- 54
- 12 013
Phillip Jiang
เข้าร่วมเมื่อ 25 ม.ค. 2020
Azure Data Lake Storage Gen2 - What is Azure Data Lake Storage?
Azure Data Lake Storage Gen2 is a set of capabilities dedicated to big data analytics, built on Azure Blob storage. Data Lake Storage Gen2 is the result of converging the capabilities of our two existing storage services, Azure Blob storage and Azure Data Lake Storage Gen1. Features from Azure Data Lake Storage Gen1, such as file system semantics, directory, and file level security and scale are combined with low-cost, tiered storage, high availability/disaster recovery capabilities from Azure Blob storage.
มุมมอง: 50
วีดีโอ
Azure Synapse Analytics (formerly SQL DW) architecture
มุมมอง 674 ปีที่แล้ว
Azure Synapse Analytics (formerly SQL DW) architecture
Azure Sentinel - What is Azure Sentinel?
มุมมอง 54 ปีที่แล้ว
Azure Sentinel - An introduction to Azure Sentinel.
Cloud HPC on Azure, Azure High Performance Computing Introduction
มุมมอง 224 ปีที่แล้ว
Cloud HPC on Azure, Azure High Performance Computing Introduction
Azure Automation - An Cloud Automate Introduction that you must listen.
มุมมอง 114 ปีที่แล้ว
Azure Automation - An Cloud Automate Introduction that you must listen.
Azure IoT
มุมมอง 114 ปีที่แล้ว
Azure IoT Empowering businesses and industries to shape the future with the Internet of Things (IoT). Make things happen. Microsoft is investing $5 billion in IoT Microsoft has committed to investing $5 billion (in US dollars) in IoT research and the intelligent edge-adding new services and features to Azure IoT, but also driving business strategy and executive leadership discussions to define ...
Azure Code Samples
มุมมอง 384 ปีที่แล้ว
docs.microsoft.com/en-us/samples/browse/ Browse code samples Get started with Microsoft developer tools and technologies. Explore our samples and discover the things you can build.
IoT Amazon AWS | Making IoT Experimentation Easy Sarah Cooper, GM of IoT Solutions, AWS
มุมมอง 254 ปีที่แล้ว
IoT Amazon AWS Making IoT Experimentation Easy Sarah Cooper, GM of IoT Solutions, Amazon Web Services Keynote: Making IoT Experimentation Easy - Sarah Cooper, GM of IoT Solutions, Amazon Web Services It used to be that when a product shipped, the innovation and design side of the product lifecycle were done. Innovation was a finite event somewhere early in the product design phase. With the adv...
IoT Zephyr Project | open source OS for IoT
มุมมอง 394 ปีที่แล้ว
Matt Locke, Director of the Linaro IoT and Embedded Group (LITE) and Maureen Helm of NXP, one of the maintainers of zephyrproject.org which is a Linux Foundation hosted open source collaboration project, uniting leaders from across the industry to build a best-in-breed small, scalable, real-time operating system (RTOS) optimized for resource constrained devices, across multiple architectures. T...
Azure multi-factor authentication | Azure user authentication methods
มุมมอง 3894 ปีที่แล้ว
Azure multi-factor authentication | Azure user authentication methods What are authentication methods? In this article Password Security questions Email address Microsoft Authenticator app OATH hardware tokens (public preview) Phone options App Passwords Next steps As an administrator, choosing authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) i...
Azure File Sync Overview | Cloud File Overview
มุมมอง 504 ปีที่แล้ว
Azure File Sync Overview | Cloud File Overview Learn about how Azure Files enables your organization to create file shares in Azure to centralize files in the cloud. You can then deploy Azure File Sync (preview) on a Windows server to cache your most frequently accessed files locally so that your apps and users can access the files at local network speeds.
Cloud Networking Azure Virtual Network Peering
มุมมอง 974 ปีที่แล้ว
Cloud Networking Azure Virtual Network Peering Create, change, or delete a virtual network peering In this article Before you begin Create a peering View or change peering settings Delete a peering Requirements and constraints Permissions Next steps Learn how to create, change, or delete a virtual network peering. Virtual network peering enables you to connect virtual networks in the same regio...
VPN Cloud Azure Network | Azure VPN Gateway redundancy | Azure Architect Exam
มุมมอง 4984 ปีที่แล้ว
VPN Cloud Azure Network | Azure VPN Gateway redundancy | Azure Architect Exam Highly Available Cross-Premises and VNet-to-VNet Connectivity In this article About Azure VPN gateway redundancy Highly Available Cross-Premises Connectivity Highly Available VNet-to-VNet Connectivity through Azure VPN Gateways Next steps This article provides an overview of Highly Available configuration options for ...
Azure DevOps Services Azure Pipelines
มุมมอง 264 ปีที่แล้ว
Azure DevOps Services Azure Pipelines In this episode, Robert is joined by Mickey Gousset, who takes us on a tour of Azure Pipelines. He shows how straightforward it is to automate your builds and deployments using Azure Pipelines. They are a great way to started on your path to using DevOps practices to ship faster at higher quality. Resources: Demo Generator for Azure DevOps (azuredevopsdemog...
Cloud App | Azure App Service | Build Amazing Cloud Connected Apps With Xamarin, Azure, & App Center
มุมมอง 464 ปีที่แล้ว
Cloud App | Azure App Service | Build Amazing Cloud Connected Apps With Xamarin, Azure, & App Center Xamarin Azure App Center = cross-platform cloud connect mobile apps made easy. In less than 30 minutes you're going to learn how to add authentication, on & offline data storage, and create a server-less backend to make your terrestrial bound app fly to the clouds!
IoT Devices | IoT Cloud | IoT Network | IoT Project | Network Protocol Analysis for IoT Devices
มุมมอง 234 ปีที่แล้ว
IoT Devices | IoT Cloud | IoT Network | IoT Project | Network Protocol Analysis for IoT Devices
Azure IoT Central | Azure Iot Sphere | Microsoft's IoT strategy
มุมมอง 234 ปีที่แล้ว
Azure IoT Central | Azure Iot Sphere | Microsoft's IoT strategy
IoT Devices Security | The Seven Properties of Highly Secure IoT Devices. Microsoft | David Tarditi
มุมมอง 144 ปีที่แล้ว
IoT Devices Security | The Seven Properties of Highly Secure IoT Devices. Microsoft | David Tarditi
IoT Devices | IoT Projects | Common Attacks on IoT Devices Christina Quast
มุมมอง 1184 ปีที่แล้ว
IoT Devices | IoT Projects | Common Attacks on IoT Devices Christina Quast
IoT Cloud Azure Machine Learning & Excel | Scott Hanselman’s best demo!
มุมมอง 514 ปีที่แล้ว
IoT Cloud Azure Machine Learning & Excel | Scott Hanselman’s best demo!
Cloud Architect Azure Storage V2 | Azure AZ-303 exam
มุมมอง 864 ปีที่แล้ว
Cloud Architect Azure Storage V2 | Azure AZ-303 exam
Azure Blob Storage | Cloud Architect Azure Storage | Locally Redundant Storage | AZ303
มุมมอง 994 ปีที่แล้ว
Azure Blob Storage | Cloud Architect Azure Storage | Locally Redundant Storage | AZ303
Data Destruction Fixed | And That's How I Lost My Other Eye Explorations in Data Destruction Fixed
มุมมอง 94 ปีที่แล้ว
Data Destruction Fixed | And That's How I Lost My Other Eye Explorations in Data Destruction Fixed
Cloud Domain and Virtual Machines | regions-and-availability | Azure Architect| AZ-303
มุมมอง 684 ปีที่แล้ว
Cloud Domain and Virtual Machines | regions-and-availability | Azure Architect| AZ-303
Cloud Virtual Machines Azure | Migrate the virtual machines requirement | AZ-303 exam
มุมมอง 754 ปีที่แล้ว
Cloud Virtual Machines Azure | Migrate the virtual machines requirement | AZ-303 exam
Network Cameras | Exploiting Network Surveillance Cameras Like a Hollywood Hacker Black Hat 2013
มุมมอง 164 ปีที่แล้ว
Network Cameras | Exploiting Network Surveillance Cameras Like a Hollywood Hacker Black Hat 2013
Drone Cam Knocking my neighbors kids cruddy drone offline | Robinson and Mitchell DEF CON 23
มุมมอง 84 ปีที่แล้ว
Drone Cam Knocking my neighbors kids cruddy drone offline | Robinson and Mitchell DEF CON 23
Machine Learning Competitions in Infosec ML | Hyrum Anderson DEF CON 27 AI Village
มุมมอง 154 ปีที่แล้ว
Machine Learning Competitions in Infosec ML | Hyrum Anderson DEF CON 27 AI Village
Duplicating Keys | Duplicating Restricted Mechanical Keys | Bill Graydon DEF CON 27 Conference
มุมมอง 7K4 ปีที่แล้ว
Duplicating Keys | Duplicating Restricted Mechanical Keys | Bill Graydon DEF CON 27 Conference
46:18 Where the actual HELL did these guys find a copy-milling tool for under $700 USD?! I use a home made jig with a dremel tool and a probe on the other end for copying hand-made miniature fictional firearm models that I use for a tabletop mecha game (They're about the size of your standard key, but about twice as thick), and even just the jig I made cost like $140 in materials (not counting the dremel tool)! (Seriously, the jig I made is moderately accurate, but still nowhere NEAR professional. If someone knows where to find a quality machine like this that fits in my ~$400 budget, let me know! That'd be a HUGE step up in quality, so I wouldn't have to do touch-up work in a bench mill on all my copy-milled roughs.)
How can I message you guys? I have thought of all these ideas myself, and even abused some of them to get a master to my school before I even knew any of these flaws existed.
That was definitely an amazing speech and very informative! Congratulations to these guys who hosted this restricted keys topic etc! And in my experience they were dead on with everything!
I’ve made duplicate keys for bi lock and m-3.
Great work.
This is an insanely good run through of this exploit. I've been talking about this for years and no one really believed me that it would be this easy. Glad to know someone out there has just totally crapped on "restricted" keys.
I wish I could find the key duplicator on eBay they mentioned!
Very informative. Thanks
It would seem that any rational 2-man rule site would use two DIFFERENT bittings so cutting a MULTILOCK or ABLOY in half will likely not provide any benefit unless both security locks are keyed alike.
Id go a step further and use two different key systems
Wow, this was a good talk. Shame that is has so little views and likes. I am curious about how often master keys to masterkey lock boxes get compromised? In many cities the fire/maintenance services have a master key that will open a small key-safe with a building master key that is placed near the main access of, typically commercial, building to provide access on weekends. What is used to keep these fire service UBER MASTER keys safe and un-duplicated? All one has to do is compromise one of the key safes and make a new key that will provide access to all the commercial buildings in a city.
MultiLock Captive is my keys I have a key card for more keys
Can you please add AZ 303 Certification:th-cam.com/video/iEZ-uIGb8j8/w-d-xo.html to your AZ 303 playlist?
yopu could have given some meaningful explanation , rather than just reading... checked your other videos, it seems you are giving explanation on other videos, subscribed thanks
Great information, come on visit our my chanel don't forget click subscribe 👍
Azure VMs connect to a Public IP address
Azure Architect AZ-300 Exam questions
GoGoGo Azure!!!
Come on, Azure roles, owner, contributor, reader, ......
Recommend! You will pass AZ-300 with this information.
Four pillars of a great Azure Architecture!!!!
Be an Azure AZ-300 expert. You can do it
Welcome to my channel! Please leave your questions here