asteroza + scanning   120

3D Scanner Pro - Create 3D Object on your mobile phone
Wow, this is pretty snazzy, using that iOS AR sharable object tech
iOS  iPhone  app  software  AR  object  scanner  scanning  obejct  model  sharing 
september 2018 by asteroza
Wearable MRI
Using sound somehow to redirect infrared light to allow internal imaging like an MRI. Uses some sort of holographic imaging technique.
infrared  IR  optical  scanning  MRI  medicine  health  portable  hardware  electronics  devices  holographic  imaing  sound  focus  optics 
august 2018 by asteroza
mPort | 3D body mapping
Apparently a service in Australia that places 3D body scanning booths into malls?
custom  clothing  3D  body  scanner  scanning  service  Australia 
july 2018 by asteroza
nmap/shodan-api.nse at master · nmap/nmap
NSE script allows remote port scans of targets via Shodan, so you yourself aren't touching the target like this

nmap --script shodan-api --script-args 'http://shodan-api.target =$IP,shodan-api.apikey=API_KEY'
nmap  shodan  remote  scan  scanning  security  hacking  pentesting 
april 2018 by asteroza
Dip Transform for 3D Shape Reconstruction
Brute force 3D scanning by redipping an object in a liquid filled container and checking the changes in volume
3D  scanning  research  volume  liquid  change  archimedes 
july 2017 by asteroza
Packet Total
Like VirusTotal, for analyzing malicious PCAP's that may be targeting analysis tools.
security  network  packet  capture  PCAP  scanning  Delicious 
february 2017 by asteroza
PhotoScan – scanner by Google Photos
photograph scanning app that uses stitching to fix scan errors and improve resolution.
google  photos  image  picture  digital  scan  android  iOS  iPhone  app  software  scanning  Delicious 
december 2016 by asteroza
Jotti's malware scan
Alternative to VirusTotal for malware scanning
malware  scanning  online  service  Delicious 
november 2016 by asteroza
Home: Cognitive Systems Corp.
Spectrum/protocol monitor+platform to detect and follow wireless sources. Everything from rogue device/AP detection to human/crowd motion monitoring (via smartphone wifi MAC addresses)
wireless  spectrum  monitoring  SDR  wifi  bluetooth  IoT  hardware  electronicws  devices  platform  service  security  scanning  Delicious 
december 2015 by asteroza
Polarized 3D - Achuta Kadambi - MIT Media Lab
Uses two 3D imaging techniques to offset the negatives of each technique, depth field and obliqueness, to gain increased resolution.
polarized  light  depth  field  high  resolution  3D  scanning  algorithm  machine  computer  vision  research  technology  Delicious 
december 2015 by asteroza
The Deep Sweep
This could easily have ended in tears. Also, wouldn't this show up on radar?
sousveillance  wireless  signal  scanning  balloon  recon  hacking  security  mapping  SIGINT  Delicious 
november 2015 by asteroza
CamCard Free - Business card scanner & Business card reader & scan card
Wide language support, but the company is based in china so caveat empor.
business  card  scanning  app  software  iOS  iPhone  Delicious 
june 2015 by asteroza
RaMBLE - Android Apps on Google Play
Using BLE capabilities to track BLE devices, such as fitness trackers leaking location due to device address broadcasts. Apparently the PLA has been warning chinese soldiers about BLE OPSEC.
android  app  software  bluetooth  BLE  hardware  scanning  logging  tracking  mapping  MAC  address  security  research  OPSEC  Delicious 
may 2015 by asteroza
The world’s first printed jet engine
So basically Safran lets students disassemble a jet turbine APU, 3D scan it, and print a copy of it. Notably, there's no mention of the copies being assembled and actually run.
proof-of-concept  3D  scanning  printing  fabbing  jet  turbine  APU  engine  copy  hardware  Delicious 
february 2015 by asteroza
WhoHasAccess.com: User management for Google Drive
Uh, give a web service access to snoop through your Gdrive, to see who can see your Gdrive contents. Even if you do Oauth tokens, this feels slightly skeezy...
google  drive  security  permission  scanner  scanning  service  Delicious 
september 2014 by asteroza
un1c0rn.net
Internet scanning obvious big vulnerabilities so you don't have to. Sorta like SHODAN. Also, naming and shaming sites too. Wonder if they use Masscan?
internet  vulnerability  scan  scanning  service  security  shame  list  unpatched  system  search  engine  Delicious 
june 2014 by asteroza
Printing creates 3D replicas of Van Gogh masterpieces - Crave
A Fujifilm process to create Relievos. Basically high end 3D scanning/relief mapping of high end art, down to the brushstrokes, coupled with high quality UV inkjet printers (2D though?). They don't out and out claim 3D printing for replication. Also, these are very high end replicas, though not quite counterfeits.
Fujifilm  scanning  Relievos  inkjet  art  printing  3D  fabbing  reliefography  counterfeit  UV  replica  Delicious 
august 2013 by asteroza
OMOTE 3D SHASHIN KAN
Seems like a service to make 3D figurines of you, after spending 15 minutes getting your body scanned by some lady with a hand laser scanner. Seems they use a pretty high quality/resolution 3D printer to fab the figurines. The 10cm small size would be perfect for wedding cakes...
body  gift  omote3D  scanning  harajuku  figure  japan  omotesando  service  tokyo  3D  laser  scanner  figurine  Delicious 
november 2012 by asteroza
AntiCredit - Android Market
Apparently you have to buy credits to use the Anti android app, via this app.
zImperium  ANTI  android  network  attack  scanning  toolkit  security  hacking  software  pentest  tools  utilities  android  app  software  packet  capture  Delicious 
october 2011 by asteroza
GRC | ShieldsUP! — Single Port Probe
Quickie single port probe service for your browsers external IP address. Just change the port number in the URL
GRC  single  port  probe  service  network  security  scanning  sysadmin  tools  utilities  Delicious 
august 2011 by asteroza
1DollarScan
US version of the japanese company that does book scanning services cheap. They use destructive book scanning techniques though.
bookscan  US  book  scanning  service  low  cost  destructive  scan  ebook  PDF  Delicious 
august 2011 by asteroza
BOOKSCAN(ブックスキャン) 本・蔵書電子書籍化サービス - 大和印刷
Low cost book scanning service, though they use destructive techniques on the books to ensure high accuracy/throughput.
japan  bookscan  low  cost  destructive  book  scanning  service  ebook  PDF  Delicious 
august 2011 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  3d  ACK  address  agent  AIM  AIMpro  airport  algorithm  algorithmic  amazon  AMSI  analysis  android  animal  annotation  anonymity  ANTI  antimalware  antiscanning  antispyware  antivirus  API  app  applet  application  APT  APU  AR  archimedes  archive  archiving  array  art  articles  assessment  asset  attack  audit  auditing  Australia  authenticity  automation  avira  balloon  barcode  best  biology  biometric  BLE  bluetooth  body  book  bookscan  Brother  browser  business  camera  Canon  capture  card  casting  cellphone  ceramic  change  character  check  ClamAV  ClamAVlib  CLI  clothing  cloud  CloudContacts  collaboration  collection  combined  company  compliance  compression  computer  connection  constellation  contact  container  content  continuous  control  conversion  convert  converter  coprocessor  copy  copying  corporate  correlation  cost  counterfeit  counterfeiting  counterscanning  crawler  CreepyDOL  CT  currency  custom  data  database  defender  defense  deflection  Delicious  depth  desktop  destructive  detection  device  devices  DFIR  dictionary  Digimarc  digital  digitize  digitizer  digitizing  discovery  display  distributed  DIY  DNS  docker  document  domain  dossier  download  drive  Driver  drivers  DRM  Dubai  ebook  EDR  education  EFF  electronic  electronics  electronicws  email  emergency  emulation  endpoint  engine  english  enhancement  enterprise  epitaxy  error  EternalBlue  EU  EURion  europe  event  evernote  exploit  Express  F-BOMB  fabber  fabbing  facial  factor  false  fax  field  fight  figure  figurine  file  filterbit  FinFisher  fingerprint  fish  focus  forensics  form  format  Fortinet  FPGA  framework  free  FreeOCR  FreeOCR.NET  freeware  Fujifilm  fuzzed  fuzzing  gateway  generator  GENOME  georgiatech  GFI  gift  google  grading  graphics  GRC  guide  hacking  HackingTeam  hand  handheld  handler  harajuku  hardware  head  health  hidden  high  HMD  hollow  holographic  host  howto  HTTP  HTTPS  HUD  identification  IDS  IM  image  imaging  imaing  import  information  infosec  infrared  injection  inkjet  input  instant  integration  interface  internal  internet  intranet  invalid  inventory  investment  IoC  iOS  IoT  IP  iPad  iPhone  IPVisualizer  IR  ISO  IT  japan  japanese  java  javascript  jet  kanjireader  kernel  key  keyword  kickstarter  kindle  knocking  lamp  languard  laser  law  learning  LED  legal  library  light  linux  liquid  list  lithography  LiveCD  local  logging  lookup  low  LPD  LSI  MAC  machine  malware  management  manufacturing  mapper  mapping  masscan  materails  materials  medicine  MEMES  MEMS  meraki  message  messaging  metal  metascan  Micro  microsoft  military  mirror  mobile  model  modeling  money  monitoring  motion  mounted  MRI  multimodal  nanolithography  NETDISCO  netflow  network  networking  nickel  nmap  obejct  object  OCR  OCS  office  offload  omnipod  omote3D  omotesando  ondemand  online  open  opendata  opensource  OPSEC  OPSWAT  optical  optics  Outlook  OWASP  packet  palm  Panoptes  paper  paperless  patch  patching  patent  pcap  PDF  penetration  pentest  pentesting  performance  permission  persistent  phone  phosphor  photo  photos  photoshop  PHP  physical  picture  pixily  platform  point  polarized  port  portable  portscanning  portspoof  postprocessing  postscript  powder  powershell  practice  preprocessor  print  printer  printing  prioritization  privacy  probe  processing  processor  productivity  profiler  profiling  ProFORMA  projection  projector  proof-of-concept  protection  protocol  PROTOS  proximity  proxy  Prysm  python  query  quiz  raster  RCS  reader  reassembler  receipt  recognition  recon  recovery  red  reference  reliefography  Relievos  remediation  remote  repair  replica  replication  research  resin  resolution  response  retina  retinal  retrieval  risk  roadwarrior  rootkit  s90  SaaS  sample  sancp  Sandmap  scan  ScanCafe  scanner  scanning  ScanR  science  scoring  script  SDR  search  searchable  secret  security  selective  semiconductor  sensor  server  service  session  shame  sharing  shodan  SIGINT  signal  single  skeleton  small  smartphone  Snapfish  Snapter  sniffing  SNMP  Snowflake  social  software  sound  sousveillance  spectrum  spider  SQL  SQN  SSL  startup  storage  SubBrute  subdomain  substitue  super  superalloy  sureveillance  surveillance  symbian  SYN  sysadmin  syssadmin  system  Tarari  TCP  teacher  technique  Technologies  technology  test  testing  text  thermal  THOR  threat  tips  TLS  tokyo  toolkit  tools  Tor  tracking  traffic  transcription  translation  transportation  trend  TrendMicro  tricks  turbine  tutorial  TWAIN  UK  Uniflow  universal  unpatched  upload  URL  US  USB  utilities  UV  vein  verification  video  virus  vision  visual  visualization  volatility  volume  VR  vul  vulnerability  watermark  weakness  web  webapp  webcam  WebEx  website  whiteboard  whois  wifi  windows  wireless  WMI  Xerox  ZAP  zeroMQ  zImperium  ZMap  zoom 

Copy this bookmark:



description:


tags: