asteroza + inspection 46
Network Detective Overview
july 2018 by asteroza
Apparently not bad at exploring the dark corners of an environment?
sysadmin
tools
utilities
software
networking
security
audit
compliance
discovery
inspection
july 2018 by asteroza
landing-ai
december 2017 by asteroza
Near term they are offering vision systems for product defect detection
AI
manufacturing
product
defect
machine
computer
vision
inspection
december 2017 by asteroza
Amazon.com: Sentexin HD 720P Waterproof Smart WIFI Inspection Endoscope Handheld Inspection Snake Camera Borescope Video Inspection Camera for IOS/Android 9mm 2.0 Mega Pixels (1M): Automotive
wifi waterproof wireless boroscope endoscope video camera inspection hardware electronics devices
july 2017 by asteroza
wifi waterproof wireless boroscope endoscope video camera inspection hardware electronics devices
july 2017 by asteroza
DetecTor.io
october 2016 by asteroza
Using tor as a second circuit to check for MitM SSL/TLS attacks. Not entirely out-of-band, but close enough?
SSL
TLS
security
rogue
CA
certificate
inspection
tor
checker
tester
MitM
Delicious
october 2016 by asteroza
senseFly: eXom
may 2015 by asteroza
Fancy quad for inspection usage.
inspection
UAV
drone
quadcopter
multicopter
helicopter
hardware
electronics
devices
IR
video
camera
Delicious
may 2015 by asteroza
ITU-T Work Programme
december 2012 by asteroza
Y.2770 is a DPI spec from the ITU for national or provider level deep packet inspection and surveillance of network traffic. Basically it's an attempt at standardizing the surveillance tools of police states, arguably to make it cheaper to implement. It's things like this that make a UN/ITU internet takeover look worse than the alternative (leaving the US in charge). Naturally, promoted by Russia, China, and a number of middle eastern states...
internet
politics
anonymity
privacy
evil
standard
surveillance
monitoring
network
DPI
inspection
packet
deep
Y.2770
ITU
Delicious
december 2012 by asteroza
Asiajin » Japanese Government Allows ISPs to Target Ads by Browsing History
may 2010 by asteroza
Ah, so this is the carrot to the Child Porn ban stick. Getting the ISP's, who do not want to be turned into dumb data pipe providers and lose their margins, to install the necessary DPI hardware/software stack to do targeted ad injection, will mean they have the necessary and requisite infrastructure for the Child Porn firewall the NPA so desperately wants (which is partially a front for the infrastructure to suppress websites the government doesn't like). Where there is potential for profit, the ISP's will bite, otherwise they would never pay for the massive firewall infrastructure. Phorm and NebuAd were bad enough., but this is getting ready to kick it up a notch.
japan
DPI
ad
targeting
ISP
traffic
monitoring
packet
inspection
privacy
security
anonymity
Delicious
may 2010 by asteroza
Data Encryption Software Solutions for Computer Network Security from GuardianEdge
GuardianEdge PC Guardian DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
GuardianEdge PC Guardian DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
Orchestria | Solutions | Orchestria Data Loss Prevention | Intelligent Electronic Control
Orchestria DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
Orchestria DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
Web Filtering and Web Security - Products & Services - Websense, Inc.
websense CPS DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
websense CPS DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
Proofpoint : Email Security and Data Loss Prevention for the Enterprise by Proofpoint
proofpoint DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
proofpoint DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
Products - Data Loss Prevention, Content Monitoring & Filtering - Vontu
Symantec Vontu DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
Symantec Vontu DLP ILP data information loss prevention application logging monitoring file email encryption corporate policy content inspection platform system software endpoint agent device control bigbrother Delicious
march 2008 by asteroza
OptiView Integrated Network Analyzer - the only portable, integrated network ana...
Fluke Networks OptiView portable mobile network traffic analyzer hardware electronics devices string searching matching trigger packet capture monitor monitoring application layer inspection Delicious
january 2007 by asteroza
Fluke Networks OptiView portable mobile network traffic analyzer hardware electronics devices string searching matching trigger packet capture monitor monitoring application layer inspection Delicious
january 2007 by asteroza
related tags
actuator ⊕ ad ⊕ addon ⊕ advertising ⊕ agent ⊕ AI ⊕ alert ⊕ amazon ⊕ analysis ⊕ analytics ⊕ analyzer ⊕ anonymity ⊕ antiantivirus ⊕ antispam ⊕ API ⊕ app ⊕ appliance ⊕ application ⊕ archiving ⊕ ASLR ⊕ attack ⊕ attention ⊕ audit ⊕ auditing ⊕ AUV ⊕ AWS ⊕ bandwidth ⊕ bigbrother ⊕ blocking ⊕ boroscope ⊕ browser ⊕ bumper ⊕ CA ⊕ cable ⊕ cage ⊕ camera ⊕ capture ⊕ cargo ⊕ CERN ⊕ certificate ⊕ checker ⊕ CI-1500 ⊕ Cisco ⊕ Code ⊕ communication ⊕ compliance ⊕ computer ⊕ consumer ⊕ content ⊕ control ⊕ corporate ⊕ CPS ⊕ crawler ⊕ crawling ⊕ data ⊕ David ⊕ decryption ⊕ deep ⊕ defect ⊕ defense ⊕ Delicious ⊕ detection ⊕ device ⊕ devices ⊕ Digital ⊕ discovery ⊕ DLL ⊕ DLP ⊕ documentation ⊕ download ⊕ DPI ⊕ drone ⊕ duct ⊕ Echo ⊕ electronics ⊕ Ellacoya ⊕ email ⊕ enclosed ⊕ encryption ⊕ endoscope ⊕ endpoint ⊕ environment ⊕ Erratasec ⊕ ESA ⊕ europe ⊕ evidence ⊕ evil ⊕ extension ⊕ factory ⊕ file ⊕ filter ⊕ filtering ⊕ firefox ⊕ floating ⊕ Fluke ⊕ forensic ⊕ frame ⊕ ftp ⊕ function ⊕ generic ⊕ Green ⊕ Guardian ⊕ GuardianEdge ⊕ hacking ⊕ hardware ⊕ header ⊕ helicopter ⊕ HIDS ⊕ history ⊕ hooking ⊕ hosted ⊕ http ⊕ IE ⊕ ILP ⊕ IM ⊕ inchworm ⊕ industrial ⊕ information ⊕ infosec ⊕ injection ⊕ inspection ⊖ interception ⊕ internet ⊕ iOS ⊕ iPhone ⊕ IR ⊕ island ⊕ ISNS ⊕ ISP ⊕ ISV ⊕ ITU ⊕ japan ⊕ java ⊕ layer ⊕ LHC ⊕ line ⊕ live ⊕ LLNL ⊕ logging ⊕ LookingGlass ⊕ loss ⊕ mac ⊕ machine ⊕ malware ⊕ managed ⊕ MANDIANT ⊕ manufacturing ⊕ marine ⊕ masking ⊕ matching ⊕ Maynor ⊕ message ⊕ MIG ⊕ Mirage ⊕ MITM ⊕ MitM ⊕ mobile ⊕ modification ⊕ monitor ⊕ monitoring ⊕ monorail ⊕ motion ⊕ MSP ⊕ MSS ⊕ multicopter ⊕ Narus ⊕ NarusInsight ⊕ NebuAd ⊕ network ⊕ networking ⊕ networks ⊕ neutrality ⊕ NX ⊕ Oakley ⊕ ocean ⊕ offshore ⊕ ondemand ⊕ OptiView ⊕ Orchestria ⊕ OS ⊕ OSX ⊕ P-Cube ⊕ p2p ⊕ packet ⊕ Paros ⊕ parser ⊕ PC ⊕ pentesting ⊕ pipe ⊕ platform ⊕ plugin ⊕ policy ⊕ politics ⊕ portable ⊕ Portunus ⊕ Postini ⊕ prevention ⊕ privacy ⊕ private ⊕ product ⊕ proofpoint ⊕ propulsion ⊕ protocol ⊕ provider ⊕ proxy ⊕ PSP ⊕ QA ⊕ QoS ⊕ quadcopter ⊕ quality ⊕ Raytheon ⊕ realtime ⊕ redirector ⊕ remote ⊕ research ⊕ rewrite ⊕ robot ⊕ robotics ⊕ rogue ⊕ ROV ⊕ RSA ⊕ SaaS ⊕ scanner ⊕ ScanSafe ⊕ SDL ⊕ searching ⊕ security ⊕ SEM ⊕ server ⊕ service ⊕ shaping ⊕ slithering ⊕ snake ⊕ sniffer ⊕ sniffing ⊕ software ⊕ spam ⊕ speed ⊕ sphere ⊕ spherical ⊕ SSL ⊕ standard ⊕ string ⊕ structure ⊕ subscriber ⊕ subsea ⊕ surveillance ⊕ swimming ⊕ Symantec ⊕ sysadmin ⊕ system ⊕ targeted ⊕ targeting ⊕ technology ⊕ tensegrity ⊕ tentacle ⊕ terminal ⊕ test ⊕ tester ⊕ testing ⊕ tetrahedron ⊕ theft ⊕ TLS ⊕ tool ⊕ toolbar ⊕ tools ⊕ tor ⊕ tracking ⊕ traffic ⊕ transparent ⊕ trigger ⊕ tube ⊕ UAV ⊕ UGV ⊕ underwater ⊕ undulating ⊕ URL ⊕ user ⊕ utilities ⊕ UUV ⊕ Verdasys ⊕ Vericept ⊕ video ⊕ violation ⊕ virtual ⊕ virtualization ⊕ vision ⊕ vista ⊕ VM ⊕ Vontu ⊕ waterproof ⊕ web ⊕ webapp ⊕ webcam ⊕ webdev ⊕ webfilter ⊕ webhistorian ⊕ webpage ⊕ websense ⊕ website ⊕ wifi ⊕ windows ⊕ wireless ⊕ wireshark ⊕ worker ⊕ worm ⊕ Y.2770 ⊕Copy this bookmark: