Piece of cake testing remote embedded devices made easy using open hardware MuxPi

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=D21R3sitXGc



Duration: 23:24
1 views
0


FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-18Reducing CPU usage of a Toro Appliance
2022-06-18Pronto Raster A C library for Map Algebra
2022-06-18Rust embedding WebAssembly for scripting WebAssembly in non Javascript environments
2022-06-18Recycle Parsers With Grammar Common in Perl 6
2022-06-18Programming UEFI for dummies What I have learned while tweaking FreePascal to output UEFI binaries
2022-06-18Running Android on the Mainline Graphics Stack
2022-06-18Package quality assurance
2022-06-18Productionizing Spark ML Pipelines with the Portable Format for Analytics
2022-06-18Recapping DARPA's First Big Hackfest
2022-06-18Rubber 'Duke' Debugging
2022-06-18Piece of cake testing remote embedded devices made easy using open hardware MuxPi
2022-06-18Scale Out and Conquer Architectural Decisions Behind Distributed In Memory Systems
2022-06-18Reasons to mitigate from NFSV3 to NFSV4 4 1
2022-06-18Privacy aware city navigation with CityZen app The free open source app that let's you explore your…
2022-06-18Ring as a free universal distributed communication platform The state of the project in 2018
2022-06-18Package Management Unites Us All
2022-06-18SatNOGS Crowd sourced satellite operations Satellite Open Source Ground Station Network
2022-06-18Physics, Math, and SDR Recognize, measure, and correct the inevitable
2022-06-18Real Time Clustering with OpenSIPS Nodes of a feather gossip together
2022-06-18OpenDaylight as a Platform for Network Programmability
2022-06-18Presenting the Sympa Mailing List Manager and the new Sympatic CPAN module



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering