Metaprogramming with Nim

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=Co-DC7pdtBs



Duration: 14:38
191 views
4


FOSDEM 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-27Mgmt Config The Road to 0 1 Real time, autonomous, automation
2022-06-27Matrix in the French State What happens when a government adopts open source & open standards for a…
2022-06-27Make your own language with Racket A kickstart workshop for the creative minds
2022-06-27Mastering Application Service Configuration How to cover your configuration needs with oslo config
2022-06-27Linking OpenStreetMap and Wikidata A semi automated, user assisted editing tool
2022-06-27LemonLDAP NG 2 0
2022-06-27MariaDB and MySQL what statistics optimizer needs or when and how not to use indexes
2022-06-27Mgmt Config A tale of three graphs Real time, autonomous, automation with graphs mostly DAG's
2022-06-27Leela Chess Zero Learning chess from scratch
2022-06-27Lightning Talks
2022-06-27Metaprogramming with Nim
2022-06-27Managing VMs and Containers in a Deeply Integrated UI
2022-06-27Make your code count Quantum simulations and collaborative code development Introduction to QuTiP
2022-06-27Make XMPP Sprint Again
2022-06-27libsigmf Human Tools for Extra Terrestrial and AI Radios
2022-06-27Merging System and Network Monitoring with BPF Merging packets with system events using eBPF
2022-06-27Managing and Monitoring Ceph with the Ceph Manager Dashboard Introduction Overview and Demo
2022-06-27Learning to Rank Explained for Dinosaurs
2022-06-27LibreOffice Online hosting your documents Keeping your documents close and yet collaborative
2022-06-27Make Room Make Room Space saving techniques in oVirt
2022-06-27MALT, A Malloc Tracker



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering