NCSCInukshuk

Welcome : Rob Hindle's Musings - Computer Community

NCSCInukshuk

Welcome to Rob Hindle Musings - Computer Community

General Tools and Wrappers Monitoring CyberSecurity Others Usable Spreadsheets
  1. ZIPbackup2E.ps1is a Manifested backup control function allowing for ZIP, or Plain copies of file nodes and the recursive structures below to be moved to backup media ZIP Backups
  2. CMS Toolkit
  3. Notification Control Wrapper
  4. WiFiCoreTools.ps1 provides a set of tools to baseline your WIFi profiles and to manage those profiles over time. WiFiTools. GIT and Hash Profile Links available in Hash Checks below.
  5. MinWiFi.ps1 maximizes your processing of activites like Folding@Home while minimizing your WiFi connection exposure when you are not using the computer. WiFiTools GIT and Hash Profile Links available in Hash Checks below.
  6. File Management
  7. HashProfile.ps1 allows us to hash calculate files before and after transfer with multiple common hash functions. Verified against separate external sources of the values it can provided a level of confidence that a file has not been tampered of changed on site or in transit. Hash Check Description
    Hash Checks
  1. Monitoring Discussion
  2. AVLMonitor.ps1is a monitoring function spanning website URLs , internal and external, machines, machine ports, files, services and processes. Here we can see what is running and determine if that is good or bad. Availability Monitoring
  3. EventReviewTools.ps1 allows us to watch log files, security and windows logs, for activities of interest and problems within our computing community enviroment. The criteria of what to bring forward is always a balance to see activity and potentially points of harm verses noie that does not really affect the whole. Desktop Event Monitoring
  4. CertificateToolsV1.ps1 allows us to see the states of certificates on a machine and get that information to a central location. We can see upcoming expiring certificates. These functions also allow us to search for various certificates based upon various criteria like algorithms and entity/keywords. Certificates Monitoring
  5. WhitelistTools.ps1 See description in Cyber security. WhiteList Monitoring
  6. SQUATCyberTest.ps1 allows one to detect typosquatters to URL sets that would not usually be visible. This testing tool emulates common typo and hide-in-plain-sight tricks. It also does first level detection if they are a presence and then DNS and WHOIS tests for where they aar located.Cyber Squatter Monitoring
  7. HoneyPotBuild.ps1 HoneyPotAccessDetect.ps1 HoneyPotMonitorControl.ps1 See description in CyberSecurity. Honey Pot Build and Monitoring
  8. HashProfile.ps1 See description in CyberSecurity. Hash Check Description
    Hash Checks
  1. WhitelistTools.ps1 allows us to detect levels of change within the infrastructure that would not usually be visible. This whitelisting tool also demonstrates, to a community, what this approach means towards configuration management needs within the community. WhiteList Monitoring
  2. HoneyPotBuild.ps1 HoneyPotAccessDetect.ps1 HoneyPotMonitorControl.ps1 allow us to build, profile and then monitor for accesses, modifications, additions or deletions. These tools currently provide for a Level 1 monitoring capabilit not requiring administrative changes to the audit levels of any folder structure. This provides tools to identify and quantify any voyeur activity within your Computer Community. It is then also a quick step to Level 2 (Perpetrator Identification) and Level 3 (Voyeur shutdown) from this starting point. Honey Pot Build and Monitoring
  3. CyberSquaterChecksV1.ps1 allows us to emulate different types of single URL spelling mistakes or malicious hide in plain sight spellings to a bsase set of URLs. These are then checked if they are present and working on the web and their WHOIS information regarding registry, ownership and location.CyberSquatter Monitoring
  4. HashProfile.ps1 allows us to hash calculate files before and after transfer with multiple common hash functions. Verified against separate external sources of the values it can provided a level of confidence that a file has not been tampered of changed on site or in transit. Hash Check Description
    Hash Checks
Vote Counter

CyberQuotes Support

Small Sales Tracking

Group Checklist Control

Valuation

Stock Portfolio Value Tracking