A roadmap for the Hurd

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=q7JwD6FVGb8



Duration: 22:09
53 views
2


FOSDEM 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-18Analysis of the behavior of mobile applications and its consequences for our privacy Presentation a…
2022-06-183Geonames org An open source Geocoding system for the simple communication of locations with a reso…
2022-06-18An update on Virtio What happened recently and what's coming soon
2022-06-18A small, FRP DSL for distributed systems Mgmt Config The Language
2022-06-180 A D , a libre real time strategy game History is yours for the taking
2022-06-18An Update on NetBSD and pkgsrc
2022-06-18A Scalable Approach to Virtual Switching
2022-06-18Autocrypt Automating E Mail Encryption What E Mail can learn from the success of end to end encry…
2022-06-180 A D Graphics Graphics problems and opportunities of open source game
2022-06-18An overview of Tezos focusing on On Chain Governance A new develoment paradigm for the blockchain
2022-06-18A roadmap for the Hurd
2022-06-18A quick update on singularity 3 0 singularity 3 0
2022-06-18A private cloud for everyone Why and how Nextcloud builds a private cloud software
2022-06-18Writing a Janus plugin in Lua C can be a scary world, let us come to the rescue
2022-06-18Wrap it Up Packaging from Pots to Software
2022-06-18Working in the ODF TC
2022-06-18Valgrind's Memcheck tool vs Optimising Compilers Keeping the false positive rate under control
2022-06-18Valgrind register allocator overhaul
2022-06-18Will it blend Comparison of oVirt, OpenStack and Kubernetes schedulers
2022-06-18Using TPM 2 0 As a Secure Keystore on your Laptop It's not as difficult as you think
2022-06-18Wikilab, architecture & CNC Collaborative architecture and construction with FreeCAD



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering