What motivates the open source community a qualitative exploration of the underlying experiences

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=FjOWkx_1Z-A



Duration: 26:13
0 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-09Tour de Data Types VARCHAR2 or CHAR255
2022-06-09What makes TruffleRuby run Optcarrot 9 times faster than MRI
2022-06-09Trace Everything When APM meets SysAdmins
2022-06-09Using XMPP to Connect and secure the world of IoT XMPP backed IoT
2022-06-09What open source and J K Rowling have in common Importance of storytelling in open source projects
2022-06-09The emergence of open source 4G 5G ecosystems
2022-06-09Unbreakable unit tests
2022-06-09Welcome to the Ruby Devroom 2017
2022-06-09Xorn A new approach to scripting for gEDA gaf
2022-06-09Virtuozzo containers, how it works virtuozzo, most known as openvz containers techonlogy
2022-06-09What motivates the open source community a qualitative exploration of the underlying experiences
2022-06-09Writing a functional DPDK application from scratch
2022-06-09The Internet Cube La Brique Internet
2022-06-09The Veripeditus AR Game Framework Enabling everyone to freely create Augmented Reality Games
2022-06-09The VFS paradigm from the perspective of a component OS
2022-06-09Testing with volcanoes FuegoLAVA Embedded testing going distributed
2022-06-09Welcome Word Backup and Disaster Recovery devroom Introduction and welcome word
2022-06-09What to expect from MySQL 8 0
2022-06-09Why you should care about SQL for big data and how Apache Calcite can help SQL4NoSQL
2022-06-09Using graph databases in popular open source CMSs Neo4J and Drupal, potential application areas and
2022-06-09Usable Cryptography with José C and command line JSON Object Signing and Encryption



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering