Working in the ODF TC

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=luqML7bJx8M



Duration: 19:25
1 views
0


FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-18An Update on NetBSD and pkgsrc
2022-06-18A Scalable Approach to Virtual Switching
2022-06-18Autocrypt Automating E Mail Encryption What E Mail can learn from the success of end to end encry…
2022-06-180 A D Graphics Graphics problems and opportunities of open source game
2022-06-18An overview of Tezos focusing on On Chain Governance A new develoment paradigm for the blockchain
2022-06-18A roadmap for the Hurd
2022-06-18A quick update on singularity 3 0 singularity 3 0
2022-06-18A private cloud for everyone Why and how Nextcloud builds a private cloud software
2022-06-18Writing a Janus plugin in Lua C can be a scary world, let us come to the rescue
2022-06-18Wrap it Up Packaging from Pots to Software
2022-06-18Working in the ODF TC
2022-06-18Valgrind's Memcheck tool vs Optimising Compilers Keeping the false positive rate under control
2022-06-18Valgrind register allocator overhaul
2022-06-18Will it blend Comparison of oVirt, OpenStack and Kubernetes schedulers
2022-06-18Using TPM 2 0 As a Secure Keystore on your Laptop It's not as difficult as you think
2022-06-18Wikilab, architecture & CNC Collaborative architecture and construction with FreeCAD
2022-06-18Why you should take a look at Rust Insights into a modern, safe, fast language
2022-06-18Using KVM to sandbox firmwares from the Linux Kernel or How I learned to stop worrying and love EF
2022-06-18Why We’re excited about MySQL 8
2022-06-18Using Cryptographic Hardware
2022-06-18Using CGRateS as online Diameter Radius AAA Server



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering