Youtube With Subtitle

  • Oct 3
    Python Serverless Microservices - PyConES 2020

    okay so welcome to this presentation my name is nilo menezes i will talk about serverless micro services in the pycon 2020 the pandemic edition so i will try to to recap a little bit not too much because we we only have 15 minutes so let’s see how it it works first let me make a clarification regarding the serverless application framework the name of the the framework is a little bit ambiguous because it’s it’s the name of the technology it helps should apply as well so sometimes it’s difficult if you are talking about serverless as the concept of serverless as the framework so from now on i will try to make it the the difference between both of them okay so initially the serverless application framework is a set of tools created in javascript but that work very well with other languages like python go and others they are also using node python and chocolatey to deploy this package on windows so it works very well on linux and windows and it will help you to deploy a serverless infrastructure on the cloud regarding the cloud provider you can use amazon web services google cloud or microsoft azure others are also supported i will show everything using aws because the one i’m most used with okay - the idea of the serverless application framework is to simplify the configuration of the infrastructure you need to deploy your application in the cloud - you can configure everything using yaml files and you can download and read more about it at serverless.

  • Oct 3
    ¿Cómo de grande es un virus?

    And, how big is a virus? Well, it depends, because there are many types but, do you remember the bacteria? Compared to it, the flu virus, or the AIDS virus, would be a little bigger than a tennis ball. And Ebola´s, like one of those long balloons. That’s how small viruses are. .

  • Oct 3
    Investigating Digital Crimes using Python - PyConES 2020

    Hello everyone my name is Gajendra Deshpande i am working as a student professor at KLS Gogte of Technology India today i will be delivering a talk on investigating digital crimes using python so in today’s talk i will be discussing in brief about introduction to digital crimes digital foreign investigation process and some modules related to python such as pyscreenshot pypdf etc then we’ll see about investigation of emails and investigation of embedded metadata and finally the conclusion so let’s see some cyber crime statistics but before that let’s define the cyber crimes so cyber crime is nothing but the crime done using digital devices and gadgets such as laptops mobile phones and gadgets etc the internet crime report for 2019 released by usa’s internet crime complaint center IC3 of fbi has revealed the top four countries that are victims of internet crimes so they are usa uk canada and followed by india so according to rsa report of 2015 mobile transactions are rapidly growing and cyber criminals are migrating to less protected soft channels that is because not many people are aware of security and privacy settings of mobile phones according to report by norton 2015 an estimated 113 million indians lost about rupees 16 558 rupees that is almost equal to 250 on an average to cyber crime according to an article published in Indian Express on 19th november 2016 or 55 million millennials in india are hit by cyber crime a recent study by checkpoint research has recorded over 150 000 cyber attacks every week during covid19 pandemic there has been an increase of 30 percent in cyber attacks compared to previous weeks now let’s define the field of forensic science so forensic science is the use of scientific methods or expertise to investigate crimes or examine evidence that might be presented in the court of law cyber forensics is the investigation of various crimes happening in the cyberspace examples of cyber attacks include phishing ransomware fake news fake medicine extortion and insider frauds note here that your cyber attacks can be classified into external attacks and insider attacks now note here that insider shots or insider attacks are more dangerous because here the unhappy employees may be involved in revealing the confidential information to the outsiders and this information can be further used to carry out the attacks then according to digital phone six research workshop digital forensics can be defined as the use of scientifically derived and proven method toward the preservation collection validation identification analysis interpretation documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal or helping to anticipate unauthorized actions shown to be disruptive to planned operations now digital phone 6 investigation process has 6 steps identification collection validation examination preservation and final representation so let’s discuss in brief each of these steps so in identification step the investigation officer visits the crime location and he needs he will identify the different devices which he will be seizing for the investigation process so it may include mobile laptop computers then various gadgets then different parts of computers such as hard disk then network cables usb pen drives etc then next step is the collection of evidence now when the initiation officer visits the crime location the system may be on and note here that he needs to take the picture of the system state and collect the evidence from the on system so he he should not switch off the system so the process of collecting the information from the vigilance launch system at a crime location is known as live forensics and it is very very important so if you switch off the system its state will change then the data may be lost note here that some evidence may be present in the volatile memory so you your evidence can be classified into a volatile evidence and non- volatile evidence so in this process the investigation officer has to first collect the volatile evidence because if he switches off the system that will change the system state and the evidence may be lost similarly the system is off then he should not turn on the system so that’s a very very important step because that may alter the system state and there may be a loss of information and this may not be accepted as an evidence in the court of law then third one is the validation now note here that the investigation officer is taking this snapshot of a system they are taking the image of a system now note here that they cannot perform investigation on the original data so they need to make the copy of the data when they make the copy of the data they should ensure that it is the exact copy of the data in this case they can use the cryptographic hash functions to match and to verify that the both original and the copy of the data are same then in the fourth process they are going to use - investigation officers are going to use various tools they may also write python scripts or any other programming language script for various purposes so the main goal of examination step is to find the evidence the next is the preservation step - note here that whatever uh component equipments digital cases you see need to be protected they need to be kept in a proper place for example if there’s a hard disk then that hard disk has to be placed in the standard bags known as paradise bag and it has to be placed in a locker at a proper place in a proper security so that the information should not be altered then finally the presentation so in this step the investigation officer will present the evidence in the court of law note here that there’s a standard procedure and investigation officer has to follow the standard procedure if they don’t follow the standard procedure then that may not be accepted as the evidence in the court of law then some python modules or some python packages for digital forensics are pyscreenshot which takes the screenshot of the screen then quopri which does the encoding and decoding of the mime information so mime is nothing but the multi-purpose internet mail extensions which are used while sending and receiving the emails the next is the mutagen it’s a python module to handle audio metadata then pypdf2 it’s a pdf toolkit again it handles the metadata associated with the pdf files then finally the pefile so it basically here the it’s a multi- platform python module to parse and work with portable executable files now note here that all these python packages they are pure python packages that means they don’t need any dependency then let’s first discuss the pyscreenshot it tries to allow to take screenshots without installing third-party libraries it’s a cross-platform but mainly useful for linux-based distributions and note it’s a cross-platform wrapper that means there are various libraries so you can see the instruction command which mentions the pillow library so that means in this example pyscreenshot will work as a wrapper for pillow library which is image processing library in python so this is a code example which basically takes the screenshot of the entire screen so first step is to import the pyscreenshot module then use the grab method then use grab method to capture the entire screen then save method should be used to save the screenshot then similarly you can also take the screenshot of part of a screen so in that case you need to specify the coordinates x1 y1 and x2 y2 now you can also go for performance but performance is not the goal of pyscreenshot so the main goal of goal is to collect the evidence but if you are concerned with the performance then you can use the pyscreenshot.

  • Oct 3
    MÄHWERK - der RASENFREAK baut den KUBOTA Z122R auf SEITENAUSWURF um - Mähspaß pur!

    So dear lawn freaks, what are we doing today? We’re going to be rebuilding this Kubota Z-turn lawnmower today. He installed a mulching mower and I want to convert to a side discharge mower. I made a deal here with our mayor. Because I can mow the public roads in the village, the side edges. That doesn’t work so well with the mulching mower. Tall grass can be mowed much better with the side discharge mower.

  • Oct 2
    OPTIMA Fun Palace TV

    At least it take away Kirsty. Thank you very much Lewis so hi everyone. Me again. So I’m Dr Kirsty Ross. I’m the outreach off - I’m wearing a different hat now-so right now my hat is as outreach officer for the (bear with me) EPSRC/MRC Centre for Doctoral Training in Optical Medical Imaging, also known as OPTIMA, shared between the University of Edinburgh and the University of Strathclyde.

  • Oct 2
    Audio myths & dogmas

    There are many opinions on audio in forums and other outings on the web: Class A amps sound better, Straigt tone arms have better tracking, XLR cables sound better than RCA cables and so on. But are they true? Well, sometimes they are. I dreamed up this video at the end of my vacation overlooking the Mediterranean Sea near Diamante in the south west of Italy. Tracking some sites and one or two forums made me want to shout out loud that there is no universal single truth.

  • Oct 2
    Teaser MOOC "Programmation objet immersive en Pharo" D. Cassou, S. Ducasse, L. Fabresse. Ed. 2020

    If you are either a beginner or an expert in object-oriented programming you will love this MOOC because it will change the way you program with objects. I am Stéphane Ducasse, with Luc Fabresse and Damien Cassou, we will present this MOOC about Pharo. What is Pharo? Pharo is a dynamic and pure language that will offer you a unique development experience in which you will be in constant interaction with live objects.

  • Oct 2
    Diversity, Equity, & Inclusion

    Joan Lippincott: Welcome to the CNI digital scholarship planning webinar series. And if you’ve participated in previous sessions. Welcome back. Joan Lippincott: I know many of you are working from home, and some of you are back on campus. I hope you’re all doing well during this difficult time of the pandemic. Joan Lippincott: I’m Joan Lippincott associate executive director America of CNI and I’m moderating the nine sessions of the series.

  • Oct 2
    Breeding wheat for a changing climate

    Australian cropping systems are facing increasingly variable growing seasons and it was a strong theme at the Wagga Wagga grains research update event. The literature, but also the evidence suggests that our climate is changing. Increasing CO2 is linked to warming and models are showing both in terms of the Indian Ocean dipole and also the ENSO atmospheric disruptions are such that the future for southern New South Wales and more widely southern Australia we’re going to be seeing or experiencing more frequent droughts.

  • Oct 2
    Higher-order Automation In TLAPS - Antoine Defourné and Petar Vukmirovic

    Hello, everyone. Welcome to this presentation. My name is Antoine Defourne. Today, we’ll present a joint work with Petar Vukmirovic about bringing higher-order automations to TLAPS. Let’s start with some context. I want to make clear that I will not talk about TLC and others in this talk. I will only be concerned with TLAPS and proofs, and also we ignore [inaudible] problems because there are not so much used in practice for TLAPS.

← Newer Posts Older Posts →

feedback@inadram.com