Luerl Lua in Erlang Luerl introduction emphasizing its trade off as scripting skin on top of the B

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=Ze7AiHcEd9s



Duration: 15:39
3 views
0


FOSDEM 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-27Maemo Leste A Debian Devuan based mobile hacker OS
2022-06-27MALT & NUMAPROF, Memory Profiling for HPC Applications
2022-06-27Learning about Deep Learning Applications for OpenJDK Java Verification
2022-06-27Introducing Kubeflow w Special Guests Tensorflow and Apache Spark
2022-06-27Mender an open source OTA software update manager for IoT
2022-06-27LibreOffice the origins of a community fork
2022-06-27LAVA federated testing Testing with and by the community
2022-06-27Monica, a personal CRM Remember everything about your friends and family
2022-06-27M3 and a new age of metrics and monitoring in an increasingly complex world
2022-06-27JavaScript for open computing education
2022-06-27Luerl Lua in Erlang Luerl introduction emphasizing its trade off as scripting skin on top of the B
2022-06-27Mobile design with device to device networks Exploring the design space of novel technologies throu…
2022-06-27Java with Docker How to Make it Work
2022-06-27Latest evolution of Linux IO stack, explained for database people
2022-06-27Leveraging real time streaming with Neo4j Streams
2022-06-27Lucene Upgrade in Jira 8 0 How we fought and killed the code debt beast
2022-06-27Making the next blockbuster game with FOSS tools Using Free Software tools to achieve high quality …
2022-06-27Java Language Futures
2022-06-27Leveraging ceph mgr modules for fun and profit
2022-06-27Let's use centralized log collection to make incident response teams happy
2022-06-27Mining Source Code3 Mining Idioms, Usages and Edits



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering