル空間統計 | 企業情報 | NTTドコモ
NTT doing research using aggregated cellphone user spatial coordinate statistics to provide insight into commuter movements to help urban planning for transportation networks
NTT  DoCoMo  mobile  user  spatial  location  statistics  urban  planning  visualization  human  commuter  movement  commuting  migration  Delicious 
june 2011 by asteroza
Video: Intermot Motorcycle Show - a 210bhp four, two six cylinders and an astonishing V8 Ducati
That Ducati V8 uses a very interesting rocker mechanism to link outer and inner pistons in a single piston bank so the piston bank has a single drive crank conrod for transmitting the power to the crankshaft. A kind of pseudo-boxer configuration within a single piston bank. Potentially very compact, but I wonder how well it works?
Ducati  V8  motorcycle  engine  motor  rocker  piston  mechanism  movement  vehicle  transportation  technology  conrod  Delicious 
october 2010 by asteroza
Asiajin » Cellphone Checks If Employees Goofing Off
KDDI decides to top NTT DoCoMo's employee walking/health monitoring trick using cellphone accelerometers to do employee profiling to catch the sleepers. Of course this may be useless in the back office where people have their butts parked in chairs for 2 hours at a stretch.
japan  KDDI  cellphone  mobile  phone  accelerometer  data  analysis  employee  physical  movement  work  habit  mining  profiling  monitoring  bigbrother  Delicious 
march 2010 by asteroza
Is It For Monitoring Your Performance, Or Preventing You From Adult Disease? | Asiajin
Because in japan, companies can now be fined for having overweight employees over the age of 40 (metabo), there are efforts by companies to increasing invade the life of employees "to incentivise" them to lose weight. DoCoMo is proposing retrieving pedometer data from cellphones and providing that directly to the company HR department, so they can "offer" health advise (aka lose weight or we ship you off to the countryside and drop your salary by shifting you to a lower position). Secondary usage could include human movement data for HR to determine if workers doing physically active jobs are slacking off. 1984 was only off in that Big Brother is an umbrella term for both corporate and government control of the people, which fits in great with the pseudo-fascist leadership trusting culture of japan. Though this is more an artifact of how the law was implemented. They could have made it as a personal income tax, with tax credits to healthy people, which can be easily corporate managed.
japan  docomo  cellphone  mobile  phone  pedometer  remote  data  tracking  monitoring  health  service  movement  exercise  bigbrother  metabo  metabolic  syndrome  Delicious 
may 2009 by asteroza
Next Big Future: What if Everyone had Exoskeletons Just for Getting Around and Carrying Stuff?
Forget carrying a separate electric bike with common powerplant/energy storage with the exoskeleton. Integrate wheeled propulsion directly into the exoskeleton instead. If japanese anime has taught me anything, rollerskating exoskeletons are made of WIN.
green  energy  storage  common  boot  transportation  vehicle  motorcycle  electric  powerplant  robotics  bicycle  bike  spring  mobility  movement  bionic  exoskeleton  walker  assisted  HULC  BLEEX  Delicious 
march 2009 by asteroza
Next Big Future: Electric Bikes Compatible with Exoskeleton
Forget carrying a separate electric bike with common powerplant/energy storage with the exoskeleton. Integrate wheeled propulsion directly into the exoskeleton instead. If japanese anime has taught me anything, rollerskating exoskeletons are made of WIN.
green  energy  storage  common  transportation  vehicle  motorcycle  electric  powerplant  bicycle  bike  mobility  movement  exoskeleton  assisted  HULC  BLEEX  Delicious 
march 2009 by asteroza

related tags

accelerometer  action  active  activism  activity  actuator  AD  administrator  advertising  advice  air  aircraft  airplane  alternative  analysis  analytics  animal  animation  APT  APU  arm  armband  assisted  ATA  attack  audio  augmentation  automation  automotive  aviation  badGPO  beacon  behavior  behavioral  bicycle  bigbrother  BigDog  bike  bioaerial  biodynamics  biological  biology  biomechanics  biometrics  bionic  BLEEX  bloodhound  blueteam  bluetooth  boot  Bose  box  business  C#  C2  cadence  car  cellphone  certificate  change  channel  child  civil  client  cloud  code  COM  commands  common  commuter  commuting  connectivity  conrod  consumer  contraction  control  controller  cooling  cooper  coordination  copyright  credential  cryogenic  cryptography  customer  data  defense  Delicious  delivery  democracy  deny  design  detection  devices  DFIR  digital  dinosaur  directory  docomo  domain  downloading  drive  Ducati  dynamic  dynamics  electric  electron  electronics  employee  encryption  endpoint  enduser  energy  engine  engineering  escalation  ESToMaD  event  execution  exercise  exoskeleton  exploit  eye  face  fake  false  filter  filtering  fingerprint  firewall  flight  flying  footpath  framework  fraud  fuzzy  gear  general  gesture  governance  GPO  graph  green  ground  group  guide  guidelines  habit  hacking  handsfree  haptic  hardware  hash  health  heat  HID  howto  HULC  human  humor  hybrid  ID  IDS  illustration  image  incident  indoor  industrial  information  intensity  interaction  interface  internal  internet  intonation  IoC  ionic  IP  IR  iRevolution  IREX  japan  japanese  jiggler  jump  jumping  KDDI  kinematics  kinetic  kinetics  Kiva  landing  laptop  lateral  launch  law  layout  learning  leg  letsencrypt  library  lifecycle  line  LittleDog  lobbying  local  location  locator  locomotion  log  logging  login  logistics  logon  low  LSA  machine  management  mangement  manufacturing  marketing  materials  mechanical  mechanism  metabo  metabolic  metrics  MIAU  microphone  microsoft  migration  mimikatz  mining  MIT  mitigation  MMC  mobile  mobility  monitoring  motion  motor  motorcycle  mouse  movement  multi  multidirectional  multiple  muscle  Myo  neo4j  network  notebook  NTT  obedience  object  offensive  omnidirectional  omniwheel  OpenRAVE  opensource  oppression  optimization  organization  P2P  pair  paleontology  pass  passenger  passing  password  path  PathIntelligence  PC  pedometer  pentestiing  pentesting  permission  persistance  persistence  phone  physical  physics  piston  pivot  plan  planning  pointer  policy  politics  portia  position  positioning  power  powerplant  powershell  prank  predictive  prevention  privilege  process  production  productivity  profiling  propulsion  proximity  psychology  pterosaur  python  quadrupedal  quantum  range  read  reading  reality  realtime  recon  reference  refridgerator  registry  remote  research  resistance  response  restriction  retail  revolution  RFID  robot  robotics  rocker  RTLS  run  science  screen  search  security  self  sensor  service  side  simulation  social  sociometer  software  solid  spatial  speech  spider  splunk  spring  SSL  stability  state  statistics  storage  strategic  stringwalker  superconducting  surveillance  suspension  syndrome  sysadmin  system  tactical  takeoff  taxi  technology  tensorflow  Tessera  theft  theory  thermal  threat  tips  TLS  token  trace  tracker  tracking  transfer  transport  transportation  tricks  trigger  tripwire  tsukuba  tutorial  UGV  ultrasonic  ultrasound  university  urban  USB  user  users  V8  vehicle  virtual  visualization  VR  walker  walking  warehouse  WDATP  wheel  wiebetech  windows  WinRM  WinRS  wireless  WMI  work  write 

Copy this bookmark:



description:


tags: