Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,641 results
00:00:00 - Introduction To Linux Sucks 00:07:17 - Who Is This Lunduke Anyway 00:14:33 - And It Just Gets Worse 00:25:25 ...
28,145 views
4 months ago
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,133 views
1 year ago
Additionally Alan Cox weights in on how *not* to do changes, using GNOME 3 as an example. This is an excerpt from ELCE 2011 ...
174,502 views
2 years ago
Cockpit makes Linux discoverable. But it's really a Linux session in a web browser, accessing the native system APIs and tools ...
1,034 views
5 years ago
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,772 views
As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...
3,822 views
9 months ago
Everything You Know About the GIL is Wrong by Jerry D'Antonio When a Rubyist hears "concurrency" they usually Google Elixir, ...
2,863 views
8 years ago
Modern container engines such as systemd.nspawn and rkt provide a means of restricting privilege by limiting Linux capabilities.
417 views
Learn how Linux for Chromebooks (Crostini) gives you a secure sandbox for development. Through a variety of demos, this talk ...
205,527 views
Help me contribute to KDE and do these videos: Paypal: https://paypal.me/niccolove Patreon: ...
40,460 views
10 months ago
This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of ...
48,089 views
9 years ago
In this talk Dmitry will highlight some of the areas for improvement related to release quality, security, and developer experience ...
1,784 views
4 years ago
Let's screw with nmap GREGORY PICKETT PENETRATION TESTER, HELLFIRE SECURITY Differences in packet headers allow ...
1,722 views
10 years ago
With complete access to a system, Linux kernel rootkits are perfectly placed to hide malicious access and activity. However ...
4,609 views
The requirements for Windows 11 include UEFI, Secure Boot, and a Trusted Platform Module (TPM). This is how Microsoft will ...
2,144,897 views
However this talk will reveal deeper insight on the many features of this technology, such as full symbol table reconstruction, ...
5,308 views
We will discuss the various malware infecting Linux IoT devices including Mirai, Hajime, and BrickerBot and the vulnerabilities ...
195 views
6 years ago
I almost fell off my chair when I heard that Microsoft released their own Linux distro. So what is this distro? What are Microsoft up to ...
968 views
Linux Containers: Future or Fantasy? Aaron Grattafiori Principal Security Consultant, iSEC Partners/NCC Group Containers, ...
14,171 views
TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated ...
9,904 views