Breaking with conventional Configuration File Editing Puppet with a Key Value API in a User Study

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=M6IyQIgCVQU



Duration: 25:10
0 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-22An Introduction to Ada for Beginning and Experienced Programmers
2022-06-22Bicycle sharing stations profiling and availability prediction
2022-06-22A real life story about product testing with robotframework Lessons learned testing IoT devices wit…
2022-06-22AI on Microcontrollers uTensor brings Deep Learning to MCUs
2022-06-22Ceph management with openATTIC
2022-06-22A pixel format guide to the galaxy A tool for interpreting pixel format definitions
2022-06-22Beyond WHERE and GROUP BY
2022-06-22Browser as GUI and Web Applications with Gnoga
2022-06-22ARM64 FPGA and more Linux on the Xilinx ZynqMP Opportunities and challenges from a powerful and …
2022-06-22Ceph & ELK Use the power of the ELK stack to know more about your Ceph Cluster
2022-06-22Breaking with conventional Configuration File Editing Puppet with a Key Value API in a User Study
2022-06-22A lion, a head, and a dash of YAML Extending Sphinx to automate your documentation
2022-06-22Æ DIR Authorized Entities Directory from paranoid user management to secure system management
2022-06-22Are distributions still relevant
2022-06-22Beyond the screen WebXR when immersive content enters the Web
2022-06-22Beyond string based logging Structured logging with Serilog
2022-06-22A Journey through Upstream Atomic KMS to achieve DP compliance Black Screens and how to prevent the…
2022-06-22C Code Generation with GRC
2022-06-22CBSD, Isolation manager How to manage jails, bhyve VMs and Xen via CBSD, while keeping it all simple
2022-06-22Behind the scenes of a FOSS powered HPC cluster at UCLouvain Ansible or Salt Ansible AND Salt
2022-06-22Advocating For FOSS Inside Companies



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering