asteroza + user   257

[SIGGRAPH 2019] Vidgets: Modular Mechanical Widgets for Mobile Devices - YouTube
Using physical widgets paired with a smartphone IMU to provide additional buttons/user interfaces without direct electrical connection
Vidget  modular  mechanical  widget  physical  user  interface  button  HCI  UI  research  technology  smartphone  IMU 
june 2019 by asteroza
4964(S) Special groups have been assigned to a new logon. (Windows 10) | Microsoft Docs
Throwing important AD users into a special security audit group will raise security events in the event log to allow easier tracking. Useful for exploring an environment where people have hard coded certain accounts or registered a task/service with an inappropriate account
windows  AD  active  directory  special  user  login  audit  security  group  event  log  hacking  pentesting  defense  WEFFLES 
november 2018 by asteroza
Eye tracking technology | BAE Systems | International
Wearable cockpit is an interesting nomenclature, for an AR HUD.
military  virtual  cockpit  AR  HCI  UI  GUI  user  interface  gesture  HUD  wearable 
september 2018 by asteroza
Emoji usage in your domain – Joe McCormack – Medium
Probably limited to 10/2016, but MS did backport emojis to 7 so...
windows  unicode  emoji  password  domain  user  AD  security  hacking  pentesting 
september 2018 by asteroza
Caulis | Cloud-based Fraud Detection Provider
Frontend javascript calls this service to monitor user behavioral patterns to determine abnormalities and fraudulent logins/usage.
japan  cloud  internet  login  security  user  behvior  analytics  fraud  monitoring  detection  startup 
september 2017 by asteroza
p3nt4/metasploit-modules: This module will change a local user's password direct...
Metasploit module for directly carving out and replacing password hashes to forcibly change a user password.
metasploit  module  security  pentesting  hacking  windows  user  password  change  registry  attack  hash  carve  Delicious 
december 2016 by asteroza
Through the Google Glass: The impact of heads-up displays on visual attention | ...
An interesting takeaway is the thesis that HUD notifications compete for language processing time in the visual cortex due to unconscious tendency to process language. This might imply text notifications are worse than iconography, but what about situations where single word characters exist like in japanese/chinese? Is that language processing, or iconography pattern matching?
HUD  HMD  cognitive  load  psychology  HCI  human  user  interface  design  UX  Delicious 
november 2016 by asteroza
Network Cookies
SO the idea is standard network neutrality policy talk is centered on transit not being discriminatory, when the goal is user experience. If the user themselves are better about flagging QoS preferences of their own traffic and transit respects that, then transit providers can use those hints as a guide. Assuming no provider messes with that, and there are no other bad actors...
network  neutraility  cookies  user  flag  QoS  preferential  delivery  networking  research  Delicious 
september 2016 by asteroza
Storage Performance Development Kit
In the vein of performance differences between FreeBSD and Linux in networking, this is an alternative to libaio.
userspace  userland  user  mode  storage  driver  framework  alternative  libaio  high  performance  poll  software  NVMeOF  iSCSI 
july 2016 by asteroza
Why I turned down $500K, Pissed off my investors, and Shut down my startup — Sta...
Not enough instant killer app to hook a customer, even if long term use has clear advantages.
startup  business  management  failure  user  engagement  Delicious 
june 2016 by asteroza
PowerPath/FindShortestPath.ps1 at master · andyrobbins/PowerPath
How to locate a domain admin account on a PC that is hop/chainable from the current PC.
windows  domain  AD  administrator  admin  graph  graphing  user  search  pentesting  security  hacking  powershell  Delicious 
february 2016 by asteroza
openvpnScraper.sh
Ha, dumping user/pass from live openVPN connections
OpenVPN  live  process  user  password  scraper  dumper  security  research  software  hacking  Delicious 
october 2015 by asteroza
Seastar
C++ framework that does some extreme things to achieve async performance
C++  programming  framework  async  development  user  mode  userland  TCP  stack  HTTP  high  performance  networking  network  software  opensource  Delicious 
september 2015 by asteroza
Touch | Multitouch Anywhere and More by Ractiv
Camera based gesture tracking as interface device. So a function specific form of Kinect?
multitouch  touch  gesture  user  interface  hardware  electronics  devices  USB  HID  mouse  camera  video  tracking  windows  mac  OSX  Delicious 
august 2014 by asteroza
Transient Authentication for Mobile Devices
Dissertation by Mark Corner on transient authentication systems, with application to encrypted files systems. See also http://forensics.umass.edu/pubs/mcorner/sigops02.pdf
users  encryption  authentication  transient  security  ZIA  user  filesystem  storage  mobile  Delicious 
september 2013 by asteroza
Swiss online storage – Secure online storage | SecureSafe
Interesting data inheritance feature, essentially a account access continuity mechanism to give logon information to family or work in case of death.
SecureSafe  password  manager  software  windows  mac  OSX  PC  iPhone  android  app  document  storage  logon  user  information  security  continuity  deadmans  switch  Delicious 
january 2013 by asteroza
- GestIC® Technology Design Center | Microchip Technology Inc.
Seems to detect movement within 6 inches of the antenna. So, something that moved really slowly, or stayed at a stable orientation, won't be detected, but it is good enough for basic gesture recognition. RF based, no cameras or ultrasound, suitable for embedded surfaces as an input source.
devices  electronics  hardware  UI  GUI  interface  user  gesture  sensor  field  electric  3D  GestIC  Delicious 
november 2012 by asteroza
Ultrasound Gesture Recognition - Elliptic Labs
Interesting touchless interface, based on ultrasound sensor mapping of hands in a space near the screen. Hardware dependent, but so is Leap or Kinect based systems. But, embedding the ultrasound mics and transducers in the edge of a display is a lot easier.
3D  hardware  software  recognition  ultrasound  GUI  UI  interface  user  gesture  space  touchless  8  windows  Delicious 
november 2012 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  2D  3d  4D  6D  8.1  AboutYou  acceleglove  accelerometer  acceptable  acceptance  access  accessibility  account  acount  active  activity  ad  adaptive  admin  administrator  adobe  advertising  affordance  agent  aggregate  aggregator  AI  air  Aireal  ajax  alert  Alexa  algorithm  alternate  alternative  analysis  analytics  analyzer  android  anthropology  AnthroTronix  antimalware  antivirus  apache  Apache2GDL  api  APM  APML  app  AppleJack  applet  appliance  application  AR  architecture  archival  archive  arm  art  ASP  ASP.NET  assistance  assistant  assurance  asterisk  async  attachment  attack  attention  audio  audit  augmented  AUI  AUP  aural  auralization  authentication  autolock  automated  automatic  automation  availability  Avant  aware  Awn  axis  banking  Basil  bastion  beacon  behavioral  behaviour  behvior  benchwork  bendable  Beryl  beta  BHTG  big  bigbrother  biometric  biometrics  blackdog  blast  blind  blink  block  blocker  blocking  blog  blogging  blueprint  Blueshark  bluetooth  bomb  boobytrap  bookmarking  bookmarks  bowser  braille  bridge  bRIGHT  broadcast  browser  BrowserHawk  BrowserHawkToGo  browsing  bug  business  butterfly  button  bypass  C#  C++  cable  CAD  call  CamBoard  camera  campaign  canary  canarytoken  cannon  canvas  capacity  card  carrier  carve  cellphone  Celluon  center  centric  change  channel  chart  chat  check  checking  chrome  chroot  CIPA  circumvention  citrix  civilian  cleanup  click  ClickHeat  clickmap  client  cloud  cluster  ClustrMaps  CNN  cockpit  codecs  cognitive  colemak  collaboration  collaborative  collection  comaprison  commentary  communication  communications  Communicator  community  commuter  commuting  compact  comparison  compatibility  complaint  compliance  computer  computing  concept  concurrent  config  configuration  confirmation  connection  consultant  consumer  consumption  contact  contactless  content  context  continuity  control  controlled  controller  controls  conversion  cookies  copmputer  copyright  corporate  correlation  coulomb  counter  CPU  cracker  cracking  crash  crashdump  crawler  credential  credentials  Credentica  crowd  crowdsourcing  cryptomneme  cultural  culture  current  customer  customization  Cybozu  cycling  D-Link  DAIDALOS  dark  data  database  DatabaseofIntentions  deadmans  debug  debugging  decision  deep  defense  degrees  del.icio.us  Delicious  delicious-mates  delivery  demographics  descriptor  design  desktop  detection  development  device  devices  diacritic  diacritics  digg  Digicash  digital  direction  directory  disable  disabled  discovery  Disney  display  distributed  DIY  Dock  DoCoMo  document  DoF  Dokan  doll  domain  dongle  doppler  DPI  drawing  driver  DRM  drone  dual  dump  dumper  dvorak  echo  echolocation  ecommerce  economy  edge  editing  education  EFS  eidentity  EIM  EkaPad  electric  electricity  electroactive  electromechanical  electronics  eloectronics  email  emoji  encryption  end  endpoint  energy  enforcement  engagement  engine  engineered  english  enhanced  enterprise  enumeration  environment  ergonomic  ergonomics  escalation  ESXi  EU  europe  event  evolving  evoMouse  exchange  executable  exfiltration  experience  experiment  experimental  expert  explanation  explorer  extraction  EYCIN  eye  eye-tracking  eyetap  eyetracking  fabbing  face  Facetime  fact  factor  fail  failure  fake  false  federated  feed  feedback  fiber  field  file  filename  filesystem  filetype:pdf  film  filter  filtering  finger  fingernail  fingerprint  firewall  flag  flash  flood  floor  floormat  flow  fluid  flutter  folder  folding  folksonomy  footpath  footprint  force  forecasting  form  forum  framework  fraud  fraunhofer  freedom  FrogPad  FUI  Fujitsu  FUSE  fuzzing  g-speak  Gallop  gaming  gaze  GEM  generated  generation  generator  geolcation  geolocation  germany  GestIC  gestural  gesture  GIF  glove  gloves  GNOME  Gobby  google  googlemaps  government  GP  Gpdisable  GPO  GPU  graph  graphic  graphics  graphing  green  greynet  grid  group  GSM  GTK  GTUG  guest  GUI  guidance  guide  guideline  guidelines  Gumtrail  habit  Hackerspace  hacking  hand  handsfree  haptic  haptics  hardhack  hardware  hash  HCI  head  health  heat  heatmap  HeatMapAPI  helicopter  helmet  heuristic  HID  hierarchy  high  hint  HIPAA  history  hive  hivemind  HMD  hobby  hole  home  honeytoken  host  howto  HTML  HTML5  HTTP  hub  HUD  human  humankind  Hummingbird  humor  hunch  hybrid  Hyper-V  IAX  IBM  iClassMifare  ID  idea  identification  identity  IdM  idol  IDS  IE7  iFrame  IM  image  immersion  impersonation  IMU  independent  indoor  industrial  information  infoviz  infrared  infrastructure  injection  innovation  input  inspection  installation  instant  Institute  instruction  integration  intellectual  intelligent  intentions  interaction  interactive  interation  interest  interface  interfaces  international  internationalization  internet  internet-of-things  interoperability  invasion  iPad  iPhone  IPS  iReport  iReport.com  iSCSI  iTunes  jail  japan  japanese  JAUG  java  javascript  jiggler  journalism  joystick  jquery  jTip  jump  kampff  keitai  key  keyboard  keymapping  keyword  killitwithfire  kinect  knowledge  knowledgebase  knuckle  KSI  lab  laboratory  Labs  landing  language  laptop  laser  lateral  latitude  layout  LBS  LDAP  least  levitation  liability  libaio  library  license  licensing  lifehacks  lifestream  light  LightVu  limited  limits  linux  live  liveCD  LM  load  local  localization  location  lock  lockdown  log  logging  login  logitech  logon  low  mac  macro  macrosense  magnetic  maintenance  managed  management  manager  manipulation  manual  map  mapping  maps  marketing  marking  markup  mashup  mat  materials  mboile  mechanical  media  media:document  mediated  medicine  memory  MEMS  message  messaging  metadata  metasploit  metrics  microformats  microphone  microsoft  migration  military  minchizu  mini  minidump  mining  Mirage  MIT  MITM  mixed  MMS  mob  mobile  mode  model  modular  module  monitor  monitoring  morphing  motion  moultitouch  mounted  mouse  movement  movements  movie  MR  MSGTAG  multi  multicopter  multimedia  multiple  multiplier  multitouch  multiuser  MySQL  nail  name  nanoprism  natural  navigation  Navigator  navy  near  NebuAd  neo4j  net  network  networking  networks  neutraility  news  newsgroup  next  NFC  Nielson  node.js  Nokia  non-admin  non-root  normal  Normob  notification  NTLMN  NTT  NTUSER.DAT  NVMeOF  oauth  obey  oblong  OLED  on  onboarding  OneAPI  online  only  OpenArch  OpenEyes  openID  OpenID  OpenNI  openNI  opensource  OpenVPN  operating  operation  Ophcrack  optimization  oriented  origami  OS  osx  otaku  output  p2p  packet  pad  page  painting  parameter  partition  pass  passenger  passmemory  password  patch  patent  path  PathIntelligence  PathTraq  pattern  PC  pen  pentesting  people  Peregrine  performance  peripheral  peripherals  perl  permission  person  persona  personal  personas  phone  photo  photoshop  php  phpMyID  Phweet  physical  Piccolo  pico  picture  ping  place  placegraph  planning  Plash  platform  plugin  pocket  PointGrab  poke  policy  polish  poll  polymer  polyphonet  pool  popularity  popup  port  portable  portal  position  POSIX  power  powershell  prank  prediction  predictive  preferential  presence  presentation  pressure  privacy  priveledge  priviledge  privilege  privledge  process  processing  product  productivity  profile  profiling  program  program.exe  programming  projection  projector  proof-of-concept  property  protected  prototype  provisioning  proxcard  proximity  ProxMat  pshtoolkit  psychology  pushpin  python  QA  Qeexo  QoS  quality  qwerty  rainbow  RAZR  RDP  read  reader  ReadNotify  reality  realtime  receipient  receipt  recognition  recommendation  recorder  recording  recovery  redirect  redirection  Redpin  reearch  reference  registry  remote  removal  repair  reply  reporting  research  researcher  restriction  result  retail  retractable  return  reuse  RFID  RID  rights  ring  Ringbow  risk  roaming  robot  robotreplay  root  RSI  RSS  runas  RUNASSPC  samsung  sandbox  sanitization  SANUR  science  scifi  scraper  screen  screencapture  screencasting  script  SDK  search  secondary  secure  SecureSafe  Securespot  Securina  security  semantic  sense  Senseg  SenseNetworks  sensing  sensor  sensors  SEO  separate  separation  serach  server  service  session  settings  setup  SFU  shared  sharing  sheeple  shell  Shibuya.JS  shift  ship  shop  sign  signal  similar  single  single-sign-on  SIP  SIPp  Siri  site  sixth  sixthsense  skin  skinput  Skype  sleeve  slim  small  SMART  smartcard  SmartHome  smartphone  smartskin  SmartSwitch  SMS  Snapkeys  SNS  social  society  software  SomeRightsReserved  sonar  SonarLoc  sonification  Sony  sound  SoundWave  SOX  SP1  space  SpacePilot  SpaceTop  spatial  spatiality  speaker  special  SRI  SRP  SSD  ssh  SSL  SSO  stack  stalking  standard  standards  standford  startup  station  statistics  stats  stick  storage  strength  string  structures  study  SUA  subtitle  suggestion  support  surface  surveillance  survey  switch  swype  sysadmin  sysinternals  system  systems  T9  table  tablet  tactile  tacton  tag  tagging  Tapster  targeted  TCP  Techmeme  technology  telephony  tension  terminal  test  testing  text  textbox  texture  theory  thin  thru  Tile  Tindie  tip  tips  tixel  Tobii  token  tokyo  toolkit  tools  tooltip  tooltips  topographic  total  touch  touchless  touchscreen  tow  tracker  tracking  traffic  training  transient  transparent  transportation  tree  treemap  trend  trick  tricks  tricopter  troubleshooting  trusted  turing  tutorial  twitter  TwitterHawk  two  typing  typography  UAV  ubiquitous  Ubuntu  UGC  ugokuhito  UI  ultrasonic  ultrasound  UMPC  unicode  unified  UniveRSS  unix  unusual  urban  usability  usage  USB  use  user  user-centric  Userful  userland  usermode  username  users  userspace  utilities  utilties  UX  vehicle  verification  vibrotactile  video  Vidget  virtual  virtualization  visitor  Visitrac  Vista  vistor  visual  visualization  VK  VM  VMware  voight  VoIP  VoIPLAN  VoIPWLAN  volume  voronoi  vortex  VR  vulnerability  VWLAN  Waaotn  Waarp  walking  wall  wearable  web  webAPI  webapp  webbug  webcam  webdesign  webdev  webkit  webpage  website  WEFFLES  weight  white  who.amung.us  widget  wiebetech  wifi  win32  Window  windows  wireless  workflow  workstation  wristPC  writing  XenApp  XenDesktop  XML  XP  yongfook  zeitgeist  zero  zeroknowledge  ZFS  ZIA  Zivios  ZKS  zone  zoomable  ZTIC  ZUI 

Copy this bookmark:



description:


tags: