Michael Rodger - Opening the Black Box – Software Security from a Hardware Perspective Published 2016-12-12 Download video MP4 360p Recommendations 44:04 Noooooooooo touch! - Michael Rodger | BSides Cape Town 2023 46:06 Performance Hacking - how to hack your tools to go faster - singe | BSides Cape Town 2023 44:18 Linus Torvalds On Future Of Desktop Linux 17:40 Hacker's Guide to UART Root Shells 42:37 Impose Cost: Our defences eventually fail & we need to take the the fight to the criminals | Keynote 53:11 NSA Backdoor in Windows? This and more from the guy who created Windows Task Manager! 33:56 How to sink a UBoot: Understanding bootloader attack surface - Keith Makan | BSides Cape Town 2023 29:02 researcher accidentally finds 0-day affecting his entire internet service provider 53:25 The Only Unbreakable Law 42:56 Gerard de Jong - Hacking satellites with Software Defined Radio (SDR) @ DevConf Johannesburg 2019 27:43 Hacking "AAA" Unreal Engine Games with... Python? - Ross Simpson | BSides Cape Town 2023 10:43 A Software Defined Radio (SDR) Approach to Radar 08:08 Apple Just Integrated ChatGPT and Elon Musk is Furious! 17:50 QEMU/KVM for absolute beginners 58:28 Hack CYSAT 2023 - World premiere: hacking and recovery of a flying satellite 45:21 You need to learn AI in 2024! (And here is your roadmap) 37:56 SDR with HackRF One, Lesson 1 - Welcome - 720p 21:20 The 12 Linux Apps Everyone Should Know About 1:00:49 The Art of Code - Dylan Beattie 1:18:10 License to Kill: Malware Hunting with the Sysinternals Tools Similar videos 23:42 BSides Cape Town 2017 - Closing ceremony 24:42 Neil Roebert - Mi - NFC - TM: How to proxy NFC comms using Android 38:25 Ion Todd - Password Security for humans 42:17 Charl van der Walt - Love triangles in cyberspace. A tale about trust in 5 chapters. 22:32 Robert Len - (In)Outsider Trading – Hacking stocks using public information and (influence) 57:13 The Future of Cyber Security 2014 Seminar Stream - Patrick Upatham 41:53 Dublin DevRel Meetup Richard Rodger and AI build 25:37 USENIX Security '15 - A Placement Vulnerability Study in Multi-Tenant Public Clouds 1:01:13 Computer Security: Knowing What You Don't Know 1:02:06 How Persistent Memory Delivers Superior ROI for Data Intensive Workloads with Formulus Black 1:00:40 PolarConf 2018: Azure Stack: Lessons learned from use in the real world by Rik Hepworth 35:15 Best Practices for Adopting a Remote Post-Production Workflow 47:45 Protecting Schools with Life-Saving Floor Plans 1:05:56 Christian Hunt: Mitigating Human Risk and The Algorithmic Mind 50:41 microXchg 2016 - Peter Rossbach : Docker Ecosystem for Microservices 11:55 mGalaxy frontend v7.0 57:34 2022 Brookes Oration: The Decisive Digital Decade, delivered by Andy Penn 1:00:29 Webinar: Cybersecurity and Space Law & Cybersecurity and Space Assets More results