network   137808

« earlier    

Apple's social media efforts fail again as Apple Music Connect to shut down in 2019
When Apple Music launched in June 2015, Connect was initially pushed as hard as any other aspect of the service, and many musicians were quick to hop on. Interest rapidly faded both from artists and the public, however, in some cases leaving launch content as the only Connect material on profiles.

In its letter to artists, first reported by 9to5Mac, Apple spins the pending shutdown as "streamlining music discovery."

"This means you'll no longer be able to post to Connect as of December 13, 2018, but all previously uploaded content will still be searchable until May 24, 2019," the letter reads.

Connect is Apple's second failed attempt at music-based social media. In 2010 the company launched Ping, which like Connect let people follow their favorite artists. People were also able to find out what music and concerts their friends were interested in, and share their thoughts online.
spunti  social  network  apple  music  applemusic  storia  ping 
39 minutes ago by nicoladagostino
XRay is a tool for recon, mapping and OSINT gathering from public networks.
XRay is a tool for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network mapping automatic.

XRay is a very simple tool, it works this way:

1. It'll bruteforce subdomains using a wordlist and DNS requests.
2. For every subdomain/ip found, it'll use Shodan to gather open ports and other intel.
3. If a ViewDNS API key is provided, for every subdomain historical data will be collected.
4. For every unique ip address, and for every open port, it'll launch specific banner grabbers and info collectors.
5. Eventually the data is presented to the user on the web ui.

It can use Shodan and ViewDNS for much richer information gathering.
network  security  pentesting 
16 hours ago by tobym
A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.
Rudra aims to provide a developer-friendly framework for exhaustive analysis of (PCAP and PE) files. It provides features to scan and generate reports that include file's structural properties, entropy visualization, compression ratio, theoretical minsize, etc. These details, alongwith file-format specific analysis information, help an analyst to understand the type of data embedded in a file and quickly decide if it deserves further investigation. It supports scanning PE files and can perform API scans, anti{debug, vm, sandbox} detection, packer detection, authenticode verification, alongwith Yara, shellcode, and regex detection up on them.
network  security  pentesting 
16 hours ago by tobym
Ncrack - High-speed network authentication cracker
Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and John the Ripper, and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.

Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more. Protocols supported include SSH, RDP, FTP, Telnet, HTTP(S), POP3(S), IMAP, SMB, VNC, SIP, Redis, PostgreSQL, MySQL, MSSQL, MongoDB, Cassandra, WinRM and OWA.

Ncrack is released as a standalone tool
network  password  security  pentesting 
16 hours ago by tobym
Moloch
Similar to Wireshark, but focused on network security.

Moloch is an open source, large scale, full packet capturing, indexing, and database system.

Moloch augments your current security infrastructure by storing and indexing network traffic in standard PCAP format, while also providing fast indexed access (with ElasticSearch). Moloch is not meant to replace Intrusion Detection Systems (IDS), instead it provides more visibility. Moloch is built with an intuitive UI/UX which reduces the analysis time of suspected incidents.
network  security 
16 hours ago by tobym

« earlier    

related tags

&  1st  2nd  3rd  802.11n  @networkfieldday  a16z  abstraction  adapter  adapters  address  addressing  adsl  age  aggregate  alpine  alternative  analytics  anaplan  app  apple  applemusic  application  architecture  arp  article  aws  azure  benchmark  bff  blog  broadway’s  browsers  bt  building  business  caching  calibre  capture  ceo  chain  chains  cheatsheet  check  checker  cilium  cisco  classification  cli  clinicalai  cloud  cloudkit  coding  collaboration  command  commercial-properties  company  concurrency  connection  connections  console  content  contentsecuritypolicy  corruption  csp  css  curl  daily_reads  dao  dashboard  data  delivery  depaul  design  development  devops  dhcp  digital  discovery  distributed  dns  docker  domains  dongles  drawing  draytek  driving  drugdiscovery  ebay  ec2  education  electrical  electricity  elixir  encryption  engineer  engineering  envoy  erlang  esxi  ever  excellence  facebook  falcor  file-system  firewall  fordjbatman  funny  global  go  google  googleplus  graph  graphql  grenoble  growth  guide  hacking  hardware  harmful  heating  homehub5  homomorphic  howto  html  http  http2  https  ideas  ifconfig  in  infinity  information_security  inspiration  intelligence  interactive  internet  interview_questions  interviews  iosdev  iot  ip  ipam  it  janitorial-service  javascript  jk-analyst  jk-software  jk-webtools  jk-www  k8s  kernel  kitz  kokotap  kramshoej  kubernetes  l7  labor  lan  lang:en  lang:fr  library  libvirt  linux  load-balancing  loadbalancer  loadbalancing  lyft  mac  macos  mailing_list  makerspace  managedinstance  management  matters  mdnsresponder  mediashift  mesh-network  mesh  message  messaging  metadate  metrics  microsoft  modem  monitoring  montreal  more  msdn  mtu  music  nas  netbios  netflix  networkcoding  networking  networks  neural  news  newsletter  newsreader  nfd  nginx  nmap  node.js  notifications  npm  of  onkyo  online  online_tool  opensource  os  packet  packets  paradox  password  patterns  pcrichard.com  pentesting  performance  pharma  php  ping  plannning  platform  pod  policy  presentation  privacy  private  process  programming  projections  prometheus  propagation  proptech  proteomics  protocol  proxy  radio  receiver  redis  reference  regulation  renewable  research  ridehailing  ridesharing  ridesoucing  ripe77  router  rss  ruslana  saas  scale  scan  scanner  scanning  search  security  server  service  share  shodan  shop  signing  sigs  simplification  small  smart  social  socialmedia  sockets  software  solar  spunti  sqldb  sqlserver  ss  ssdp  ssl  standards  startup  store  storia  stretch  subscription  supply  synology  sysadmin  tapping  taxi2013  tcp  technology  terminal  testing  than  the  things  threat  tls  tnc  tool  tools  topology  transportation  tutorial  type:tool  uber  uncategorized  unread  upnp  usb  user  uwf1  vagrant  video  vigor  visio_alternative  visualization  vlan  vmware  vpn  vxlan  waymo  web  webdev  whiteboard  whitepaper  wi-fi  wifi  wikipedia  windows  wireless  writing  wsd  xml  | 

Copy this bookmark:



description:


tags: