asteroza + registry   59

uber/kraken: P2P docker registry capable of distributing TBs of data in seconds
Bittorrent based P2P distribution of containers. Tracker seems like a weak point, but since it's for setting up the mesh and not running it, if it goes down the p2p part is still running...
uber  opensource  docker  container  registry  P2P  deployment  distribution  bittorrent 
6 weeks ago by asteroza
Well-Known URIs
so there are apparently example.com/.well-known/x style URI's. iOS 12 will apparently now also look for a password change URI here too
IANA  well  known  URI  list  registry 
september 2018 by asteroza
Security Settings for COM objects in Office
How to kill flash in office, don't forget the wow6432node keys to cover 64bit OS with 32bit office
windows  security  office  flash  block  registry  key 
june 2018 by asteroza
bam キー(実行痕跡?) について(最終更新:2018/02/23 02:23) - 見習いフォレンジッカーのメモ
HKLM\SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID-RID} appears to log exe path and final execution timestamp
DFIR  forensic  windows  registry  executable  prrocess  logging  time  timestamp  security  hacking  pentesting 
february 2018 by asteroza
p3nt4/metasploit-modules: This module will change a local user's password direct...
Metasploit module for directly carving out and replacing password hashes to forcibly change a user password.
metasploit  module  security  pentesting  hacking  windows  user  password  change  registry  attack  hash  carve  Delicious 
december 2016 by asteroza
Configuring Additional LSA Protection
So this one registry change can stop a lot of lateral movement apparently...
windows  security  microsoft  LSA  lateral  movement  pentesting  registry  Delicious 
january 2016 by asteroza
Microsoft Will Resume Pushing Windows 10 To Machines With Win7, 8.1 - Slashdot
Registry entry to try to stop GWX, the windows 10 upgrader, but apparently microsoft is now ignoring this somethimes and installs windows 10 anyways.
windows  7  8  8.1  forced  upgrade  10  block  registry  GWX  Delicious 
december 2015 by asteroza
Mintel GNPD - Global New Products Database: CPG and FMCG | Mintel.com
apparently there aren't very many good sources on what new products exist in the world.
global  new  product  database  registry  information  reference  Delicious 
june 2015 by asteroza
Getting XP updates
Tricks to fool XP windows update to continue, based on either WEPOS (to 2019) for 32bit or server 2003 (to 2015) for 64bit.
windows  XP  registry  hack  extended  update  2019  WEPOS  PoS  32bit  64bit  Delicious 
may 2014 by asteroza
Chrome remote desktop curtain mode registry key
Chrome remote desktop normally is a screen scraper for the local terminal session, so if you are fiddling with the desktop remote, then someone looking at the physical monitor can see what you are doing. Enabling curtain mode results in CRD firing up a local windows RDP session when you try to use it, so what you do isn't shown on the physical monitor.
tricks  tips  sysadmin  registry  windows  screen  hidden  mode  curtain  desktop  remote  extension  addon  plugin  browser  chrome  Delicious 
january 2014 by asteroza
Separating SvcHost Services ← Huddled Masses
How to isolate the windows update services in it's own svchost process so you can drop it's priority or kill it safely.
windows  svchost.exe  isolated  process  registry  configuration  setting  sysadmin  tips  tricks  update  svchost  service  Delicious 
december 2013 by asteroza
東京新聞:共通番号、15年1月に利用開始 政府、法案概要を決定:政治(TOKYO Web)
Japanese government is going to attempt a national number register for all citizens, and eventually force all interaction using this number, such as national pensions, national health care, and disaster relief. Naturally, such central consolidated information will allow the national government to keep tabs on anyone easily, rather than disappearing into the current prefectual and municipal systems. Since Jukinet went so well the first time around...
jukinet  identity  monitoring  government  ID  registry  number  citizen  national  japan  Delicious 
december 2011 by asteroza

related tags

/3GB  3GB  8.1  32bit  64bit  accounting  ACK  ad  addon  address  admin  advertising  analysis  antimalware  antispyware  antivirus  applications  attack  audit  auditing  backup  baseline  binary  bittorrent  BLOB  block  blocking  bluetooth  boot  boot.ini  bootdisk  browser  BSOD  bug  bypass  carbon  carve  change  cheatsheet  chrome  citizen  cleaner  cloud  CO2  combination  command  config  configuration  connection  connections  container  crash  crashdump  current  curtain  custom  data  database  debug  debugging  delayed  Delicious  deployment  desktop  detection  development  device  devops  DFIR  diagnostic  disk  distribution  DLL  DNS  docker  domain  donotcall  download  drive  drone  dump  editing  editor  emissions  enterprise  entry  environment  eraser  event  executable  explorer  extended  extension  extractin  file  FIlemon  filename  filess  filesystem  fix  flag  flags  flash  flight  force  forced  forensic  forensics  freeware  global  google  government  GPO  gTLD  guide  GWX  hack  hacking  hacks  hard  hash  heuristic  hidden  hide  hiding  HiJackThis  history  hive  hole  howto  humber  IANA  ID  identity  IE  IE7  IEEE  incident  information  initiator  internet  IPv6  iSCSI  isolated  japan  jukinet  key  known  kubernetes  lateral  limit  line  list  LiveCD  load  loading  local  lock  log  logging  LSA  MAC  malware  management  mapping  maximum  memory  metasploit  microsoft  minidump  mobile  mode  modification  module  monitor  monitoring  movement  multiple  name  national  network  networking  new  NirSoft  no-fly  NSA  NT  NTUSER.DAT  number  obfuscation  office  offline  ondemand  online  only  opensource  operator  optimization  OS  OUI  P2P  parameter  password  path  pentesting  performance  persistence  phone  plugin  policy  portable  PoS  powershell  privacy  process  Procmon  product  program  program.exe  programming  programs  protocols  proxy  prrocess  python  read  reader  recovery  reference  registrar  registry  Regmon  RegRipper  remote  repair  repository  research  response  restriction  robocall  run  scanner  SCMS-T  screen  scripts  search  security  service  setting  settings  shortcut  sideload  size  sniffing  software  SP1  SP2  spam  speed  stack  standars  start  steganography  storage  sustainability  svchost  svchost.exe  switch  sysadmin  system  TCP  telemarketing  telephone  time  timestamp  tips  TLD  tools  toshiba  tracking  tricks  tuning  tutorial  tweak  tweaks  UAC  UAV  uber  ULA  unique  update  upgrade  URI  USB  user  userassist  usermode  userspace  utilities  virus  Vista  vulnerability  well  WEPOS  windows  XP  ZFS  zone 

Copy this bookmark:



description:


tags: