Parent directory/ | - | - |
fosdem-2025-5662-how-threat-actors-are-weaponizing-your-favorite-open-source-package-registry.mp4 | 579.2 MiB | 2025-02-11 10:30:35 |
fosdem-2025-5662-how-threat-actors-are-weaponizing-your-favorite-open-source-package-registry.av1.webm | 76.7 MiB | 2025-02-11 10:30:32 |
fosdem-2025-5100-can-qemu-and-vhost-user-devices-be-used-on-macos-and-bsd-.mp4 | 520.6 MiB | 2025-02-10 19:03:25 |
fosdem-2025-5100-can-qemu-and-vhost-user-devices-be-used-on-macos-and-bsd-.av1.webm | 79.6 MiB | 2025-02-10 19:03:23 |
fosdem-2025-5451-enabling-amd-sev-technology-in-xen-hypervisor-.mp4 | 584.5 MiB | 2025-02-10 13:18:05 |
fosdem-2025-5451-enabling-amd-sev-technology-in-xen-hypervisor-.av1.webm | 44.1 MiB | 2025-02-10 13:18:02 |
fosdem-2025-4665-on-prem-kubernetes-at-scale-with-metal-stack-io.mp4 | 590.2 MiB | 2025-02-09 13:47:40 |
fosdem-2025-4665-on-prem-kubernetes-at-scale-with-metal-stack-io.av1.webm | 74.0 MiB | 2025-02-09 13:47:37 |
fosdem-2025-5182-confidential-vms-on-public-clouds-and-on-premise-a-long-way-towards-zero-trust.mp4 | 635.2 MiB | 2025-02-09 13:24:50 |
fosdem-2025-5182-confidential-vms-on-public-clouds-and-on-premise-a-long-way-towards-zero-trust.av1.webm | 69.2 MiB | 2025-02-09 13:24:47 |
fosdem-2025-6297-a-practical-introduction-to-using-sq-sequoia-pgp-s-cli.mp4 | 562.7 MiB | 2025-02-09 10:18:23 |
fosdem-2025-6297-a-practical-introduction-to-using-sq-sequoia-pgp-s-cli.av1.webm | 88.6 MiB | 2025-02-09 10:18:15 |
fosdem-2025-6281-what-if-log4shell-were-to-happen-today-.mp4 | 529.4 MiB | 2025-02-09 08:36:36 |
fosdem-2025-6281-what-if-log4shell-were-to-happen-today-.av1.webm | 92.9 MiB | 2025-02-09 08:36:28 |
fosdem-2025-5588-managing-vulnerabilities-in-open-source-dependencies.mp4 | 564.5 MiB | 2025-02-09 00:33:54 |
fosdem-2025-5588-managing-vulnerabilities-in-open-source-dependencies.av1.webm | 55.3 MiB | 2025-02-09 00:33:47 |
fosdem-2025-5266-kintsugi-a-decentralized-e2ee-key-recovery-protocol.mp4 | 557.4 MiB | 2025-02-08 21:36:39 |
fosdem-2025-5266-kintsugi-a-decentralized-e2ee-key-recovery-protocol.av1.webm | 92.9 MiB | 2025-02-08 21:36:31 |
fosdem-2025-5623-an-overview-on-detecting-login-anomalies-with-buffalogs.mp4 | 577.3 MiB | 2025-02-08 21:04:47 |
fosdem-2025-5623-an-overview-on-detecting-login-anomalies-with-buffalogs.av1.webm | 127.8 MiB | 2025-02-08 21:04:38 |
fosdem-2025-5121-simplifying-kubevirt-new-tools-for-easier-vm-management.mp4 | 547.9 MiB | 2025-02-08 09:11:40 |
fosdem-2025-5121-simplifying-kubevirt-new-tools-for-easier-vm-management.av1.webm | 82.1 MiB | 2025-02-08 09:11:31 |
fosdem-2025-5930-hunting-virtio-specification-violations.mp4 | 493.9 MiB | 2025-02-08 08:48:35 |
fosdem-2025-5930-hunting-virtio-specification-violations.av1.webm | 69.9 MiB | 2025-02-08 08:48:28 |
fosdem-2025-4204-tightening-every-bolt.mp4 | 566.3 MiB | 2025-02-08 08:06:03 |
fosdem-2025-4204-tightening-every-bolt.av1.webm | 326.5 MiB | 2025-02-08 08:05:55 |
fosdem-2025-5833-nothing-to-see-here-practical-advice-to-avoid-tunnel-vision-and-similar-decloaking-techniques-against-vpns.mp4 | 508.4 MiB | 2025-02-08 08:02:03 |
fosdem-2025-5833-nothing-to-see-here-practical-advice-to-avoid-tunnel-vision-and-similar-decloaking-techniques-against-vpns.av1.webm | 203.4 MiB | 2025-02-08 08:01:55 |
fosdem-2025-5741-enhancing-kubevirt-workload-scheduling-patterns-controversial-.mp4 | 604.1 MiB | 2025-02-08 07:25:53 |
fosdem-2025-5741-enhancing-kubevirt-workload-scheduling-patterns-controversial-.av1.webm | 99.9 MiB | 2025-02-08 07:25:44 |
fosdem-2025-5544-hardware-backed-ssh-keys-ssh-tpm-agent.mp4 | 531.2 MiB | 2025-02-08 05:50:42 |
fosdem-2025-5544-hardware-backed-ssh-keys-ssh-tpm-agent.av1.webm | 166.4 MiB | 2025-02-08 05:50:33 |
fosdem-2025-4661-introducing-fuki-guest-firmware-in-a-uki-for-confidential-cloud-deployments.mp4 | 535.1 MiB | 2025-02-08 05:18:50 |
fosdem-2025-4661-introducing-fuki-guest-firmware-in-a-uki-for-confidential-cloud-deployments.av1.webm | 81.1 MiB | 2025-02-08 05:18:43 |
fosdem-2025-6057-the-iac-tooling-multiverse-and-the-future-of-iac.mp4 | 589.8 MiB | 2025-02-07 03:12:17 |
fosdem-2025-6057-the-iac-tooling-multiverse-and-the-future-of-iac.av1.webm | 99.5 MiB | 2025-02-07 03:12:13 |
fosdem-2025-6543-hunting-for-github-actions-bugs-with-zizmor.mp4 | 459.3 MiB | 2025-02-07 02:22:21 |
fosdem-2025-6543-hunting-for-github-actions-bugs-with-zizmor.av1.webm | 84.3 MiB | 2025-02-07 02:22:18 |
fosdem-2025-5661-sigsum-detecting-rogue-signatures-through-transparency.mp4 | 583.5 MiB | 2025-02-07 00:18:02 |
fosdem-2025-5661-sigsum-detecting-rogue-signatures-through-transparency.av1.webm | 137.0 MiB | 2025-02-07 00:17:56 |
fosdem-2025-5370-using-dpop-to-use-access-tokens-securely-in-your-single-page-applications.mp4 | 534.0 MiB | 2025-02-02 08:35:54 |
fosdem-2025-5370-using-dpop-to-use-access-tokens-securely-in-your-single-page-applications.av1.webm | 120.5 MiB | 2025-02-02 08:35:51 |