Home
Search results “Linux crypto api user space drivers”
An Overview of the Linux Kernel Crypto Subsystem - Boris Brezillon, Free Electrons
 
50:46
An Overview of the Linux Kernel Crypto Subsystem - Boris Brezillon, Free Electrons The Linux kernel has long provided cryptographic support for in-kernel users (like the network or storage stacks) and has been pushed to open these cryptographic capabities to user-space along the way. But what is exactly inside this subsystem, and how can it be used by kernel users? What is the official userspace interface exposing these features and what are non-upstream alternatives? When should we use a HW engine compared to a purely software based implementation? What's inside a crypto engine driver and what precautions should be taken when developing one? These are some of the questions we'll answer throughout this talk, after having given a short introduction to cryptographic algorithms. About Boris Brezillon Since 2014, Boris works at Free Electrons, a company offering development, consulting and training services to embedded Linux system developers worldwide. He has been working on embedded systems since 2008, mostly Linux on ARM. Boris has written and upstreamed a Linux kernel driver for the Marvell CESA cryptographic engine, he is the maintainer of the MTD NAND subsystem, and has contributed to support for Atmel and Allwinner ARM SoCs in the Linux kernel.
C/C++ Kernel Mode — Communcation From User space To Kernel Space (IOCTL)
 
06:06
Get My Visual Studio Theme! https://www.patreon.com/posts/how-to-get-and-8806134 • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 9239 Zer0Mem0ry
CAT Live | Linux Kernel Modules  | in Arabic
 
01:23:18
A lightweight session about the anatomy of A Linux Kernel modules, how to write one, and how to communicate with it from user space. This presentation is part of ‘System bits’ series that introduces various topics of systems development in an easy to comprehend format. ـــــــــــــــــــــــــــــــــــــــــــــــــــ The previous session : http://bit.ly/2dxRJ7f ــــــــــــــــــــــــــــــــــــــــــــــــــــ Speaker : KarimAllah Ahmed Facebook Event : https://goo.gl/pPhqtX ــــــــــــــــــــــــــــــــــــــــــــــــــــــ Linux Device Drivers 3rd Edition https://lwn.net/Kernel/LDD3/
Views: 954 CAT Reloaded
Silicon Valley Linux Users Group - Kernel Walkthrough
 
01:22:55
Presentation by Warren Turkal The Silicon Valley Linux Users Group hosts weekly sessions to walk through the code for the Linux Kernel, allowing newer users and developers to better understanding the operating system.
Views: 114708 Google
Maintaining a Linux Kernel for 13 Years? You Must be Kidding Me. We Need at Least 30?
 
34:02
Maintaining a Linux Kernel for 13 Years? You Must be Kidding Me. We Need at Least 30? - Agustin Benito Bethencourt & Ben Hutchings, Codethink Ltd Industrial grade solutions has a life expectancy of 30+ years. Maintaining a Linux kernel for such a long time in the open has not been done. Many claim that is not sustainable but corporations that build power plants, railway systems, etc. are willing to tackle this challenge. This talk will describe the work done so far on the kernel maintenance and testing front at the CIP initiative. During the talk it will be explained how we decide which parts of the kernel to cover - reducing the amount of work to be done and the risk of being unable to maintain the claimed support. The process of reviewing and backporting fixes that might be needed on an older branch will be briefly described. CIP is taking a different approach from many other projects when it comes to testing the kernel. The talk will go over it as well as the coming steps. and the future steps. About Agustin Benito Bethencourt Bachelor degree in Applied Physics and Master in Training. Agustin Benito Bethencourt has experience as entrepreneur, executive, IT director, product owner and consultant, in the FLOSS space. Currently he is Principal Consultant at Codethink Ltd currently focused in collaborative environments like CIP, AGL or GENIVI. Agustin has extensive experience working in the open in Open Source communities like KDE or openSUSE. Full background available at http://www.toscalix.com About Ben Hutchings Ben Hutchings is a developer at Codethink Ltd. He is a reputed kernel hacker and Debian developer. He currently maintains Linux Kernel 3.16 and 3.2 (Debian kernels) and the CIP kernel, based on 4.4 LTS.
Linux Kernel net_device data-structure - dev_get_by_name API - Episode3
 
11:17
A detailed video on net_device data-structure dev_get_by_name API of the Linux Kernel Networking subsystem. Refer: http://lxr.free-electrons.com/source/net/core/dev.c#L775 http://lxr.free-electrons.com/source/include/linux/netdevice.h#L2296 Download this episode my entire kernel module sample code, make file, clean script: http://www.the-toffee-project.org/index.php?page=41-videos-linux-kernel-net-device-data-structure by Kiran Kankipati, Founder: TOFFEE Website: http://www.the-toffee-project.org --------------- Please do subscribe to this channel for live updates of upcoming episodes. Post your queries/clarifications on Youtube comments and get clarified :)
Views: 819 The Linux Channel
C/C++ Memory Hacking — Function Hooking / Detouring
 
06:18
Project on github: https://github.com/Zer0Mem0ry/Detour/tree/master IDA Pro sigmaker: https://tuts4you.com/download.php?view.3263 Get My Visual Studio Theme! https://www.patreon.com/posts/how-to-get-and-8806134 • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 15891 Zer0Mem0ry
C/C++ Memory Hacking — Self Modifying Code | Encrypt Memory At Runtime
 
04:12
Project Download: Link Removed. DumpMemory: https://gist.github.com/domnikl/af00cc154e3da1c5d965 Get My Visual Studio Theme! https://www.patreon.com/posts/how-to-get-and-8806134 • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 30193 Zer0Mem0ry
C/C++ Kernel Mode — Read/Write Process' Memory From Driver
 
05:13
Github: https://github.com/Zer0Memory/KernelReadWriteMemory Get TDL From Here: https://github.com/hfiref0x/TDL Get My Visual Studio Theme! https://www.patreon.com/posts/how-to-get-and-8806134 • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 25580 Zer0Mem0ry
How to Install and Mine Cryptocurrency With Hive OS
 
09:43
Yet another Mining OS! This time there is no fee for up to three rigs on this linux distribution called Hive OS. hive OS: https://hiveos.farm/ Real VNC: https://www.realvnc.com/en/connect/download/viewer/ Mining Rig Build: Asus Prime Z270-A: http://amzn.to/2Dr4c3Z G4400: http://amzn.to/2DpWhDS Corsair Vengeance 4GB: http://amzn.to/2C5pVlN CryptoCase 6 GPU Frame: http://amzn.to/2C6gkeD x6 MSI Aero GTX 1060 3GB: http://amzn.to/2E8Yrt5 Samsung 32GB USB 3.0 Flash Drive: http://amzn.to/2CjccEQ Twitter https://twitter.com/SonOfATech Facebook https://www.facebook.com/Son-Of-A-Tech Instagram https://www.instagram.com/sonofatech/
Views: 47748 Son of a Tech
Build user trust: running containers securely with Google Container Engine (Google Cloud Next '17)
 
44:45
In this video, Alex Mohr and Jessica Frazelle cover all the ways you can secure your Kubernetes cluster using a Certificate Authority, Authentication, Secrets and more. They also describe and demonstrate the ways you can use Seccomp, AppArmor, SELinux and cgroups to make your application containers as secure as possible — so you can build organizational and customer trust. Missed the conference? Watch all the talks here: https://goo.gl/c1Vs3h Watch more talks about Infrastructure & Operations here: https://goo.gl/k2LOYG
Views: 6021 Google Cloud Platform
Getting More Out Of System Suspend In Linux
 
48:43
Rafael Wysocki http://lca2015.linux.org.au/schedule/30259/view_talk System suspend is one of the most mature and widely used power management techniques in Linux. At the same time the kernel's system suspend infrastructure is susceptible to inadvertent errors, so major changes in that code are relatively rare and applied with caution. However, that conservative approach has caused system suspend to gradually fall behind with meeting the expectations of modern systems' users. It has turned out recently that it needs to be faster, integrated more tightly with runtime PM, more careful about avoiding unnecessary operations and capable of handling systems with more advanced PM support in hardware in better ways. As a result, several efforts are under way to improve system suspend in Linux and make it even more useful. I will discuss those efforts, describe the improvements that have been achieved already and outline possible directions of future development.
Collaboration Summit 2013 - LTTNG-UST Efficient System Wide User-Space Tracing
 
35:52
The Linux Foundation Collaboration Summit 2013 San Francisco, California LTTNG-UST Efficient System Wide User-Space Tracing By Christian Babeux In the past, much effort has been invested in high performance kernel tracing tools, but now focus in the tracing community seems to be shifting over to efficient user space application tracing. By providing joint kernel and user space tracing, developers can have deeper insights in their applications latencies. This presentation covers the ongoing efforts within the LTTng project to enhance system-wide tracing at the user space level. It discusses instrumentation sources such as Tracepoints, Uprobes, and SystemTAP SDT providers, along with their integration with LTTng. A brief overview of the latest and upcoming features of the user space tracer is presented. It also discusses ongoing efforts in the area of trace format and control protocol standardisation. Finally, our presentation includes challenging glibc-related issues encountered during LTTng-UST development, opening the discussion on how to improve and collaborate on user-space instrumentation. The targeted audience is user space and kernel developers, those interested in tracing infrastructure, shared system libraries, and application instrumentation.
An introduction to Blockchain with Mark Russinovich - BRK2049
 
01:18:34
In this session, Mark explains how blockchains work, including how they use hashes, transactions, blocks, and proof-of-work consensus algorithms to build distributed ledgers. He presents the capabilities of some of the most common blockchain networks, then describes how the Confidential Consortium Blockchain Framework addresses their limitations to make blockchains suitable for a wide variety of business consortiums.
Views: 1518 Microsoft Ignite
1,000,000 Watchpoints, 20 Applications, 1 Driver, 0 Kernel Modifications
 
47:21
State-of-the-art tools in dynamic program security vulnerability analysis, such as Valgrind, Sage or Testudo, require the ability to efficiently monitor program variable accesses. The traditional approach of using binary instrumentation or mprotect can slow analyzed programs by orders of magnitude. In this talk, I'll present a open-source kernel-level solution that implements unlimited byte-level watchpoints with significantly less slowdown.
Protection of OS
 
13:47
By Sehrish
Views: 58 aqeelmani
CSE: 438 : Assignment 1: Shared Message Queues in User and Kernel Space
 
18:03
CSE: 438 : Embedded Systems Programming at ASU : Assignment 1: Shared Message Queues in User and Kernel Space
Views: 315 Harsh Patel
Cilium - Container Security and Networking Using BPF and XDP - Thomas Graf, Covalent
 
43:31
Cilium - Container Security and Networking Using BPF and XDP - Thomas Graf, Covalent This talk introduces Cilium, a fast emerging open source project leveraging BPF to provide networking and security for containers. We will do a quick deep dive into BPF, possibly the most promising low level technology to address challenges in application and network security, networking, tracing, and visibility. We will discuss how BPF became capable of universally extending and instrumenting both the Linux kernel and user space applications. The introduction is followed by a concrete example of how the Cilium open source project applies BPF to solve networking, security, and load balancing for highly distributed applications. We will discuss how Cilium can be combined with orchestration systems such as Kubernetes to provide security and networking for cloud native applications. About Thomas Graf Thomas Graf has been a Linux kernel developer for 15 years, working on a variety of networking and security subsystems. His current focus is on BPF/XDP and how it can be applied to solve challenges of distributed applications. This includes providing secure networking with transparent encryption, application aware security, tracing, visibility, and mitigation of DDoS attacks. Thomas is a contributor to various open source projects including the Linux kernel, Cilium, Open vSwitch, Docker, and Kubernetes.
Views: 1244 The Linux Foundation
The Lava Lamps That Help Keep The Internet Secure
 
03:59
At the headquarters of Cloudflare, in San Francisco, there's a wall of lava lamps: the Entropy Wall. They're used to generate random numbers and keep a good bit of the internet secure: here's how. Thanks to the team at Cloudflare - this is not a sponsored video, they just had interesting lava lamps! There's a technical rundown of the system on their blog here: https://blog.cloudflare.com/lavarand-in-production-the-nitty-gritty-technical-details Edited by Michelle Martin, @mrsmmartin I'm at http://tomscott.com on Twitter at http://twitter.com/tomscott on Facebook at http://facebook.com/tomscott and on Snapchat and Instagram as tomscottgo
Views: 1189998 Tom Scott
C/C++ Memory Hacking — Code Cave | Inject function to a process
 
05:27
Video tutorial showing how to code cave in C++ using win32 process API. Code Caving is basically executing YOUR code in the address space of another process. Firstly, you will need to allocate for some space in the remote target process (VirtualAllocEx), after that write your function to the allocated space in the process' heap (WriteProcessMemory). After that, creating a new thread to the process and placing the function in it's stack (CreateRemoteThread) Lastly, free the allocated space used to execute your code (VirtualFree) • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 27698 Zer0Mem0ry
Developer Keynote (Google I/O '18)
 
01:02:44
Learn about the latest updates to our developer products and platforms at Google in a Keynote led by Jason Titus. This video is also subtitled in Chinese, Indonesian, Italian, Korean, Japanese, Portuguese, and Spanish. 3:06 - Jason Titus speaks about Artificial Intelligence 6:33 - Stephanie Cuthbertson speaks about Android 18:37 - Brad Adams speaks about the Google Assistant and Actions on Google 26:30 - Tal Oppenheimer speaks about the Web 34:46 - Rich Fulcher speaks about Material Design 41:06 - Jia Li speaks about progress in AI 47:51 - Francis Ma speaks about Firebase 54:09 - Nathan Martz speaks about Augmented Reality 1:00:37 - Jason Titus speaks about Google Cloud Rate this session by signing-in on the I/O website here → https://goo.gl/wcFHx9 See all the sessions from Google I/O '18 → https://goo.gl/q1Tr8x Watch more Android sessions from I/O '18 → https://goo.gl/R9L42F Watch more Chrome sessions from I/O '18 → https://goo.gl/5fgXhX Watch more Firebase sessions from I/O '18 → https://goo.gl/TQEeBQ Watch more Google Cloud sessions from I/O '18 → https://goo.gl/qw2mR1 Watch more TensorFlow sessions from I/O '18 → https://goo.gl/GaAnBR Subscribe to the Google Developers channel → http://goo.gl/mQyv5L #io18
Views: 163020 Google Developers
CU-CS3753-2012-Week14-Recitation-04/18/12-Full
 
52:01
Week 14 Recitation (04/18/12) - Full CS3753 (Operating Systems) University of Colorado, Boulder TA: Andy Sayler (http://www.andysayler.com) Topic: PA5, File Systems, Linux VFS, FUSE, File Encryption
Views: 1414 Andy Sayler
Bruce Schneier: "Click Here to Kill Everybody" | Talks at Google
 
52:52
Computer security professional, privacy specialist and writer Bruce Schneier discusses "Click Here to Kill Everybody", his latest book exploring the risks and security implications of our new, hyper-connected era. Bruce lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. Get the book here: https://goo.gl/YDaVUX
Views: 9020 Talks at Google
BUD17-103 Compression support in OpenDataPlane (ODP)
 
28:24
A proposal to add ODP based compression/decompression API to provide portable hardware accelerated access for data plane applications that require compression/decompression. The proposal outlines 2 schemes: A. Reuse the existing Cryptography API to support Compression. B. Introduce independent Compression API. The initial implementation will target Cavium OCTEON TX SoC to accelerate IP Compression (IPComp)
Views: 93 LinaroOrg
C/C++ Hardware Control — Open/Eject the CD Tray
 
01:39
How to open/eject computer's cd tray/drive using C++ winAPI mciSendString Function. Good way to prank someone. • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 20909 Zer0Mem0ry
Client Server Program In Java Using Sockets
 
23:18
Client Server Program In Java Using Sockets, Using sockets for communication between the client and the server Python course link: https://www.udemy.com/python-masterclass-course/?couponCode=YOUTUBEOFFER
Views: 278034 Code Labs
Debugging realtime application with Ftrace
 
27:11
FOSDEM 2018 Streamdump Introducing Ftrace and using it for Linux realtime application Ftrace (Function Tracer) is a very famous tracing/debugging tool. It is built directly into the Linux kernel and most of standard distributions already have various configurations of Ftrace enabled in their most recent releases. One of the benefits that Ftrace brings to Linux is the ability to see what is happening inside the kernel with a large number of 'tracers' (function or events) . kernel function calling tree and timestamps kernel events (such as processus wakeup or switch) As such, this makes finding problem areas or simply tracking down that strange bug more manageable. Ftrace's ability to show the events that lead up to severe problem gives a better chance of finding exactly what caused it and can help the developer a lot. API to talk with Ftrace is located in a Debugfs file system. typically mounted at /sys/kernel/debug. You can also use 'trace-cmd' utility for easier access. After a brief history and introduction about tracing tools (SystemTap, eBPF, LTT-ng, ...) we will (briefly) talk about Ftrace internals and describe main features : installing it on embedded distribution such as Buildroot or Yocto (ARM platform) tracing kernel functions (function, function_graph) kernel messages (trace_printk) markers (trace_marker) events After describing a simple use-case for a kernel driver we will focus on events and use trace-cmd on "realtime" application running on standard Linux then PREEMPT_RT (ARM). We will compare performances of a POSIX based periodic task using SCHEDFIFO or SCHEDOTHER on both kernel and finally generate graphs with GNU-plot.
A little about Passthrough, PCIe, IOMMU Groups and breaking them up
 
20:33
This video is about PCIe passthrough to KVM virtual machines. It discusses what IOMMU is and how it works, the PCIe architecture and how it can effect iommu groupings. The video also shows some solutions for dealing with passing through devices when they are not alone in an iommu group. Please, if you can and want to support the channel and donate https://goo.gl/dw6MLW Or check my patreon page https://www.patreon.com/spaceinvaderone Music credits "Epic" composed and performed by Bensound from http://www.bensound.com/ Song "Demension" by Creo https://youtu.be/51tMCy8vhSM licensed under https://creativecommons.org/licenses/... Song "Showdown" by Creo https://youtu.be/51tMCy8vhSM licensed under https://creativecommons.org/licenses/... Dutty | YouTube Audio Library
Views: 4512 Spaceinvader One
Intro to groov EPIC Webinar
 
52:11
Learn how to simplify your automation and IIoT projects and improve security and performance, with little reliance on IT personnel. Learn More about groov EPIC: http://info.opto22.com/this-is-epic-introducing-groov-epic https://www.opto22.com/ The new groov EPIC system is ideal for applications that: Control plant equipment Manage OEM machines Connect SCADA systems Acquire remote data Collect MES or OEE data And much more In the webinar we'll demonstrate the software and hardware features of the groov EPIC system and see the advantages of combining real-time control and industrial edge computing. groov EPIC combines guaranteed-for-life I/O, real-time control, local and remote HMI, and industrial/IT data exchange in a single compact, industrial package. For industrial internet of things (IIoT) projects or for any automation application, come see how groov EPIC can make your job easier. Here are just a few of these features: Integrated high-resolution color touchscreen for HMI and commissioning Embedded I/O module specs and wiring diagrams No PC required for I/O and network configuration and troubleshooting UL Hazardous Locations approved and ATEX compliant Wide -20 to 70 °C operating temperature range Hot-swappable I/O Stainless-steel chassis with 4, 8, or 16 I/O modules; I/O density of up to 24 channels per module Spring-clamp terminal strip for field wiring, accommodating up to 14 AWG wire Integrated wireway with two-position swing-away cover Real-time, open-source Linux® OS running on an industrial quad-core ARM® processor Dual, independent Gigabit Ethernet network interfaces, dual USB ports, and HDMI output Securely shares data among databases, cloud services, PLC systems, remote equipment, and more Software included: Control programming: flowchart-based PAC Control with scripting. Optional secure shell access (SSH) for your own custom-developed application. Future support for IEC 61131. HMI: groov View for building and using your own HMI on any brand computer, phone, tablet, or other device with a web browser. Node-RED for creating simple logic flows using pre-built nodes. Ignition Edge® Onboard, providing OPC-UA drivers for Allen-Bradley® and Siemens® PLCs, plus MQTT/Sparkplug for efficient data communications (groov Enterprise license required).
Views: 589 Opto Video
LAS16-400: Mini Conference AOSP
 
01:32:26
LAS16-400: Mini Conference 3 AOSP (Session 1) Speakers: Thomas Gall, Bernhard Rosenkränzer Date: September 29, 2016 ★ Session Description ★ The Android Open Source Project is one community which is strategic to Linaro and it’s members. The purpose of this mini conference is to gather fellow Android engineers together from the community, member companies, and Linaro to discuss engineering activities and improve collaboration across different groups. Within this mini conference we encourage discussion and presentations to advance engineering topics, forge consensus and educate each other. The tentative agenda for this mini conference includes : - Quick introduction - Filesystems - Between requirements for encryption and standing concerns about degrading performance as an Android file system age, let’s have some discussion involving current data, known issues and towards improvements in this area for Android. - HAL consolidation - Review current status and discuss next steps to work on. One build for many devices: device/build configuration. Next features and platforms to add. Gaps in HiKey support vs. AOSP build. - Graphics - YUV support in mesa and hwc. - WiFi and sensor HAL status and next steps - New developments with AOSP + the Kernel - With regards to the Google Common Kernel tree and upstream Linux kernel activities related to Android, there are a few topics up for discussion: - - Updates on HiKey in AOSP - - EAS in common.git & integration with AOSP userspace - - New Sync API in 4.6+ kernels, and how it will affects graphics drivers - AOSP transition to clang - As everyone knows GCC in AOSP has been deprecated. Let’s cover current status, issues and next steps. Let’s also discuss the elephant in the room, building the kernel with clang. - Out of tree AOSP User space Patches - This is a discussion with the goal of organized action to see forward progress on AOSP user space patches that aren’t in AOSP for whatever reason. - Android is used in some environments where booting can be frequent and affect the product experience. Do you want to wait for a minute while your car boots? We’ll spend time brainstorming on improving Android boot time. ★ Resources ★ Etherpad: pad.linaro.org/p/las16-400 Presentations & Videos: http://connect.linaro.org/resource/las16/las16-400/ ★ Event Details ★ Linaro Connect Las Vegas 2016 – #LAS16 September 26-30, 2016 http://www.linaro.org http://connect.linaro.org
Views: 189 LinaroOrg
Install and setup Radarr for the best in movie downloads and management on unRAID
 
19:26
This video is a tutorial about how to setup and use Radarr for movie management on downloads. You will see how to prepare your existing movie catalogue to be compatible with Radarr, how to install the container then finally how to configure and use Radarr. This tutorial was done as a docker on unRAID but the principles will apply on other systems too. Please, if you can, support the channel and donate https://goo.gl/dw6MLW Information Programmes used to prepare files files2folder http://skwire.dcmembers.com/fp/?page=files-2-folder filebot. https://sourceforge.net/projects/filebot/files/filebot/ Radarr website https://radarr.video/ Thanks to The limetech team for unRAID Binhex for his container for radarr
Views: 36504 Spaceinvader One
ethOS crypto-mining config file settings
 
32:15
Buy me a beer if you find this useful! Donations: ELLA: 0xeF35f23011F3f8d5184Ec3b410Fdf755B71A8af4 ETH: 0x1Cf606A5f5fE116597df17ABbFcdd0bf6D70a570 Join my group on facebook: https://www.facebook.com/groups/CryptoCurrencyConsortium I'll walk you through the config files for the following currencies: * Ethereum (ETH) * Ethereum Classic (ETC) * Expanse (EXP) * Monero (XMR) * Music (Music) * Ethereum (ETH) and Sia Coin (SC) dual mining * Ethereum Classic (ETC) and Sia Coin (SC) dual mining * Expanse (EXP) and Sia Coin (SC) dual mining The specifications are as follows for each RIG: * ethOS v 1.2.3 * GA-F2A88X-UP4 motherboard * 6 AMD RX-480 4GB graphics cards or * Nvidia GTX 1060 6GB * 6 USB 3.0 PCI-E 1X to 16X Extender Riser Adapter * EVGA SuperNOVA 1000 G2 80+ GOLD, 1000W power supply * Intel BX80677G3930 7th Gen Celeron Desktop Processor It appears that my cut & paste is too large so write a comment if you want a specific one. I'll post a few here until I run out of space. ****local.conf.music**** autoreboot true autoreboot 100 driver 9bd33d amdgpu globaldriver amdgpu globalminer ethminer globalfan 100 globalpowertune 4 globalmem 2150 maxgputemp 85 stratumproxy enabled Music (Pool) flags -F -G -SP 1 -S musicoin.nomnom.technology:4444 -FS musicoin2.nomnom.technology:4444 -O 0x080928295551b0508bb86bbd6f3cb533b62d6ed5.9bd33d --cl-local-work 256 --cl-global-work 16384 --farm-recheck 100 ****local.conf.exp.solo**** autoreboot true autoreboot 100 driver 9bd33d amdgpu globaldriver amdgpu globalminer ethminer globalfan 100 globalpowertune 4 globalmem 2150 maxgputemp 85 stratumproxy enabled # Expanse (solo) proxywallet 0x2eeecf18a06f0447a51c40c1be983d157d47274a proxypool1 hostname:9656 proxypool2 hostname:9656 flags --farm hostname:9656 --cl-local-work 128 --cl-global-work 16384 --farm-recheck 60 ****local.conf.music.solo**** autoreboot true autoreboot 100 driver 9bd33d amdgpu globaldriver amdgpu globalminer ethminer globalfan 100 globalpowertune 4 globalmem 2150 maxgputemp 85 stratumproxy enabled # Music (solo) # # I'm not sure if the following line is needed. # #proxywallet 0x080928295551b0508bb86bbd6f3cb533b62d6ed5 # proxypool1 hostname:8545 proxypool2 hostname:8545 flags --farm hostname:8545 --cl-local-work 128 --cl-global-work 16384 --farm-recheck 60 ****local.conf.use.claymore.stub.conf**** autoreboot true autoreboot 100 driver 9bd33d amdgpu globaldriver amdgpu globalminer claymore globalfan 100 globalpowertune 3 globalmem 2150 maxgputemp 85 stratumproxy enabled ****claymore.stub.conf.eth.sia**** -colors 0 -dgb -1 -esm STRATUMTYPE -allpools 1 -gser 2 -allcoins 1 -wd 0 -mode 0 -tt 1 -dcoin sia -dcri 20 -epool us1.ethermine.org:4444 -ewal 0x96fE3d9B0391570585E738044E007A60175a47Bb.9bd33d -eworker 9bd33d -dpool stratum+tcp://us-east.siamining.com:7777 -dwal ab083fba724590e5cf426870cefe10ec78b5a0267e4a47b8e5611c7917b5ed6dcd50877c9d0c.9bd33d ****local.conf.use.sgminer-gm-xmr.stub.conf*** autoreboot true autoreboot 100 driver 9bd33d amdgpu globaldriver amdgpu globalminer sgminer-gm-xmr globalfan 100 globalpowertune 3 globalmem 2150 maxgputemp 85 stratumproxy enabled sgminer-gm-xmr=proxypool1 xmr-eu.dwarfpool.com:8050 sgminer-gm-xmr=proxypool2 xmr-usa.dwarfpool.com:8050 sgminer-gm-xmr=proxywallet 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRxdeWDG6NAEELNYd8w.9bd33d sgminer-gm-xmr=poolpass1 x sgminer-gm-xmr=poolpass2 x ****sgminer-gm-xmr.stub.conf**** { "pools": [{ "url": "xmr-eu.dwarfpool.com:8050", "user": "4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRxdeWDG6NAEELNYd8w.9bd33d", "pass": "x" }, { "url": "xmr-usa.dwarfpool.com:8050", "user": "4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRxdeWDG6NAEELNYd8w.9bd33d", "pass": "x" }], "profiles": [{ "worksize": "8", "name": "xmr", "algorithm": "cryptonight", "gpu-threads": "1", "rawintensity": "1024" }], "no-extranonce": "false", "default-profile": "xmr", "api-listen": true, "api-port": 4028, "api-allow": "W:127.0.0.1", "temp-cutoff": "MAXTEMP", "temp-overheat": "MAXTEMP" }
Views: 14907 Steve Driscoll
Kali Linux Network Scanning with NMAP Lecture 3 Tutorial by Thelinksmaster
 
06:52
Note: This video is for Educational purposes only. .........Always Happy to Help............. In this video Lecture i am showing you Kali Linux Network Scanning with NMAP Lecture 3 Tutorial by Thelinksmaster *********************** Tutorial by :-Thelinksmaster Team ......................................... And guide step by step guide and Core Commands Click my link Go this website  ............................................................................................ ALL ABOUT HACKING *************************** ........................................... More trick&tips|| visit My facebook page And my website ........................... https://www.facebook.com/thelinksmaster/ ......................... https://thelinksmaster777.wordpress.com/ ......................... http://thelinksmaster-hack.blogspot.in/
Views: 36 Thelinksmaster
Exploring and navigating the Filesystem in Linux
 
03:08
Learning the Linux File System Linux File System Types filesystem in linux filesystem in linux pdf filesystem in linux command filesystem in linux ppt filesystem in linux in hindi filesystem in linux tecmint filesystem in linux interview questions filesystem in linux geekstuff filesystem in linux definition filesystem in linux and windows filesystem in linux operating system filesystem for linux and mac filesystem arch linux linux file system acl filesystem api linux linux file system audit linux filesystem in a file exists in filesystem arch linux add filesystem in linux create a filesystem in linux resize a filesystem in linux filesystem benchmark linux filesystem backup linux filesystem for linux boot usb linux filesystem block size filesystem boost linux linux file system buffer linux file system browser btrfs filesystem in linux best filesystem in linux mount filesystem in linux command nfs filesystem in linux command filesystem linux check filesystem linux c++ filesystem linux code filesystem cache linux filesystem compression linux linux file system comparison filesystem create linux filesystem driver linux filesystem deduplication linux filesystem diff linux linux file system details linux dump file system filesystem detect linux linux dd file system different filesystem in linux default filesystem in linux filesystem in embedded linux filesystem linux ext filesystem linux extend mount nfs filesystem in linux example filesystem encryption linux filesystem in file linux filesystem linux full filesystem for linux and windows filesystem for linux live usb filesystem for linux mint filesystem for linux installation gfs filesystem in linux gfs2 filesystem in linux gpfs filesystem in linux git file system linux mount gpfs filesystem in linux filesystem linux hierarchy linux file system history file system hdd linux linux home file system how many filesystem in linux sap hana filesystem in linux how create filesystem in linux hierarchy root filesystem in linux linux file system information linux file system id filesystem implement linux increase filesystem in linux linux file system inode increase xfs filesystem in linux java linux file system filesystem journal linux jfs filesystem in linux jffs2 filesystem in linux journaling file system in linux meaning command to know filesystem in linux create filesystem in linux lvm extend filesystem in linux lvm filesystem linux list filesystem linux lvm filesystem label linux filesystem log linux filesystem layout linux linux loop file system filesystem in linux mcqs filesystem error in linux mint filesystem linux mac filesystem linux mount filesystem linux mint filesystem linux macos filesystem linux man filesystem for linux mac and windows filesystem monitoring linux filesystem namespace linux filesystem none linux linux file system name filesystem for linux ntfs exfat linux file system notification linux new file system linux file system number create new filesystem in linux filesystem in linux operating system ppt filesystem in linux operating system pdf extend filesystem in linux online filesystem linux osx filesystem linux o que é filesystem overlay linux linux file system options filesystem in linux process filesystem in partition linux filesystem in linux tutorial point virtual filesystem in linux pdf filesystem linux permissions linux file system performance linux file system quota filesystem in redhat linux 7 filesystem linux_raid_member filesystem linux-raid red hat linux file system filesystem linux resize creating filesystem in redhat linux reduce filesystem in redhat linux increase filesystem in redhat linux filesystem repair linux filesystem in linux slideshare filesystem in linux system suse linux file system filesystem linux ssd filesystem linux swap filesystem linux standard filesystem linux type filesystem tmpfs linux filesystem type linux_raid_member filesystem test linux filesystem timeout linux /tmp filesystem in linux mount the filesystem in linux filesystem in userspace linux filesystem in use linux filesystem linux usb create a filesystem in linux using mkfs filesystem usage linux filesystem uuid linux filesystem for linux ubuntu how to check filesystem in linux using command /usr filesystem in linux unmount filesystem in linux windows file system vs linux filesystem linux var filesystem linux virtual filesystem vfat linux linux file system version linux file system viewer view filesystem in linux how to extend filesystem in linux vmware root filesystem in linux wiki creating filesystem in linux with lvm filesystemwatcher linux filesystem watch linux how to extend filesystem in linux without lvm extending a root filesystem in linux with lvm xfs filesystem in linux xfs filesystem in linux 7 mount xfs filesystem in linux zfs file system linux repair filesystem 1 in linux 2 filesystem in linux how to create filesystem in redhat linux 6 how to create filesystem in linux 7 how to extend filesystem in linux 7 filesystem in linux 7
Views: 194 T3SO Tutorials
✅ How to Fix (libcrypto.so.1.0.0: no version information available for Packet Tracer7) | SYSNETTECH
 
07:30
How to Fix (libcrypto.so.1.0.0: no version information available for Packet Tracer7) | SYSNETTECH Solutions ► Article ► https://goo.gl/ao3VYM Read More ⬇️ ✅ S U B S C R I B E ► http://goo.gl/8d0iG9 This video shows you how to fix the "libcrypto.so.1.0.0" error during the installation of Packet Tracer 7.2 on Linux/Debian. To fix libcrypto.so.1.0.0 error for Packet Tracer 7 on Linux: Step 1: First, download the Cisco Packet Tracer 7.2 for Linux from the following link. ➦ https://www.sysnettechsolutions.com/en/ciscopackettracer/download-cisco-packet-tracer-7-2/ Step 2: Install Cisco Packet Tracer 7.2 on your Debian 9 Stretch system. You can check out the following video or article to install Packet Tracer. Article ➦ https://www.sysnettechsolutions.com/en/ciscopackettracer/install-cisco-packet-tracer-7-2-debian/ Video ➦ https://www.youtube.com/watch?v=MgAscNy41lQ Step 3: After installing Cisco Packet Tracer 7.2, execute the command ./PacketTracer7 in the Terminal to run the program. Step 4: If you encounter libcrypto.so.1.0.0 error, you need to install libcrypto.so.1.0.0 (libssl) package on Debian/Linux. Step 5: Run "sudo apt-get install libssl1.0.0" in Terminal to install libcrypto.so.1.0.0 on Linux. ➦ sudo apt-get install libssl1.0.0 Step 6: After installing the libssl1.0.0 package on Linux, run Cisco Packet Tracer 7.2 again. Step 7: If you are encountering the libcrypto.so.1.0.0 error on the line, run the following command in Terminal at this time. ➦ cp -i /usr/lib/x86_64-linux-gnu/libcrypto.so.1.0.0 /opt/pt/bin/ Step 8: Confirm to overwrite the file. ➦ cp: overwrite '/opt/pt/bin/libcrypto.so.1.0.0'? Y - Yes (Y) Step 9: Watch the entire video to fix libcrypto.so.1.0.0 error for Packet Tracer 7.2 on Linux. Step 10: For more videos on Cisco Packet Tracer 7.2 training, don't forget to subscribe to our YouTube channel! ➦ http://goo.gl/8d0iG9 ✅ Cisco Packet Tracer 7.2 System Requirements ➦ Minimum CPU: Intel Pentium 4, 2.53 GHz or equivalent OS: Microsoft Windows 7, Microsoft Windows 8.1, Microsoft Windows 10 or Ubuntu 16.04 LTS RAM: 2 GB Storage: 1.4 GB of free disk space Display resolution: 1024 x 768 Language fonts supporting Unicode encoding (if viewing in languages other than English) Latest video card drivers and operating system updates ➦ Recommended CPU: Intel Pentium 4, 3.0 GHz or better RAM: 4 GB Storage: 1.6 GB of free disk space Display resolution: 1920 x 1080 Sound card and speakers Internet connectivity (if using the Multiuser feature or tutorials) ─────BEST PRODUCT FOR CISCO PACKET TRACER────── ✅ Buy ► http://bit.ly/CiscoNetworkingEssentials ───────────────RELATED VIDEOS─────────────── ➊ How to Install Cisco Packet Tracer 7.2 on Windows 10 ➦ https://www.youtube.com/watch?v=to76AJEAYk4 ➋ How to Create Desktop and Start Menu Shortcut for Packet Tracer 7.2 on Debian 9 ➦ https://www.youtube.com/watch?v=twB-jQK2QU8 ➌ How to Install Cisco Packet Tracer 7.2 on Ubuntu 18.10 ➦ https://www.youtube.com/watch?v=_qrYzlcAqYQ ➍ How to Install Cisco Packet Tracer 7.2 on Debian 9 ➦ https://www.youtube.com/watch?v=MgAscNy41lQ ➎ How to Install Cisco Packet Tracer 7.1.1 on Ubuntu 18.04 using Wine 3.8 ➦ https://www.youtube.com/watch?v=MNml4ahYQT8 ───────────────FOLLOW US─────────────────── ✔ Facebook ➦ https://www.facebook.com/SysnettechSolutions/ ✔ Google+ ➦ https://plus.google.com/u/0/+Tolgabagci/ ✔ Twitter ➦ https://twitter.com/SysnettechS/ ✔ Pinterest ➦ https://www.pinterest.com/SysnettechS/ ✔ Instagram ➦ https://www.instagram.com/sysnettech_solutions/ ✔ LinkedIn ➦ https://tr.linkedin.com/in/tolqabaqci/ ✔ StumbleUpon ➦ http://www.stumbleupon.com/stumbler/Sysnettech/ ███████████████████████████████████████████ ⚠️ ⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️ WE DON'T ALLOW VIDEOS ON OUR YOUTUBE CHANNEL TO BE SHARED USING THE API !!! Even if a video's sharing feature on our YouTube channel is enabled, it does not mean that you will share this video content without permission. If you do not take this warning into account, we have to send SPAM notification to Google. We will have to use force on the person or website owner who is continuing to spam. If you embed the video in an article on your website, we may allow it. Thank you for your understanding. ███████████████████████████████████████████
What’s New in the Data Plane Development Kit (DPDK) 18.05 | Intel Software
 
04:34
Learn about the latest release of DPDK. The laundry list of features that come with every release is up-leveled and we will describe how each one affects the NFV user who uses it in their application. DPDK getting started guide: https://software.intel.com/en-us/articles/data-plane-development-kit-dpdk-getting-started Learn more about DPDK: https://software.intel.com/en-us/networking/dpdk Read the docs: https://docs.google.com/document/d/1szKhYBF5KKzPvvKaqseCxGJZiIdvmmOx2Sw_fJib2kY/edit?usp=sharing_eip&ts=5ae73eec Networking Home Page on the Intel Developer Zone: https://software.intel.com/networking Networking Playlist on the Intel Software YouTube Channel: https://www.youtube.com/watch?v=AZu7BPO15vM&list=PLg-UKERBljNy9EiUFZZTHOKGf-aeGg2KK Subscribe to the Intel Software YouTube Channel: http://bit.ly/2iZTCsz About Intel Software: The Intel® Developer Zone encourages and supports software developers that are developing applications for Intel hardware and software products. The Intel Software YouTube channel is a place to learn tips and tricks, get the latest news, watch product demos from both Intel, and our many partners across multiple fields. You'll find videos covering the topics listed below, and to learn more, you can follow the links provided! Connect with Intel Software: Visit INTEL SOFTWARE WEBSITE: https://intel.ly/2KeP1hD Like INTEL SOFTWARE on FACEBOOK: http://bit.ly/2z8MPFF Follow INTEL SOFTWARE on TWITTER: http://bit.ly/2zahGSn INTEL SOFTWARE GITHUB: http://bit.ly/2zaih6z INTEL DEVELOPER ZONE LINKEDIN: http://bit.ly/2z979qs INTEL DEVELOPER ZONE INSTAGRAM: http://bit.ly/2z9Xsby INTEL GAME DEV TWITCH: http://bit.ly/2BkNshu What’s New in the Data Plane Development Kit (DPDK) 18.05 | Intel Software https://www.youtube.com/intelsoftware
Views: 2173 Intel Software
multiple client decryption driver implementation
 
02:28
Handling transparent decryption on multiple user account using file system driver. Userspace application (scanuser.exe) is connected as client to server (file system driver). Data are transfered from/to appropriate client as needed
Views: 118 suki minna
Google I/O 2012 - Beyond Paper: Google Cloud Print and the Future of Printing
 
01:06:43
Akshay Kannan Use Google Cloud Print's API to send documents to a printer (or anywhere else) quickly and easily. We're currently integrated with Chrome, ChromeOS, mobile Gmail/Docs, and most new printers, and that's just the start. We provide a configurable JavaScript API, an Android Intent, as well as HTTP and XMPP interfaces for sending documents and receiving them in virtually any format. Come learn how to enable printing from your web and mobile apps on any device to any printer in the world, with just a few lines of code! For all I/O 2012 sessions, go to https://developers.google.com/io/
Views: 9424 Google Developers
RailsConf 2015 - Passwords are not Enough
 
46:26
Passwords are not Enough by: Greg Baugues Every week we hear news of another security breach. We’ve learned that retailers aren’t safe from their HVAC vendors, Seth Rogen can stir an international cybersecurity incident, and not even the venerable OpenSSL can be trusted. If you're concerned about the security of your Rails app but don't feel like you can spare the time or effort to implement two factor authentication, this talk is for you. We'll discuss the best ways to protect your users' accounts and live code the integration of two factor authentication into your Rails app in less than 15 minutes using Authy. Help us caption & translate this video! http://amara.org/v/G61E/
Views: 1234 Confreaks
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S
 
49:49
The Tesla Model S is the most connected car in the world. It might surprise you to hear that it is also one of the most secure. In this talk we will walk you through the architecture of a Tesla Model S noting things that Tesla got right as well as identifying those that they got wrong. From this talk you will get an intimate understanding of how the many interconnected systems in a Tesla model S work and most importantly how they can be hacked. You will also get a good understanding of the data that this connected car collects and what Tesla does with this telemetry. We will also be releasing a tool that will enable Tesla Model S owners to view and analyse that telemetry in real time. Finally we will also be releasing several 0day vulnerabilities that will allow you to hack a Tesla Model S yourself - both locally and remotely. Note - only one of the 6 vulnerabilities we will discuss and release has been fixed. Disclaimer: With great access comes great responsibility - In other words we are not responsible for any Tesla Model S bricked by over enthusiastic attendees of this talk :) Speaker Bios: Marc Rogers aka Cyberjunky has been a prominent member of the hacking scene since the 80’s. Some of his most notable achievements are co-founding the notorious British hacker group, “The Agents of a Hostile Power” and his role in creating and appearing in the award winning BBC TV series “The Real Hustle”. Marc’s professional career spans more than twenty years, including a decade managing security for the UK operator Vodafone. Marc is currently the principal security researcher for web optimization and security company “CloudFlare. As well as his work in the infosec and telecoms industries, Marc has also been a CISO in South Korea and co-founder of a disruptive Bay Area start-up. Some of Marc’s notable recent hacks include Google Glass, Apple TouchID and most recently the Tesla Model S. Kevin is an entrepreneur and technologist with a background in mobile and web technology, security, and privacy. He is the CTO of Lookout, a company dedicated making the world a safer place as it becomes more connected, starting with smartphones and tablets. He co-founded Lookout in 2007 and is responsible for driving Lookout’s technology to protect people from current and future threats while keeping the product simple and easy to use. He started building software when he was 8 years old and it has been a love affair ever since. Kevin is a frequent speaker on security, privacy, mobile, and other topics.
Views: 58266 DEFCONConference
Real-time communication with WebRTC: Google I/O 2013
 
44:17
Justin Uberti, Sam Dutton Presentation slides: http://io13webrtc.appspot.com 01:41 WebRTC across platforms 03:37 WebRTC APIs 04:32 MediaStream 09:44 RTCPeerConnection 12:28 RTCDataChannel 16:31 Signaling 18:43 STUN and TURN 22:18 Security 23:21 Architectures 25:03 Beyond browsers 27:15 Building a WebRTC app 29:56 Chris Wilson LIVE! 31:16 Links and resources WebRTC implements open standards for realtime, plugin-free video, audio and data communication. The core WebRTC APIs getUserMedia, RTCPeerConnection and DataChannel have now been implemented across Chrome and Firefox. In this session, we show you how to get started with building a WebRTC app: - what's a MediaStream (aka getUserMedia) and how can I use it? - resolution constraints - signalling: what is it and how can I set it up? - servers: what do I need? - RTCPeerConnection: WebRTC€™s most powerful API - RTCDataChannel: realtime communication of arbitrary data - integrating WebRTC with Web Audio - interoperability - security During the session, we talk through code examples, live demos and production apps. For all I/O 2013 sessions, go to https://developers.google.com/live.
Views: 407267 Google Developers
14. SSL and HTTPS
 
01:18:18
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection of network traffic into the web security model. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 60044 MIT OpenCourseWare
Simulate Key Presses in Python
 
02:11
This video demonstrates how to press keys with Python. Using pynput we are able to simulate key presses into any window. I show you how to press and release a key, type special keys and type a sentence. If you have any issues feel free to comment. 🌎 Post with code and a written tutorial: http://nitratine.net/simulate-keypresses-in-python/ How to setup pip: https://youtu.be/cm6WDGAzDPM 🌎 For more keys, go to: http://pythonhosted.org/pynput/keyboard.html#pynput.keyboard.Key 📺 Auto Py to Exe: https://youtu.be/OZSZHmWSOeM 📺 Get Keypresses in Python: https://youtu.be/x8GbWt56TlY Currently pyinstaller supports up to python 3.6. 🐍 In this video I use Python 3.5. 👍🏼 Feel free to comment with any issues.
Views: 32289 PyTutorials
DEFCON 20: Hacking Measured Boot and UEFI
 
45:49
Speakers: DAN GRIFFIN PRESIDENT, JW SECURE, INC. There's been a lot buzz about UEFI Secure Booting, and the ability of hardware and software manufacturers to lock out third-party loaders (and rootkits). Even the NSA has been advocating the adoption of measured boot and hardware-based integrity checks. But what does this trend mean to the open source and hacker communities? In this talk I'll demonstrate measured boot in action. I'll also be releasing my new Measured Boot Tool which allows you to view Trusted Platform Module (TPM) boot data and identify risks such as unsigned early-boot drivers. And, I'll demonstrate how measured boot is used for remote device authentication. Finally, I'll discuss weaknesses in the system (hint: bootstrapping trust is still hard), what this technology means to the consumerization trend in IT, and what software and services gaps exist in this space for aspiring entrepreneurs. Dan Griffin is the founder of JW Secure, a Seattle-based security software company. He has published several articles on security software development, as well as on IT security, and is a frequent conference speaker. Dan holds a Masters degree in Computer Science from the University of Washington and a Bachelors degree in Computer Science from Indiana University. Dan previously gained notoriety for demonstrating how to use a hacked smart card to compromise Windows Vista. Twitter: @jwsdan For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 5782 Christiaan008
Exploiting modern microarchitectures Meltdown, Spectre, and other hardware attacks
 
58:09
by Jon Masters At: FOSDEM 2018 Room: Janson Scheduled start: 2018-02-04 17:00:00+01
Views: 1416 FOSDEM
Google Cloud Filestore: Managed Files for Your Applications (Cloud Next '18)
 
30:49
Google Cloud Filestore, recently launched into Beta, is a managed file service for your apps. This session provides a product overview, features, pricing, and common use cases. We culminate with a demo integration with other GCP services showing an end-to-end file centric workflow. IO231 Event schedule → http://g.co/next18 Watch more Infrastructure & Operations sessions here → http://bit.ly/2uEykpQ Next ‘18 All Sessions playlist → http://bit.ly/Allsessions Subscribe to the Google Cloud channel! → http://bit.ly/NextSub
Inject DLL from kernel mode
 
01:28
http://www.rohitab.com/discuss/topic/40737-inject-dll-from-kernel-mode/
Views: 6715 zwclose7
Crypto Defenses for Real-World System Threats - Kenn White - Ann Arbor
 
01:36:58
Modern encryption techniques provide several important security properties, well known to most practitioners. Or are they? What are in fact the guarantees of, say, HTTPS TLS cipher suites using authenticated encryption, IPSec vs. SSL VPNs, Property Preserving Encryption, or token vaults? We live in an era of embedded Hardware Security Modules that cost less than $1 in volume, and countless options now exist for encrypting streaming network data, files, volumes, and even entire databases. Let's take a deep dive into the edge of developed practice to discuss real-world threat scenarios to public cloud and IoT data, and look closely at how we can address specific technical risks with our current encryption toolkits. Advanced math not required. Bio: Kenneth White is a security researcher whose work focuses on networks and global systems. He is co-director of the Open Crypto Audit Project (OCAP), currently managing a large-scale audit of OpenSSL on behalf of the Linux Foundation's Core Infrastructure Initiative. Previously, White was Principal Scientist at Washington DC-based Social & Scientific Systems where he led the engineering team that designed and ran global operations and security for the largest clinical trial network in the world, with research centers in over 100 countries. White co-founded CBX Group which provides security services to major organizations including World Health, UNICEF, Doctors without Borders, the US State Department, and BAO Systems. Together with Matthew Green, White co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. White holds a Masters from Harvard and is a PhD candidate in neuroscience and cognitive science, with applied research in real-time classification and machine learning. His work on network security and forensics and been cited by media including the Wall Street Journal, Forbes, Reuters, Wired and Nature. White is a technical reviewer for the Software Engineering Institute, and publishes and speaks frequently on computational modeling, security engineering, and trust. He tweets @kennwhite.
Views: 833 Duo Security
Day 1 Keynote: Building a Cloud for Everyone (Cloud Next '18)
 
01:43:52
Get ready to be inspired by speakers who are building a cloud full of opportunity with our partners and customers. This video is also subtitled in Chinese, Indonesian, Italian, Japanese, Korean, Portuguese, and Spanish Event schedule → http://g.co/next18 Next ‘18 All Sessions playlist → http://bit.ly/Allsessions Subscribe to the Google Cloud channel! → http://bit.ly/NextSub
Views: 42377 Google Cloud
How to Build a Product IV - Jan Koum - CS183F
 
51:25
In the fourth and final episode of How to Build a Product, Jan Koum shares his journey as the CEO and co-founder of WhatsApp.
Views: 30787 stanfordonline