Automating Secure Boot testing

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=G2lpEShmGyA



Duration: 13:44
2 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-22Anatomy of the OpenOffice localization process And how to improve it in future
2022-06-22Building OSM based web app from scratch How to find the way through the open source jungle
2022-06-22Class Data Sharing Sharing Economy in the HotSpot VM
2022-06-22Automating style guide documentation How we at Zalando Retail Dept automated our Styleguide & sourc…
2022-06-224 Perl web services I wrote and that you may like
2022-06-22Adding support for a mouse in libratbag
2022-06-22Building Decentralised Communities with Matrix Introducing Matrix Communities and more as a dece…
2022-06-22Booting it successfully for the first time with mainline
2022-06-22Analzying Blockchain transactions in Apache Spark
2022-06-22Adding performance counters to htop
2022-06-22Automating Secure Boot testing
2022-06-22Yet another passive RADAR using DVB T receiver and SDR
2022-06-22Ada, or How to Enforce Safety Rules at Compile Time
2022-06-22Accessibility 101 not only for LibreOffice developers
2022-06-22Accelerating Big Data Outside of the JVM Adventures with Apache Arrow, Spark, BEAM, Flink, and frie…
2022-06-22A unique processor architecture meeting LLVM IR and the IoT
2022-06-22Blue elephant on demand Postgres Kubernetes
2022-06-22Automated Linux Containers deployment for fun and profit How we deploy system containers for our d…
2022-06-22Build your own Skype in the browser A background to WebRTC
2022-06-22Automate oVirt Disaster Recovery Solution With Ansible See How Ansible Makes oVirt Recovery A Piece…
2022-06-22Blame and DNS debugging tutorial Find out who, where, and how broke your DNS



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering