Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
95 results
Thanks to Martin Pitt for the demonstration and narration!
87 views
4 years ago
Cockpit makes Linux discoverable. But it's really a Linux session in a web browser, accessing the native system APIs and tools ...
1,034 views
5 years ago
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,137 views
1 year ago
The difficult task to checkpoint and restore a process is used in many container runtimes to implement container live migration.
2,001 views
Defeating SEAndroid PAU OLIVA FORA SR. MOBILE SECURITY ENGINEER, VIAFORENSICS Security Enhancements for ...
2,756 views
10 years ago
100 of the Top Linux Commands in 6 Minutes PULL IT DOWN FOR THE GOOD STUFF Patreon ...
6,761 views
Android devices are constantly improving their security to protect against attackers with physical access, with new protection ...
10,552 views
9 months ago
System containers, the oldest type of containers, focus on running an entire Linux distribution, including all its services in very ...
573 views
Vacuum robots are becoming increasingly popular and affordable as their technology grows ever more advanced, including ...
18,077 views
2 years ago
Lessons learned operating thousands of stateful production clusters on top of Fedora and systemd-nspawn. Aiven is a cloud data ...
1,259 views
Portable Services bring certain aspects of containers to classic system service management. Let's discuss them in technical detail!
306 views
-------------------------------------------------- Sostieni alternativalinux! -------------------------------------------------- ◾Con una piccola ...
15,604 views
Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...
1,282 views
8 years ago
I'd like to show you how to find bugs in Linux systems using machine learning, when paired with the totally seemingly useless and ...
295 views
An introduction to the bare-bones of Linux navigation: ls, cd, and relative vs absolute paths.
531 views
9 years ago
Row Level Security Explained by Stephen Frost In this talk we'll review Row-Level Security (RLS), how it works in PostgreSQL, ...
200 views
Na koleně děláme operační systém pro mobilní télefon. Chceme na mobil dostat uživatelsky přívětivý OS navržený pro mobil bez ...
143 views
There is so much more than you can so, than just starting and stooping your service, when you start to interact with systemd from ...
866 views
Simple tool for running pods and containers This talk will describe all of the reasons for podman, all of its features demonstrate its ...
18,808 views
And we have steps where you can define in style in applying this SELinux theme and run some speed logic if you need. And even ...
229 views