Return to site

Rtsp Viewer Windows

broken image


Good RTSP viewer for windows? Posted by 1 year ago. Good RTSP viewer for windows? Can anyone recommend a decent RTSP viewer for windows? Save hide report. This thread is archived. New comments cannot be. RTSP Camera view is a free portable RTSP viewer software for Windows. Using it, you can play multiple RTSP streams simultaneously. As you open this software, it displays some sample RTSP streams. You can edit the streams or add new ones.

AllJoyn Router

The AllJoyn framework is managed by AllSeenAlliance and was designed to prevent IoT security issues and enable interoperability of Internet of Things devices, regardless of operating system, manufacturer or type of device. It is considered the larges open source aimed expressly at IoT,with over 200 manufactures signed up, such as Samsung, Cisco and Panasonic. Microsoft have made it a core component of the Windows operating system.

Viewer

The AllJoyn Router Service is used to routeAllJoyn messages for AllJoyn clients.

Name

Description

AllJoyn-Router-In-TCP

Where to purchase microsoft office. Inbound rule for AllJoyn Router traffic [TCP]

AllJoyn-Router-In-UDP

Inbound rule for AllJoyn Router traffic [UDP]

Concerns

There are case studies and reports that have raised security concerns with the AllJoyn framework regarding system takeovers, complexity and responsibilities, limitations and privacy concerns. Most users and servers do not have a specific need for this service it should be disabledand blocked.

Cast to Device functionality

Cast to Device is a Windows feature that allows streaming of videos, picture and other media from your PC to a TV or other DLNA supported device. It is an improved version of Play to Device from previous Windows versions.

Name

Description

PlayTo-HTTPSTR-In-TCP-NoScope

Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246]

PlayTo-HTTPSTR-In-TCP-LocalSubnetScope

Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246]

PlayTo-HTTPSTR-In-TCP-PlayToScope

Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246]

PlayTo-In-UDP-NoScope

Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP]

PlayTo-In-UDP-LocalSubnetScope

Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP]

PlayTo-In-UDP-PlayToScope

Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP]

PlayTo-In-RTSP-NoScope

Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556]

PlayTo-In-RTSP-LocalSubnetScope

Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556]

PlayTo-In-RTSP-PlayToScope

Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556]

PlayTo-SSDP-Discovery-PlayToScope

Inbound rule to allow discovery of Cast to Device targets using SSDP

PlayTo-UPnP-Events-PlayToScope

Inbound rule to allow receiving UPnP Events from Cast to Device targets

PlayTo-QWave-In-UDP-PlayToScope

Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]

PlayTo-QWave-In-TCP-PlayToScope

Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]

Concerns

Many Chromecast streaming devices have historically been exposed with security flaws and if not specifically needed it should be disabled and blocked.

Core Networking

Core networking mainly concern protocols to allow for IPv6 functionality. It also has rules for example DHCP, ICMP and IGMP.

Name

Description

CoreNet-ICMP6-DU-In

Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion.

https://downloadir.mystrikingly.com/blog/sonic-and-the-black-knight-wii-iso-pal. CoreNet-ICMP6-PTB-In

Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link.

CoreNet-ICMP6-TE-In

Windows 7 home premium dmg. Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path.

CoreNet-ICMP6-PP-In

Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets.

CoreNet-ICMP6-NDS-In

Neighbor Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node.

CoreNet-ICMP6-NDA-In

Neighbor Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbor Discovery Solicitation request.

CoreNet-ICMP6-RA-In

Router Advertisement messages are sent by routers to other nodes for stateless auto-configuration.

CoreNet-ICMP6-RS-In

Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration.

CoreNet-ICMP6-LQ-In

An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership.

CoreNet-ICMP6-LR-In

The Multicast Listener Report message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query.

CoreNet-ICMP6-LR2-In

Multicast Listener Report v2 message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query.

CoreNet-ICMP6-LD-In

Multicast Listener Done messages inform local routers that there are no longer any members remaining for a specific multicast address on the subnet.

CoreNet-ICMP4-DUFRAG-In

Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don't fragment bit was set.

CoreNet-IGMP-In

IGMP messages are sent and received by nodes to create, join and depart multicast groups.

CoreNet-DHCP-In

Allows DHCP (Dynamic Host Configuration Protocol) messages for stateful auto-configuration.

CoreNet-DHCPV6-In

Allows DHCPV6 (Dynamic Host Configuration Protocol for IPv6) messages for stateful and stateless configuration.

CoreNet-Teredo-In

Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator.

CoreNet-IPHTTPS-In

Inbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls.

CoreNet-IPv6-In

Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services.

Concerns

Typically speaking these rules should not be disabled. Some of these rules are necessary for your network configuration to work properly. If you disable DHCP, you may not get an IP-address from the DHCP server (based on your configuration). If you disable ICMP the network performance may be degraded etc.

Cortana

Cortana is a virtual assistant from Microsoft that can be used on for example Windows 10, Invoke smart speaker, Microsoft Band, Surface Headphones, Xbox One, iOS, Android, Windows Mixed Reality, and Amazon Alexa.

Cortana can set reminders, recognize voices without the requirement for keyboard input, and answer questions using information and web results from the Bing search engine.

Name

Description

{GUID}

Search the web and Windows

{GUID}

Search the web and Windows

Concerns

Vulnerabilities have been detected for Contana and could allow an attacker to break into a Windows computer using Cortana and voice commands, even when it´s locked. The problem is that Cortana is always listening.

Cortana can circumvent the usual safe guards, allowing attackers to execute commands and to for example install malware.

If it´s not specifically needed it should be disabled and blocked.

Delivery Optimization

Delivery Optimization is used to reduce bandwidth by sharing download data between multiple devices on your network for Windows Updates, upgrades and applications.

Name

Description

DeliveryOptimization-TCP-In

Inbound rule to allow Delivery Optimization to connect to remote endpoints

DeliveryOptimization-UDP-In

Inbound rule to allow Delivery Optimization to connect to remote endpoints

Concerns

This feature can use up a significant amount of bandwidth and CPU. With concerns also regarding how cybercriminals traditionally use exploits to distribute malware it may be a good practice to disable and block this feature.

Desktop App Web Viewer

The Desktop App Web Viewer feature is used by the Win32WebViewHost as the web view host for Win32 applications.

DIAL protocol server

Discovery and Launch is a protocol co-developed by Netflix and YouTube with help from Sony and Samsung. It is used to discover and launch applications on a single subnet, typically a home network. It relies on Universal Plug and Play (UPnP), Simple Service Discovery Protocol (SSDP), and HTTP protocols.

Name

Description

DIAL-Protocol-Server-In-TCP-NoScope

Inbound rule for DIAL protocol server to allow remote control of Apps using HTTP. [TCP 10247]

DIAL-Protocol-Server-HTTPSTR-In-TCP-LocalSubnetScope

Square affiliate program. Inbound rule for DIAL protocol server to allow remote control of Apps using HTTP. [TCP 10247]

Concerns

This feature can most likely be disabled and blocked in the firewall setting.

mDNS

Multicast DNS is a way of using DNS programming interfaces, packet formats and operating semantics, typically in a small network where no DNS server has been installed.

Name

Description

MDNS-In-UDP-Private-Active

Inbound rule for mDNS traffic [UDP]

MDNS-In-UDP-Domain-Active

Inbound rule for mDNS traffic [UDP]

MDNS-In-UDP-Public-Active

Inbound rule for mDNS traffic [UDP]

Concerns

If your mDNS service is exposed to an unsecure network, querying the service would allow attackers to collect information about your machine (such as the MAC address information of the device, or services running) that could be used to prepare for example denial-of-service (DDoS) attacks.

mDNS is based on UDP, the mDNS query can be exploited to perform amplification attacks (the attacker can spoof his target IP address to saturate it with mDNS replies from your server).

If you are located on a network with a working DNS infrastructure you should disabled and block the multicast DNS features.

Remote Desktop

Remote Desktop is used to be able to connect and control a PC from a remote device. It also allows you to be able to share applications, files and network resources from remotely.

Name

Description

RemoteDesktop-UserMode-In-TCP

Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389]

RemoteDesktop-UserMode-In-UDP

Inbound rule for the Remote Desktop service to allow RDP traffic. [UDP 3389]

RemoteDesktop-Shadow-In-TCP

Inbound rule for the Remote Desktop service to allow shadowing of an existing Remote Desktop session. (TCP-In)

Concerns

Remote Desktop on Windows computers should never be exposed to the internet. The Remote Desktop feature is vulnerable to lateral movement techniques, but also man-in-the-middle as well as encryption attacks.

Windows Remote Management

Windows Remote Management, or WinRM, is a Windows-native built-in remote management protocol that uses Simple Object Access Protocol to interface with remote computers and servers, as well as Operating Systems and applications.

WinRM is a command-line tool that is used forthe following tasks:

● Remotely communicate and interfacewith hosts through readily available channels/ports within your network, including workstations, servers and any operating system that supports it.

● Execute commands remotely on systems that you are not local to you but are network accessible.

● Monitor, manage and configure servers, operating systems and client machines from a remote location.

Name

Description

WINRM-HTTP-In-TCP

Fortnite for 32 bit windows. Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]

WINRM-HTTP-In-TCP-PUBLIC

Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]

Concerns

Rtsp Player

WinRM is a key attack area for Windows Machines through PowerShell Remoting and lateral movement. Access to this service should be protected to be allowed from very specific IP-addresses only, or through privilege access workstations (PAW) ideally.

Work or school account

A Work or School account is an account created by an organization's administrator to enable a member of the organization to access Microsoft cloud services such as Microsoft Azure, Windows Intune, and Office 365.

Name

Description

{GUID}

Work or school account

{GUID}

Work or school account

Concerns

With Microsoft Account on Windows, an attacker could get access to all your apps and services, by knowing your password. If for example you leave your computer logged in and haven't correctly set-up the imeout settings, someone could use your machine to gain access for all your accounts.

Microsoft has tried to circum navigate this by allowing users to set up a PIN code to logon to computers, rather than having to use their Microsoft-wide password, but there are still inherent dangers tobe aware of when using Microsoft accounts on Windows.

Your account

The rule is used for communications with the Microsoft Windows cloud account logon.

IP Camera Viewer is a freeware IP camera monitoring software app filed under video capture software and made available by DeskShare for Windows.

The review for IP Camera Viewer has not been completed yet, but it was tested by an editor here on a PC and a list of features has been compiled; see below.

If you would like to submit a review of this software download, we welcome your input and encourage you to submit us something!

Free IP camera monitoring software views multiple cameras


Set up a free IP camera monitoring system within minutes with IP Camera Viewer. This program is an alternative to the flimsy software that is shipped with most network IP cameras. Keep an eye on your home, office, parking area or anywhere you have a IP camera. Multiple cameras can be viewed simultaneously. More than 1500 different IP camera models and all USB cameras are supported.

IP Camera Viewer can capture webcam streams and capture video from input devices.

Features and highlights


  • Control and view up to 4 camera feeds simultaneously
  • Use IP cameras as well as USB cams
  • Support for 1500 camera models and counting
  • Digitally zoom, even if your camera does not support it
  • Pan/Tilt/Zoom (PTZ) support for many network cameras
  • Adjust the orientation of live feeds
  • Adjust image settings for IP camera
  • Independently configure video and image properties for USB camera
  • Backup and Restore cameras with individual settings

IP Camera Viewer on 32-bit and 64-bit PCs

This download is licensed as freeware for the Windows (32-bit and 64-bit) operating system on a laptop or desktop PC from video capture software without restrictions. IP Camera Viewer 4.09 is available to all software users as a free download for Windows 10 PCs but also without a hitch on Windows 7 and Windows 8.

Rtsp Viewer For Windows

Filed under:

Onvif Software Windows

  1. IP Camera Viewer Download
  2. Freeware Video Capture Software
  3. IP Camera Monitoring Software




broken image