asteroza + inspection   46

Network Detective Overview
Apparently not bad at exploring the dark corners of an environment?
sysadmin  tools  utilities  software  networking  security  audit  compliance  discovery  inspection 
july 2018 by asteroza
Near term they are offering vision systems for product defect detection
AI  manufacturing  product  defect  machine  computer  vision  inspection 
december 2017 by asteroza
Using tor as a second circuit to check for MitM SSL/TLS attacks. Not entirely out-of-band, but close enough?
SSL  TLS  security  rogue  CA  certificate  inspection  tor  checker  tester  MitM  Delicious 
october 2016 by asteroza
ITU-T Work Programme
Y.2770 is a DPI spec from the ITU for national or provider level deep packet inspection and surveillance of network traffic. Basically it's an attempt at standardizing the surveillance tools of police states, arguably to make it cheaper to implement. It's things like this that make a UN/ITU internet takeover look worse than the alternative (leaving the US in charge). Naturally, promoted by Russia, China, and a number of middle eastern states...
internet  politics  anonymity  privacy  evil  standard  surveillance  monitoring  network  DPI  inspection  packet  deep  Y.2770  ITU  Delicious 
december 2012 by asteroza
Asiajin » Japanese Government Allows ISPs to Target Ads by Browsing History
Ah, so this is the carrot to the Child Porn ban stick. Getting the ISP's, who do not want to be turned into dumb data pipe providers and lose their margins, to install the necessary DPI hardware/software stack to do targeted ad injection, will mean they have the necessary and requisite infrastructure for the Child Porn firewall the NPA so desperately wants (which is partially a front for the infrastructure to suppress websites the government doesn't like). Where there is potential for profit, the ISP's will bite, otherwise they would never pay for the massive firewall infrastructure. Phorm and NebuAd were bad enough., but this is getting ready to kick it up a notch.
japan  DPI  ad  targeting  ISP  traffic  monitoring  packet  inspection  privacy  security  anonymity  Delicious 
may 2010 by asteroza

related tags

actuator  ad  addon  advertising  agent  AI  alert  amazon  analysis  analytics  analyzer  anonymity  antiantivirus  antispam  API  app  appliance  application  archiving  ASLR  attack  attention  audit  auditing  AUV  AWS  bandwidth  bigbrother  blocking  boroscope  browser  bumper  CA  cable  cage  camera  capture  cargo  CERN  certificate  checker  CI-1500  Cisco  Code  communication  compliance  computer  consumer  content  control  corporate  CPS  crawler  crawling  data  David  decryption  deep  defect  defense  Delicious  detection  device  devices  Digital  discovery  DLL  DLP  documentation  download  DPI  drone  duct  Echo  electronics  Ellacoya  email  enclosed  encryption  endoscope  endpoint  environment  Erratasec  ESA  europe  evidence  evil  extension  factory  file  filter  filtering  firefox  floating  Fluke  forensic  frame  ftp  function  generic  Green  Guardian  GuardianEdge  hacking  hardware  header  helicopter  HIDS  history  hooking  hosted  http  IE  ILP  IM  inchworm  industrial  information  infosec  injection  inspection  interception  internet  iOS  iPhone  IR  island  ISNS  ISP  ISV  ITU  japan  java  layer  LHC  line  live  LLNL  logging  LookingGlass  loss  mac  machine  malware  managed  MANDIANT  manufacturing  marine  masking  matching  Maynor  message  MIG  Mirage  MITM  MitM  mobile  modification  monitor  monitoring  monorail  motion  MSP  MSS  multicopter  Narus  NarusInsight  NebuAd  network  networking  networks  neutrality  NX  Oakley  ocean  offshore  ondemand  OptiView  Orchestria  OS  OSX  P-Cube  p2p  packet  Paros  parser  PC  pentesting  pipe  platform  plugin  policy  politics  portable  Portunus  Postini  prevention  privacy  private  product  proofpoint  propulsion  protocol  provider  proxy  PSP  QA  QoS  quadcopter  quality  Raytheon  realtime  redirector  remote  research  rewrite  robot  robotics  rogue  ROV  RSA  SaaS  scanner  ScanSafe  SDL  searching  security  SEM  server  service  shaping  slithering  snake  sniffer  sniffing  software  spam  speed  sphere  spherical  SSL  standard  string  structure  subscriber  subsea  surveillance  swimming  Symantec  sysadmin  system  targeted  targeting  technology  tensegrity  tentacle  terminal  test  tester  testing  tetrahedron  theft  TLS  tool  toolbar  tools  tor  tracking  traffic  transparent  trigger  tube  UAV  UGV  underwater  undulating  URL  user  utilities  UUV  Verdasys  Vericept  video  violation  virtual  virtualization  vision  vista  VM  Vontu  waterproof  web  webapp  webcam  webdev  webfilter  webhistorian  webpage  websense  website  wifi  windows  wireless  wireshark  worker  worm  Y.2770 

Copy this bookmark: