Presentation by Warren Turkal The Silicon Valley Linux Users Group hosts weekly sessions to walk through the code for the Linux Kernel, allowing newer users and developers to better understanding the operating system.
Views: 117578 Google
PDF Slides and Code Snippet Downloads here:
Views: 5921 TheSecurityTube
Source Code: https://github.com/Zer0Memory/FlagEditor This code is useful for example in gamehacking, when you want to use raw addresses to resources, instead of locating the base module & using signature scanning and or pointers. This code disables the ASLR of the target program so all of it's addresses are predetermined thus making it easier to exploit the program. Get My Visual Studio Theme! https://www.patreon.com/posts/how-to-get-and-8806134 • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 4308 Zer0Mem0ry
Views: 511 ACCU Conference
Linux : HowTo Encrypt And Decrypt Files With A Password using GPG. To encrypt and decrypt files with a password, use gpg command. It is an encryption and signing tool for Linux/UNIX like operating systems. GnuPG stands for GNU Privacy Guard and is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. Please note that if you ever forgot your password (passphrase), you cannot recover the data as it use very strong encryption. 🌸 Support channel & make donation : https://www.paypal.me/aminenina/5 🌸 Subscribe for more videos : Youtube: https://www.youtube.com/user/aminosni... 🌸 Follow me On Social Media Facebook : https://www.facebook.com/aminosninatos/ *********************************************************************** 🌸 How To Check Bad Blocks Or Bad Sectors On a Hard Disk In Linux https://www.youtube.com/watch?v=jE-I9... 🌸 Linux How To Partition a Hard Drive Using the Parted Command https://www.youtube.com/watch?v=2IoEW... 🌸 Checking or Repairing a File System using fsck in Linux https://www.youtube.com/watch?v=CcV_M... 🌸 How To Monitor the Health of Your Hard Drive in Linux using SMART https://www.youtube.com/watch?v=z1z9R... 🌸 Linux iotop: Monitor your disk Input/Output https://www.youtube.com/watch?v=pWG4v... 🌸 How To use the “du” (Disk Usage) Command in Linux https://www.youtube.com/watch?v=RA4bM... 🌸 How To View Manipulate System Logs In Linux Using Journalctl Command https://www.youtube.com/watch?v=NE-fT-Fwvgw&t=3s 🌸 How To Sync And Backup Files In Linux Using Rsync Command https://www.youtube.com/watch?v=aIMbg7vG6Rg&t=10s 🌸 Linux cURL Command Tips and Tricks https://www.youtube.com/watch?v=hA3BAALWFJI 🌸 Linux tail and multitail commands https://www.youtube.com/watch?v=QnPyWNyCn-U 🌸 Linux How To view Log Files https://www.youtube.com/watch?v=CEYhs_9L01M&t=2s 🌸 How To use the History Command On Linux https://www.youtube.com/watch?v=RkxIWlypB-s 🌸 Tips and Tricks How To manipulate Text Files on Linux https://www.youtube.com/watch?v=Zk9M1w55XO0 🌸 How to Archive, Compress and Extract Files Using the tar Command on Linux https://www.youtube.com/watch?v=8j-ZzOfbclM&t=2s 🌸 Linux - How to split larger files into smaller parts https://www.youtube.com/watch?v=DaC5AWjmQXk 🌸 Linux commands : Top https://www.youtube.com/watch?v=RM7ck63mcHQ ***********************************************************************
Views: 9022 Amine Nina
There has been many talks about what WebAssembly (WASM) is, it’s relation to compilers and how bright our collective future is with WASM in our toolbox. However most talks treat WebAssembly as a semi-opaque box, and mostly as something you can compile higher level languages into. This is a pity! WebAssembly is a fun language to learn, and allows one to write code often less than a magnitude slower than C! In this talk I will show how to write WAT (WebAssembly Text-format), how to reason about algorithms when all you have is one large slab of memory, how to convert high level constructs such as loops into elementary instructions and how to have fun at the same time! We will convert a number of progressively harder algorithms, each revealing a challenging aspect of working with no abstractions. Even if you will not write WASM at work, learning at the lowest level of computer tears away the enchantment that abstractions cause, and reveals the magical machine that is the computer. OMG JSConf EU is coming back in 2019 https://2019.jsconf.eu/
Views: 2815 JSConf
Learn how to download, install and configure the tools required to develop OpenCL kernels and host code targeting Altera SoC FPGAs. Follow Intel FPGA to see how we’re programmed for success and can help you tackle your FPGA problems with comprehensive solutions. Facebook: https://www.facebook.com/IntelFPGA Twitter: https://twitter.com/intelfpga LinkedIn: https://www.linkedin.com/company/intelfpga For technical questions, contact the Intel Community: https://forums.intel.com/s/?language=en_US
Views: 8962 Intel FPGA
In computing, the kernel is a computer program that manages input/output requests from software and translates them into data processing instructions for the central processing unit and other electronic components of a computer. The kernel is a fundamental part of a modern computer's operating system. This video targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 4487 encyclopediacc
Naivety of Creating Cross-Platform, Modern C++ Libraries: A Tour Of Our Challenges and Successes http://CppCon.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017 — The AWS SDK for C++ was designed with a few important tenets. Modern C++ (versions 11 and later), Cross-Platform, User Customization with sane defaults, and no dependencies. A year after launching for general availability, we've been thinking about how these tenets have served us well, and the challenges we've encountered when applying them. In this talk, we will discuss the difficulties we encountered in design and implementation, and then we will cover the aspects of our design that have worked out well. The topics we will cover are: Build System choices, the C++ standard library, Dependency choices, Threading models, Memory models, IO-based programming, ABI compatibility, and packaging. — Jonathan Henson: Senior Software Dev. Engineer, Amazon Web Services, Inc Jonathan is a Senior Software Engineer at Amazon Web Services. He leads development on the AWS SDK for C++ and is passionate about writing tooling for modern C++ developers and advancing adoption of the latest C++ standards. — Videos Filmed & Edited by Bash Films: http://www.BashFilms.com
Views: 5490 CppCon
This video covers how to debug the following python error: ImportError: DLL load failed: %1 is not a valid Win32 application http://www.lfd.uci.edu/~gohlke/pythonlibs/
Views: 61225 sentdex
How To Encrypt Files Using Commandline In Linux Or Ubuntu Using gpg Step By Step Tutorial to encrypt: gpg -c filename todecrypt gpg filename.gpg
Views: 6254 Mayank Agarwal
Google Tech Talks January 12, 2015 (more info below) ABSTRACT The optimization of short sequences of loop-free fixed-point x86_64 code sequences is an important problem in high-performance computing. Unfortunately, the competing constraints of transformation correctness and performance improvement often force even special purpose compilers to produce sub-optimal code. We show that by encoding these constraints as terms in a cost function, and using a Markov Chain Monte Carlo sampler to rapidly explore the space of all possible programs, we are able to generate aggressively optimized versions of a given target program. Beginning from binaries compiled by gcc -O0, we are able to produce provably correct code sequences that either match or outperform the code produced by gcc -O3, and in some cases expert hand-written assembly. Because most high-performance applications contain floating-point computations, we extend our technique to this domain and show a novel approach to trading full floating-point precision for further increases in performance. We demonstrate the ability to generate reduced precision implementations of Intel's handwritten C numerics library that are up to six times faster than the original code, and achieve end-to-end speedups of over 30% on a direct numeric simulation and a ray tracer. Because optimizations that contain floating-point computations are not amenable to formal verification using the state of the art, we present a technique for characterizing maximum error and providing strong evidence for correctness. Publication list: http://cs.stanford.edu/people/eschkufz/ Github: https://github.com/eschkufz/stoke-release About the speaker Eric Schkufza is a postdoctoral scholar at Stanford University working with professor Alex Aiken. He graduated from Stanford University with a PhD in computer science in June 2014. He is interested in applying stochastic search techniques to the design of optimizing compilers.
Views: 12690 GoogleTechTalks
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for transforming memory corruption primitives into arbitrary code execution exploits have evolved significantly over the past two decades, from "smashing the stack for fun and profit" to the current apex of "just in time code reuse" while playing a cat and mouse game with similarly evolving defensive mitigations: from PaX/NX-bit to fine-grained ASLR and beyond. By contextualizing this battle between attack and defense, I will demonstrate new defense strategies based on augmenting fine-grained ASLR with memory disclosure mitigations to render existing exploitation techniques unreliable. Modifications to the Xen hypervisor exploiting hardware accelerated virtualization extensions on the modern Intel platform enable realizing these new defense strategies without imposing significant runtime CPU overhead. Speaker Bio: Daniel Selifonov is currently an engineer focused on information security, and in prior consultancies has built systems for information technology where security was considered throughout design and implementation, rather than as an afterthought. His research interests in security include reverse engineering, applied cryptography, client side security, and user acceptable information system design. Social media names/links: * GitHub: https://github.com/thyth/ * Personal Website: http://thyth.com/
Views: 2958 DEFCONConference
Google Tech Talks October, 12 2007 ABSTRACT When you have hundreds of people simultaneously patching 25000 files of the Linux Kernel in sometimes conflicting ways, you might need some scheme or plan to sort all that out before you can build your next kernel and reboot. The Linux team uses "git" for their source code repository management, a homegrown solution that is optimized for highly distributed development, working with huge sets of files, merging independent work at multiple levels, and seeing who broke what. (Git has also since been notably adopted by the Cairo, x.org, and Wine teams, and is being transitioned to by the Mozilla codebase.) In my talk, I describe what "git"; is and isn't, and why you should use it instead of CVS, Subversion, SVK, Arch, Darcs, Mercurial, Monotone, Bazaar, and just about every other repository manager. I'll also walk though the basic concepts so that the manpages might start making sense. If I have time, I'll even do a live walkthrough, where you can watch how fast I make typos. Speaker: Randal Schwartz
Views: 198682 GoogleTechTalks
Do-It-Yourself Cellular IDS SHERRI DAVIDOFF LMG SECURITY SCOTT FRETHEIM LMG SECURITY DAVID HARRISON LMG SECURITY RANDI PRICE LMG SECURITY For less than $500, you can build your own cellular intrusion detection system to detect malicious activity through your own local femtocell. Our team will show how we leveraged root access on a femtocell, reverse engineered the activation process, and turned it into a proof-of-concept cellular network intrusion monitoring system. We leveraged commercial Home Node-Bs ("femtocells") to create a 3G cellular network sniffer without needing to reimplement the UMTS or CDMA2000 protocol stacks. Inside a Faraday cage, we connected smartphones to modified femtocells running Linux distributions and redirected traffic to a Snort instance. Then we captured traffic from infected phones and showed how Snort was able to detect and alert upon malicious traffic. We also wrote our own CDMA protocol dissector in order to better analyze CDMA traffic. The goal of this project was to develop a low-cost proof-of-concept method for capturing and analyzing cellular traffic using locally-deployed femtocells, which any security professional can build. Sherri Davidoff (@sherridavidoff) is a principal and Senior Security Consultant at LMG Security. She has over a decade of experience as an information security professional, specializing in penetration testing, forensics, social engineering testing and web application assessments. Sherri is the co-author of "Network Forensics: Tracking Hackers Through Cyberspace" (Prentice Hall, 2012). She is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds her degree in Computer Science and Electrical Engineering from MIT.br Facebook Scott Fretheim is an expert penetration tester and risk assessment consultant. His clients include Fortune 500 companies, financial institutions, insurance companies, health care organizations, and more. He is a GIAC Certified Web Application Penetration Tester (GWAPT) and is trained in smart grid and SCADA security. He is a founding member of the Montana HTCIA, and holds his B.S. in Management of Information Systems. Scott is an instructor at Black Hat. David Harrison specializes in digital and mobile device forensics as well as information security research. He is a principal author of the DEFCON 2012 Network Forensics Contest. David holds a A.S. in Computer Science from FVCC and is pursuing a B.S. in Software Design from Western Governor's University. Randi Price is a security consultant at LMG Security. She specializes in policy and procedure review and development, including ISO 27001 assessments and HIPAA risk analyses. Randi provides security management consulting for large enterprises such as financial and health care organizations. She is a certified digital forensic examiner and holds her GIAC forensic certification (GCFE). Randi holds two BS degrees in Management of Information Systems and Accounting from the University of Montana.
Views: 1632 DEFCONConference
This livestream covers all of the Google I/O 2018 day 3 sessions that take place on Stage 3. Stay tuned for technical sessions and deep dives into Google's latest developer products and platforms. Event schedule (all times are PDT) → https://goo.gl/x5ENpG 1:22:49 - Autonomous and customized pre-launch testing in the Google Play Console 2:22:59 - Build reactive mobile apps with Flutter 3:22:03 - Effective ProGuard keep rules for smaller applications 5:22:03 - Device provisioning and authentication with Android Things 6:22:13 - Product design: how to build better products with Android 7:22:08 - Update production devices in the field with the Android Google I/O 2018 All Sessions playlist → https://goo.gl/q1Tr8x Subscribe to the Google Developers channel → http://goo.gl/mQyv5L Music by Terra Monk → https://goo.gl/wPgbHP
Views: 4342 Google Developers
About DebConf DebConf is the annual Debian developers meeting, an event filled with discussions, workshops and coding parties – all of them highly technical in nature. DebConf15, the 16th Debian Conference, will be held from the 15th to the 22nd of August 2015 at Heidelberg International youth hostel in Heidelberg, Germany.
Views: 451 Jalal Al-Haj
Bugs in security-critical system software already cost society billions of dollars, and the need for secure software is increasing as more devices are connected to the Internet. This session will outline the security needs of network-connected systems and explore how formal verification can help secure them. We’ll present research on bringing high-value security to low-cost devices, particularly those powered by microcontrollers – a class of devices ill-prepared for the security challenges of Internet connectivity. We’ll also discuss advances in verification tools and techniques that lead to real, usable verified software, with an emphasis on critical systems such as distributed and operating systems, cloud infrastructure, networking protocols and cryptography. Finally, we’ll present an overview of the Azure Sphere product as part of Microsoft’s efforts to secure MCU-based devices. See more at https://www.microsoft.com/en-us/research/video/verification-and-secure-systems/
Views: 1124 Microsoft Research
A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e., exploiting a known vulnerability (such as privilege escalation) or a password (obtained by cracking or social engineering)). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root or Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 386 Audiopedia
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Kernel_(operating_system) 00:01:42 1 Functions 00:03:16 1.1 Resource Management 00:04:06 1.2 Memory management 00:06:25 1.3 Device management 00:09:36 1.4 System calls 00:12:46 2 Kernel design decisions 00:12:56 2.1 Issues of kernel support for protection 00:17:37 2.1.1 Hardware-based or language-based protection 00:20:08 2.2 Process cooperation 00:20:51 2.3 I/O devices management 00:22:33 3 Kernel-wide design approaches 00:25:47 3.1 Monolithic kernels 00:30:52 3.2 Microkernels 00:37:07 3.3 Monolithic kernels vs. microkernels 00:38:22 3.3.1 Performance 00:40:35 3.4 Hybrid (or modular) kernels 00:44:23 3.5 Nanokernels 00:44:47 3.6 Exokernels 00:45:55 4 History of kernel development 00:46:05 4.1 Early operating system kernels 00:47:30 4.2 Time-sharing operating systems 00:48:55 4.3 Amiga 00:49:44 4.4 Unix 00:53:15 4.5 Mac OS 00:53:50 4.6 Microsoft Windows 00:55:17 4.7 IBM Supervisor 00:56:21 4.8 Development of microkernels 00:57:18 5 See also Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.973484517198808 Voice name: en-GB-Wavenet-D "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system. On most systems, it is one of the first programs loaded on start-up (after the bootloader). It handles the rest of start-up as well as input/output requests from software, translating them into data-processing instructions for the central processing unit. It handles memory and peripherals like keyboards, monitors, printers, and speakers. The critical code of the kernel is usually loaded into a separate area of memory, which is protected from access by application programs or other, less critical parts of the operating system. The kernel performs its tasks, such as running processes, managing hardware devices such as the hard disk, and handling interrupts, in this protected kernel space. In contrast, everything a user does is in user space: writing text in a text editor, running programs in a GUI, etc. This separation prevents user data and kernel data from interfering with each other and causing instability and slowness, as well as preventing malfunctioning application programs from crashing the entire operating system. The kernel's interface is a low-level abstraction layer. When a process makes requests of the kernel, it is called a system call. Kernel designs differ in how they manage these system calls and resources. A monolithic kernel runs all the operating system instructions in the same address space for speed. A microkernel runs most processes in user space, for modularity.
Views: 1 wikipedia tts
The PNW PLSE workshop provides an opportunity for programming languages and software engineering researchers throughout the Pacific Northwest to meet, interact, and share work in progress as well as recent results. The meeting on May 14, 2018 at the Microsoft Research campus in Redmond, WA, will feature talks and demonstrations of current projects, provide opportunities to get feedback on exciting new projects, and generally foster connections that strengthen our vibrant research community in the region. For more info please visit http://pnwplse.org/ Talk Title: Project Everest: Theory meets Reality Speaker: Jonathan Protzenko See more at https://www.microsoft.com/en-us/research/video/pnw-plse-workshop-project-everest-theory-meets-reality/
Views: 888 Microsoft Research
ARM is a family of instruction set architectures for computer processors based on a reduced instruction set computing (RISC) architecture developed by British company ARM Holdings. A RISC-based computer design approach means ARM processors require significantly fewer transistors than typical CISC x86 processors in most personal computers. This approach reduces costs, heat and power use. These are desirable traits for light, portable, battery-powered devices—including smartphones, laptops, tablet and notepad computers, and other embedded systems. A simpler design facilitates more efficient multi-core CPUs and higher core counts at lower cost, providing improved energy efficiency for servers. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 6230 Audiopedia
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit Default passwords can function as backdoors if they are not changed by the user. Some debugging features can also act as backdoors if they are not removed in the release version. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 280 Audiopedia
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Kernel_(operating_system) 00:01:58 1 Functions 00:03:47 1.1 Resource Management 00:04:44 1.2 Memory management 00:07:25 1.3 Device management 00:11:06 1.4 System calls 00:14:47 2 Kernel design decisions 00:14:57 2.1 Issues of kernel support for protection 00:20:23 2.1.1 Hardware-based or language-based protection 00:23:19 2.2 Process cooperation 00:24:08 2.3 I/O devices management 00:26:08 3 Kernel-wide design approaches 00:29:54 3.1 Monolithic kernels 00:35:49 3.2 Microkernels 00:43:04 3.3 Monolithic kernels vs. microkernels 00:44:29 3.3.1 Performance 00:47:03 3.4 Hybrid (or modular) kernels 00:51:29 3.5 Nanokernels 00:51:55 3.6 Exokernels 00:53:12 4 History of kernel development 00:53:23 4.1 Early operating system kernels 00:55:01 4.2 Time-sharing operating systems 00:56:39 4.3 Amiga 00:57:33 4.4 Unix 01:01:37 4.5 Mac OS 01:02:19 4.6 Microsoft Windows 01:03:58 4.7 IBM Supervisor 01:05:13 4.8 Development of microkernels 01:06:19 5 See also Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.7756595251450052 Voice name: en-US-Wavenet-F "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system. On most systems, it is one of the first programs loaded on start-up (after the bootloader). It handles the rest of start-up as well as input/output requests from software, translating them into data-processing instructions for the central processing unit. It handles memory and peripherals like keyboards, monitors, printers, and speakers. The critical code of the kernel is usually loaded into a separate area of memory, which is protected from access by application programs or other, less critical parts of the operating system. The kernel performs its tasks, such as running processes, managing hardware devices such as the hard disk, and handling interrupts, in this protected kernel space. In contrast, everything a user does is in user space: writing text in a text editor, running programs in a GUI, etc. This separation prevents user data and kernel data from interfering with each other and causing instability and slowness, as well as preventing malfunctioning application programs from crashing the entire operating system. The kernel's interface is a low-level abstraction layer. When a process makes requests of the kernel, it is called a system call. Kernel designs differ in how they manage these system calls and resources. A monolithic kernel runs all the operating system instructions in the same address space for speed. A microkernel runs most processes in user space, for modularity.
Views: 2 wikipedia tts