SDR, Ham Radio and the Debian Hams project Turn key solutions for hams using Debian packages

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=iHF0eBhIUW4



Duration: 26:48
7 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-09Python and Raspberry Pi Physical computing, GPIO, HATs and IoT with Python
2022-06-09RISC V Open Hardware for Your Open Source Software
2022-06-09Rapid backend prototyping for a geolocation based mobile game With OpenResty, Redis and Docker
2022-06-09Secure and Safe Updates for Your Embedded Device
2022-06-09switchdev the Linux switching framework running a mainline kernel on network gear
2022-06-09Supercharge your collaboration with an Open Source Wiki and stop using closed source solutions like
2022-06-09Smart card forwarding
2022-06-09rinohtype The Python document processor
2022-06-09Python and the SOLID principles
2022-06-09Radio Lockdown Directive Major threat for Free Software on radio devices
2022-06-09SDR, Ham Radio and the Debian Hams project Turn key solutions for hams using Debian packages
2022-06-09Putting Your Jobs Under the Microscope using OGRT
2022-06-09Retro desktops for retro computers From 8 bit to Atari, Amiga & friends
2022-06-09Successful and not yet successful optimisations in Valgrind
2022-06-09Purely Functional GPU Programming with Futhark
2022-06-09Small languages panel
2022-06-09Success Stories from the OSD community
2022-06-09Quit managing the infrastructure to manage your infratsructure OpsTheater, an open source stack of
2022-06-09Resurrecting dinosaurs, what can possibly go wrong How Containerised Applications could eat our us
2022-06-09SDR Panel Which are the top 3 challenges for free software radio An interactive session Let's ta
2022-06-09Quickstart Big Data



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering