Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
94 results
Thanks to Martin Pitt for the demonstration and narration!
87 views
4 years ago
Cockpit makes Linux discoverable. But it's really a Linux session in a web browser, accessing the native system APIs and tools ...
1,034 views
5 years ago
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,137 views
1 year ago
The difficult task to checkpoint and restore a process is used in many container runtimes to implement container live migration.
2,001 views
Defeating SEAndroid PAU OLIVA FORA SR. MOBILE SECURITY ENGINEER, VIAFORENSICS Security Enhancements for ...
2,756 views
10 years ago
Vacuum robots are becoming increasingly popular and affordable as their technology grows ever more advanced, including ...
18,074 views
2 years ago
Android devices are constantly improving their security to protect against attackers with physical access, with new protection ...
10,551 views
9 months ago
100 of the Top Linux Commands in 6 Minutes PULL IT DOWN FOR THE GOOD STUFF Patreon ...
6,761 views
System containers, the oldest type of containers, focus on running an entire Linux distribution, including all its services in very ...
573 views
-------------------------------------------------- Sostieni alternativalinux! -------------------------------------------------- ◾Con una piccola ...
15,604 views
Lessons learned operating thousands of stateful production clusters on top of Fedora and systemd-nspawn. Aiven is a cloud data ...
1,259 views
Portable Services bring certain aspects of containers to classic system service management. Let's discuss them in technical detail!
306 views
I'd like to show you how to find bugs in Linux systems using machine learning, when paired with the totally seemingly useless and ...
295 views
An introduction to the bare-bones of Linux navigation: ls, cd, and relative vs absolute paths.
531 views
9 years ago
Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...
1,282 views
8 years ago
Row Level Security Explained by Stephen Frost In this talk we'll review Row-Level Security (RLS), how it works in PostgreSQL, ...
200 views
There is so much more than you can so, than just starting and stooping your service, when you start to interact with systemd from ...
865 views
Docker is all the rage these days. Everyone is talking about it and investing in it, from startups to enterprises and everything in ...
4,666 views
Currently everyone uses the same seccomp rules for running their containers. This tool allows us to generate seccomp rules ...
581 views
Simple tool for running pods and containers This talk will describe all of the reasons for podman, all of its features demonstrate its ...
18,808 views