Does your configuration code smell

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=04uNexX0b-w



Duration: 30:27
0 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-05Fundraising and Crowdfunding for FreeRTC Helping developers who work on RTC full time
2022-06-05FOSS and the GDPR Overview of key changes to EU privacy law that FOSS can use to promote individual
2022-06-05go git A pure Go implementation of Git
2022-06-05Essentials about Disaster Recovery with Relax and Recover A generic introduction for beginners
2022-06-05GNU Radio Project Intro & Update manipulating one of the four fundamental forces of the universe
2022-06-05Frosted Embedded POSIX OS A free POSIX OS for Cortex M embedded systems
2022-06-05Don't break the Internet, Mozilla Copyright Campaign in Europe
2022-06-05FOSDEM infrastructure review
2022-06-05Everything You Always Wanted to Know About Hello, World But Were Afraid To Ask
2022-06-05Escoria, a libre point'n'click framework using Godot Engine Oh, it looks just like SCUMM Tim
2022-06-05Does your configuration code smell
2022-06-05diaspora The state of diaspora and the decentralized social world The Federation is alive
2022-06-05Adding GNU Hurd support to GNU Guix and GuixSD Porting Guix and GuixSD to GNU Hurd
2022-06-05cozy Decentralize & Recentralize on Cozy Learn the real value of your data, using cozy
2022-06-05caliopen Privacy index metrics in digital communication Showing to Caliopen's users how public th
2022-06-05Adding 16 bit Character Support in LLVM
2022-06-05Accessibility in Open Source Accessibility in Open Source
2022-06-05Mobile Web Compatibility Why is important to care about users from different platform How can yo
2022-06-05Cypher ON ❯ApacheFlink❮ USING Gradoop
2022-06-05Accelerating TCP with TLDK overview of the architecture and implementation of TLDK
2022-06-05Abusing Google's Chromium EC firmware for your own designs Building Franken Chromebook devices



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering