filetinuous Integration to compile and test Navit

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=XC_901uzMK8



Duration: 21:16
0 views
0


FOSDEM 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-23D Wave Hybrid Framework
2022-06-23Distributed Computing with Ada and CORBA using PolyORB
2022-06-23filetrolling the Execution of Parallel Algorithms in Ada
2022-06-23Drawing PCBs with Inkscape Creating printed circuit board designs using Inkscape, SVG2Shenzhen and …
2022-06-23Decentralizing the Web Despite Itself
2022-06-23Displaying other Application data into a Wiki … and other integrations
2022-06-23filetinuous Localization How we ship localized versions of Firefox, on Laptops and Android
2022-06-23Dotting the ethics i and crossing the t Solid ethics for FOSS user research
2022-06-23Documenting Validator Requirements
2022-06-23Extend Emacs in C or Other Languages
2022-06-23filetinuous Integration to compile and test Navit
2022-06-23Discover GraphQL with Python, Graphene and Odoo
2022-06-23Exporting Ceph Object Storage data to the outside world RGW Sync Modules for fun & profit
2022-06-23Document Redaction with LibreOffice Preventing Leakage of Sensitive Information by Redaction in Col…
2022-06-23Debug info in optimized code how far can we go Improving LLVM debug info with function entry val…
2022-06-23Exponential speedup in progress Closing remarks
2022-06-23Clang plugins in LibreOffice global analyses across a large codebase
2022-06-23Do you think is easy to create a console app
2022-06-23filetaining the RDMA plasma An experience report on wrapping a wildly unsafe library
2022-06-23Debian Java Insights and challenges learn more about the daily work to package Java software for D
2022-06-23Digital Predistortion Implementation and Use



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering