asteroza + block   160

Windows Host File - Pastebin.com
Anti-microsoft hosts file. Note that this may cripple some windows features you actually use as well, like say SmartScreen/URS
windows  hosts  file  privacy  anonymity  block  security 
26 days ago by asteroza
Microsoft Update Catalog
The emergency patch for wannacry, via blocking SMB1, also available for XP/2003
kb4012598  microsoft  windows  update  SMB1  block  XP  2003  security 
march 2019 by asteroza
Microsoft recommended block rules (Windows 10) | Microsoft Docs
Oh hey, a list of known MS signed binaries that allow for unsigned execution, AKA LOLbins.
windows  defender  application  control  block  list  blocklist  security  hacking  pentesting  defense  blueteam  LOLbin 
january 2019 by asteroza
dw/acid: SQLite for NoSQL (WORK IN PROGRESS)
Formerly CentiDB, this has block compression on top of LMDB. Uses Python Tuple support for range queries on what would otherwise be a key-value store.
CentiDB  block  coompression  LMDB  data  base  opensource 
january 2019 by asteroza
Storage Alignment and VMFS Block Sizes |VMware Communities
Note NTFS will hate you for using anything other than 4K for anything other than a dedicated partition for a database. Many backup systems expect 4K, and boot partition usually must be 4K, and NTFS native (deflate) compression (up to 64GB but really 40GB sized files) only works on 4K.
VMware  ESXi  VMFS  VMDK  SAN  windows  NTFS  filesystem  block  alignment  size  matching  performance  storage  sysadmin  tips  tricks 
october 2018 by asteroza
Scalewings – Willkommen in der Welt von ScaleWings
Trying to build a hybrid engine block for airplanes, consisting of an electric motor/generator and two independent reciprocating engines (looks like V type). In theory, with a shared shaft, you can knock out one motor and two others should still cover you.
hybrid  engine  block  general  aviation  propulsion  research  technology  electric  motor  Germany 
october 2018 by asteroza
Application-Driven Data Services for Enterprises & Clouds | Datera
Doing a virtual SAN thing, as a software only platform to merge all your existing storage. Doing block now, probably will shortly do file and object as well. Which means fighting with the likes of VSAN and any other HCI platform...
virtual  SAN  software  platform  block  storage 
july 2018 by asteroza
Excelero
NVMesh is pretty neat as a SDS with the expectation of all nodes being initiators and targets, but it does put some additional load at the client to effectively implement a software storage controller at the client to determine how to split data to get RAID-esqe protection. Runs on regular TCP/IP now too rather than just fibre channel RDMA RoCE.
NVMeOF  NVMe  fabric  SAN  block  storage  software  NVMesh  distributed  SDS  RDMA  RoCE 
june 2018 by asteroza
Therapeutic luminal coating of the intestine | Nature Materials
Similar to gastric bypass surgery remove a segment of GI tract, or similar tubular net like structures inserted after the stomach, they effectively block nutrient absorption. So, the idea here is, make a pill that can temporarily coat the GI tract to block nutrient uptake. No need for heavy surgery and no risk of a mesh tube getting dislodged, but you need to take the pill regularly.
diabetes  treatment  gastrointestinal  tract  surface  coating  block  health  medicine  research 
june 2018 by asteroza
Altius Space Machines Selected for 2 NASA SBIR Phase 1 Awards – Parabolic Arc
MagTag could be the new lego for cubesats to heterogeneously recombine based on work objective.
MagTag  electropermanent  magnet  EPM  newspace  satellite  bus  modular  block  interface  space  research  technology 
june 2018 by asteroza
Security Settings for COM objects in Office
How to kill flash in office, don't forget the wow6432node keys to cover 64bit OS with 32bit office
windows  security  office  flash  block  registry  key 
june 2018 by asteroza
Wi-Fi Privacy Police - Apps on Google Play
Trying to keep the wifi stack from broadcasting known AP names, as a data leakage point
android  app  software  wifi  AP  accesspoint  name  block  security  privacy  anonymity 
june 2018 by asteroza
Отслеживание количества актуальных IP адресов из выгрузки Роскомнадзора
SHowing number of IP's blocked by russian federal censors. Sudden jump to over 16 million IP's is due to spat with Telegram, which is domain fronting from google and AWS.
russia  IP  block  live  statistics  dashboard  censorship 
april 2018 by asteroza
blocklists/all at master · jmdugan/blocklists
Appears to be huge anti-facebook hosts file block, covers whatsapp and instagram too?
antisocial  hosts  file  security  privacy  blocklist  block  list 
march 2018 by asteroza
Privacy Pass – Add-ons for Firefox
Cloudflare's CAPTCHA bypass solution, using blinded tokens. Basically, you do one captcha, and you are afforded a certain number of accesses based on that token, so Cloudflare harasses VPN/tor users less.
firefox  plugin  addon  extension  cloudflare  CAPTCHA  bypass  crytographic  blind  blinded  token  security  VPN  tor  access  block  browser  privacy 
february 2018 by asteroza
windows-itpro-docs/deploy-code-integrity-policies-steps.md at master · Microsoft/windows-itpro-docs
Protection script/guidelines for windows 10 device guard to try to hold off/block bypass methods
windows  10  device  guard  bypass  block  script  code  integrity  policy  security  pentesting  hacking 
june 2017 by asteroza
SUSE Enterprise Storage | SUSE
SUSE pushing out management tools for Ceph, now cover object/file/block storage , and reasonable per node pricing rather than per TB
SUSE  linux  Ceph  distributed  storage  filesystem  management  software  object  file  block 
december 2016 by asteroza
SDelete hangs at 100% - Sysinternals Forums
Something weird about SDelete 2.0 causing it to slow down.
SDelete  zero  block  slow  erase  free  VMware  windows  Delicious 
october 2016 by asteroza
Dmitriy Primochenko Online - Repartition Bad Drive
Slightly shady tool for partitioning out bad sector blocks, if you have no more spare blocks to map out with
HDD  hard  disk  sector  bad  block  mapping  remapping  remap  partition  hide  hidden  sysadmin  tools  utilities  tips  tricks  Delicious 
august 2016 by asteroza
MS16-099: Security update for Microsoft Office: August 9, 2016
They backported the office 2016 macro internet download block to office 2013, but only via GPO
microsoft  windows  office  AD  GPO  internet  macro  block  2013  Delicious 
august 2016 by asteroza
BlockWindows/hosts at master · WindowsLies/BlockWindows
Supposedly a windows 10 telemetry block hosts file, but the 0.0.0.0 routing will probably get noticed by the OS. Note W10 telemetry is hard coded, so putting this file on a W10 box does nothing, it must be done by the upstream DNS.
windows  10  telemetry  block  DNS  hosts  file  security  privacy  anonymity  Delicious 
july 2016 by asteroza
[MS-FSCC]: Zone.Identifier Stream Name
Ah, so that's where it was hiding the unsafe downloaded file marker...
microsoft  IE  download  file  block  marker  alternate  data  streams  security  hacking  pentesting  Delicious 
march 2016 by asteroza
Brave Software | Building a Better Web
Ad blocking focused browser fork. But if you aren't using tor, isn't your privacy already compromised?
ad  block  blocking  web  browser  software  opensource  Delicious 
january 2016 by asteroza
Ultimate Outsider - Software Downloads
Not perfect but does a decent job of blocking the forced windows 10 upgrades
GWX  control  pnael  block  windows  update  10  7  sysadmin  tools  utilities  tips  tricks  Delicious 
january 2016 by asteroza
Ultimate Outsider: Using GWX Control Panel (formerly GWX Stopper) to Permanently Remove the 'Get Windows 10' Icon
This miiiight block the windows 10 forced upgrade, but microsoft is playing dirty tricks again...
windows  7  8  8.1  forced  upgrade  10  block  software  GWX  sysadmin  tools  utilities  tips  tricks  Delicious 
december 2015 by asteroza
Microsoft Will Resume Pushing Windows 10 To Machines With Win7, 8.1 - Slashdot
Registry entry to try to stop GWX, the windows 10 upgrader, but apparently microsoft is now ignoring this somethimes and installs windows 10 anyways.
windows  7  8  8.1  forced  upgrade  10  block  registry  GWX  Delicious 
december 2015 by asteroza
NetGuard - no-root firewall - Android Apps on Google Play
no root because it doesn't alter the hosts file, uses loopback VPN?
android  app  software  firewall  security  privacy  Delicious  ad  block  blocking 
november 2015 by asteroza
Weblock - AdBlock for iOS
Hrm, using a proxy PAC file methodology is interesting, along with the redirect to google DNS servers that immediately drop the connection.
iOS  ad  block  blocker  app  software  iPhone  Delicious 
september 2015 by asteroza
めがねのまち鯖江が挑戦する『近未来のメガネ』開発に参加しませんか!| FAAVO さばえ
So japan's National Institute of Informatics decided making a set of eyeglasses that disrupt facial recognition algorithms would make a good crowdfunding campaign. I suppose this is marginally more acceptable than facedazzle makeup, but without the IR LED's to blind security cameras, this probably has limits.
japan  crowdfunding  privacy  visor  sunglasses  eyeglasses  facial  recognition  block  defense  countermeasure  anonymity  Delicious 
august 2015 by asteroza
SyncStop, USB Condoms - Protect your mobile phone from accidental syncing and malware!
Blocking the data pins usually also blocks negotiating higher charge speeds. But, apparently this will protect against the USB killer power surge attack dongle.
SyncStop  USB  condom  power  charge  recharge  adapter  hardware  electronics  devices  security  data  block  sync  blocking  dongle  protection  Delicious 
june 2015 by asteroza
« earlier      
per page:    204080120160

related tags

2U  3D  8.1  128bit  AAC  absorption  accelerator  access  accesspoint  active  activism  ad  adapter  adblock  addon  address  advertising  aerated  AERCON  agent  air  algorithm  alignment  alterantive  alternate  alternative  amazon  analysis  android  angle  anonymity  anti-skimming  antiad  antiexploit  antiforensics  antimalware  antiRFID  antisocial  antispam  antispyware  antisurveillance  antitracker  antivirus  AOE  AP  app  apparel  application  architecture  array  art  attack  audit  auditing  autoclaved  automatic  automation  autorun  availability  aviation  AWS  axle  backed  background  backup  bad  bandgap  base  Bcache  beacon  beast  belt  blacklist  blazer  blind  blinded  block  blocked  blocker  blocking  blocklist  BlockMaster  blocksize  blueteam  bluetooth  brick  broswer  browser  bug  bugfix  building  burst  bus  business  bypass  cache  caching  cage  cam  Camellia  camera  camouflage  CAPTCHA  card  CBT  CD  CDN  Ceedo  censorship  CentiDB  Ceph  CFS  challenge  changed  channel  charge  charity  china  chord  chosen  chrome  cipher  Citrix  clearance  clipboard  cloak  clothing  cloud  cloudflare  cluster  clustering  coating  code  coinhive  compact  compliance  compliant  component  compression  computing  concrete  condom  condutivity  configuration  connector  construction  container  control  Controlguard  controls  conversation  conveyor  cookie  cooling  coompression  cooperative  copy  core  cortana  CoSoSys  count  countermeasure  countersurveillance  country  CoW  crowdfunding  cryptography  cryptominer  crytographic  curated  customization  cut  dashboard  data  database  DataPac  DBLK  dedup  deduplication  defender  defense  delete  Delicious  density  deny  deobfuscation  design  desktop  development  device  devices  DHash  DHCP  DHT  diabetes  dimming  diode  dioxide  directory  disable  disk  distributed  DLP  dm-cache  DNS  domain  donation  dongle  donotcall  door  download  DRBD  DRDB  drive  driver  duodenum  dymanic  EBS  edit  elastic  electric  electromagnetic  electron  electronics  electropermanent  element  email  Emprise  encrypted  encryption  endpoint  energy  enforcement  engine  engineering  enterprise  environment  EPM  EPRD  EPS  erase  ESXi  ESXI  evaporative  eventually  exploit  extension  extrusion  eyeglasses  fabber  fabbing  fabric  face  facial  factor  failover  faraday  fiber  field  file  filesystem  film  filter  filtering  finance  FireFly  firefox  FireHOL  fireproof  firewall  firewire  fix  flash  flashcache  flexible  floor  food  forced  forensic  forensics  form  frame  free  freeware  Fujitsu  FUSE  gas  gastric  gastrointestinal  general  geoIP  Germany  gift  giving  glass  Glype  gmail  google  government  GPO  gravity  green  grid  group  GRUB4DOS  guard  guide  GWX  HA  hacking  hard  hardware  hash  HDD  healing  health  heat  hexagon  hidden  hide  high  hoodie  host  hosting  hosts  hotfix  howto  humber  hybrid  IBM  ICA  ID  IDE  IE  image  incidence  inclined  infection  infiniband  information  infrared  inline  instance  insulator  integrity  intelligent  intercept  interface  interlocking  internet  interstitial  intestinal  intrusion  investigation  IO  iOS  IP  iPhone  IPSEC  iptables  IPv6  IR  IrDA  ISCSI  iSCSI  ISE  isolation  jacket  jam  japan  javascript  jeans  kb4012598  kernal  kernel  key  L2ARC  LCD  leakage  lego  length  lessfs  light  lightweight  liner  link  LinkScanner  linux  liquid  list  listing  live  LMDB  lock  lockdown  log  logging  LOLbin  loopback  low  mac  macro  magic  magnet  magnetic  MagTag  malware  management  manufacturing  map  mapping  marker  mask  masonry  matching  material  materials  MDM  mechanism  medicine  memory  mesh  MetaboShield  microsoft  minimum  mirror  mirroring  MitM  MLC  mobile  modular  money  monitoring  motor  mount  multicast  name  NAND  NEC  netblock  network  networking  NetWrix  nevironment  newspace  NFC  nigeria  noscript  notepad  NSA  NTFS  NTT  nutrient  NVMe  NVMeOF  NVMesh  obesity  object  obscurity  office  omnidirectional  opensource  opt-out  optics  OSX  overlay  p2p  pair  pants  parity  partition  parts  password  passwordless  patch  paypal  PC  PDF  peer  PeerBlock  peltier  pentesting  performance  persistent  personal  phone  photo  photography  PHP  PHPproxy  physical  pixel  PKI  plaintext  platform  play  plugin  pnael  poison  polarizing  policy  porous  port  portable  power  powershell  prefabricated  prevention  primary  print  printable  printer  printing  privacy  productivity  programming  propulsion  protection  prototyping  proxy  PsExec  push  R2  rackmount  RAID  railway  RAM  ransomware  RDMA  realtime  recharge  recognition  recorded  recorder  recovery  reduction  reference  registration  registry  regulation  remap  remapping  remote  removal  repair  replication  research  response  result  RFID  robocall  robotics  RoCE  RSA  rule  rules  russia  S3  s3backer  safari  SAN  SATA  satellite  satlet  Scalado  scan  science  script  SCSI  SD  SDelete  SDS  SEAL  search  sector  secure  SecureItEasy  SecurID  security  self  send  server  service  services  setting  setup  shadow  sheet  shield  shot  sideload  signal  SIMON  size  skype  sleeve  slow  small  SMB1  smuggling  snapshot  software  solution  sound  space  spam  SPECK  speech  SPIT  spyware  SQL  SR5  SSD  SSH  SSL  startup  statistics  still  storage  streaming  streams  structure  summer  sun  sunglasses  sunlight  supression  surface  survey  SUSE  sustainability  switzerland  symmetric  sync  SyncStop  sysadmin  system  table  technology  telemarketing  telemetry  telephone  telephony  template  test  thermal  thin  tier  tiered  time  tips  TLS  toggle  token  toolkit  tools  tor  tracking  tract  train  treatment  tricks  tube  tunable  tuning  turing  tutorial  U3  ublo  uBlock  uncertified  unicast  unknown  unlock  UNMAP  update  upgrade  URL  USB  user  utilities  vanadium  variable  VDI  video  virtual  virtualization  visor  Vista  visualization  VM  VMDK  VMFS  VMware  voice  VoIP  VPN  warehouse  weak  web  website  weight  Whiptail  whitelist  width  wiebetech  wifi  WinAOE  window  windows  WinVBlock  wipe  wireless  write  writeback  WWF  Xiotech  XLR8r  XP  YouTube  Zecurion  zero  ZFS  ZIL  Zlock 

Copy this bookmark:



description:


tags: