Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Inter-Process Communication
YouTube
education
Showing:
28
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Google
Chrome University
2
rewiews
Welcome to Chrome University, where you will learn the foundations of how Chrome works.
Add to list
21
Lesons
9 hours
On-Demand
Free-Video
IEEE
KARONTE - Detecting Insecure Multi-Binary Interactions in Embedded Firmware
0
rewiews
Explore KARONTE, an innovative tool for detecting security vulnerabilities in embedded firmware through multi-binary interaction analysis, enhancing IoT device protection.
Add to list
18
Lesons
16 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
ALPChecker: Detecting Spoofing and Blinding Attacks on ALPC - HITB 2023
0
rewiews
Presentation on ALPChecker, a new security tool designed to detect kernel mode attacks on Windows' ALPC mechanism, addressing vulnerabilities in inter-process communication.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Rust
Message Passing in Rust - Fast and Safe Implementation
0
rewiews
Explore fast and safe message passing techniques in Rust programming language, enhancing concurrent system development skills.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
The Cherno
Introduction to Serialization
0
rewiews
Learn the fundamentals of serialization, a crucial technique for converting data structures into storable formats, enhancing your programming skills and data management capabilities.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Linux Foundation
The WASI OS - Isolation with Communication, Wasm Style
0
rewiews
Explore WASI's OS design, comparing Wasm instances and communication to traditional processes and IPC, with a focus on WASI-http and WASI-sockets APIs.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
nullcon
Fuzzing at Mach Speed: Uncovering IPC Vulnerabilities on MacOS
0
rewiews
Explore macOS IPC security, focusing on Mach message handlers. Learn about custom fuzzing techniques to uncover vulnerabilities in privileged RPC-like functions, potentially leading to sandbox escapes and privilege escalations.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
SyScan360
Ring 0 to Ring -1 Exploitation with Hyper-V IPC
0
rewiews
Explore advanced exploitation techniques targeting Hyper-V's inter-process communication, moving from kernel-level to hypervisor-level vulnerabilities in virtualized environments.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
SyScan360
All About RPC, LRPC, ALPC, and LPC in Your PC
0
rewiews
Comprehensive exploration of Windows inter-process communication mechanisms, including RPC, LRPC, ALPC, and LPC, detailing their architecture, security implications, and practical applications.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Linux Foundation
Shared Memory and Pooled Memory
0
rewiews
Explore shared and pooled memory concepts in computing systems, understanding their implementations, advantages, and use cases for efficient resource management.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Linux Foundation
Automotive Containerization Architecture for Linux-Based Instrument Clusters
0
rewiews
Explore containerization architecture for Linux-based automotive instrument clusters, covering isolation, services, UI components, and multi-display support for enhanced vehicle systems.
Add to list
14
Lesons
43 minutes
On-Demand
Free-Video
Devoxx
Busy Architect's Guide to Distributed Systems - Devoxx Greece 2024
0
rewiews
Comprehensive overview of distributed system approaches, comparing architectures like SOA, REST, and RPC. Explores their strengths, weaknesses, and ideal use cases for informed decision-making.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
nullcon
Dissecting Rotten Apples - macOS Malware Analysis
0
rewiews
Comprehensive exploration of macOS malware analysis, covering system architecture, common malware behaviors, and real-world sample demonstrations. Ideal for security researchers and IT professionals.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Exploiting Inter-Process Communication in SAP’s HTTP Server
0
rewiews
Exploración de vulnerabilidades críticas en el servidor HTTP de SAP, demostrando técnicas de explotación de alto nivel para comprometer sistemas SAP sin autenticación.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Black Hat
Cutting Edge - Microsoft Browser Security — From People Who Owned It
0
rewiews
Deep dive into Microsoft Edge security architecture, exploring sandbox initialization, browser broker implementation, and renderer security isolation.
Add to list
31
Lesons
44 minutes
On-Demand
Free-Video
Black Hat
Unix Domain Socket - A Hidden Door Leading to Privilege Escalation in the Android Ecosystem
0
rewiews
Explore Unix domain socket vulnerabilities in Android, revealing potential privilege escalation risks and security implications for third-party applications and vendor implementations.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
NDC Conferences
You Keep Using That Word - Asynchronous and Interprocess Comms
0
rewiews
Exploring the nuances of asynchronous communication in distributed systems, debunking misconceptions, and clarifying its various interpretations for effective inter-service communication design.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Rust
Zbus - Yet Another D-Bus Library
0
rewiews
Explore zbus, a new D-Bus library for Rust. Learn about its design goals, development challenges, and solutions for efficient inter-process communication on Linux systems.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
NDC Conferences
Type-Safety in Low-Level Programming - Modern C++ in Game Console Emulators
0
rewiews
Explore type-safety in C++ for game console emulation, focusing on the Nintendo 3DS kernel interface and compile-time programming techniques to enhance code reliability and performance.
Add to list
26
Lesons
1 hour 4 minutes
On-Demand
Free-Video
HOTI - Hot Interconnects Symposium
OHIO: Improving RDMA Network Scalability in MPI_Alltoall Through Optimized Communication Design
0
rewiews
Discover optimized RDMA network communication techniques for MPI_Alltoall operations through hierarchical design and improved overlap strategies for enhanced scalability and performance.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
DEFCONConference
Sudos and Sudon'ts - Peering Inside Sudo for Windows
0
rewiews
Delve into Windows security mechanisms through an analysis of Sudo for Windows, exploring process elevation, ALPC services, and Rust-Windows API interactions while uncovering potential security vulnerabilities.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
DPDK Project
Using Sharable Mempools for Zero-copy Data Sharing Between DPDK Processes
0
rewiews
Delve into advanced techniques for efficient inter-process communication using sharable mempools, focusing on zero-copy data sharing and high-performance packet processing optimization.
Add to list
12
Lesons
51 minutes
On-Demand
Free-Video
DEFCONConference
Using ALPC Security Features to Compromise RPC Services
0
rewiews
Dive into Windows kernel security through ALPC and RPC services, exploring vulnerability exploitation techniques, security bypass methods, and system privilege escalation strategies.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
OffensiveCon
How to Fuzz Your Way to Android Universal Root: Attacking Android Binder
0
rewiews
Entdecken Sie Techniken zur Ausnutzung von Android Binder-Schwachstellen für Root-Zugriff durch Fuzzing-Methoden und Sicherheitsanalyse.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Black Hat
LinkDoor - A Hidden Attack Surface in the Android Netlink Kernel Modules
0
rewiews
Explore Netlink vulnerabilities in Android kernel modules, uncovering security threats and exploitation techniques. Learn to analyze and mitigate risks in this overlooked attack surface.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
NDC Conferences
You Keep Using That Word - Asynchronous and Interprocess Comms
0
rewiews
Explore the nuances of asynchronous communication in distributed systems, debunking misconceptions and clarifying its various interpretations to enhance understanding of inter-process communication methods.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Code Sync
Ruby as a Node - Connecting Elixir and Ruby Applications Using BEAM
0
rewiews
Discover how to establish seamless communication between Elixir and Ruby applications using BEAM-specific mechanisms like EPMD and :rpc, exploring alternatives to traditional integration methods.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
USENIX
Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel
0
rewiews
Discover how cache side-channel attacks can breach Android app sandboxing, revealing private app behaviors through unprivileged memory access and dynamic inter-app component sharing techniques.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
load more...