Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system.
During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
.NET Core 5 is a refactored and highly optimized version of .NET. In this presentation, we will dive deep into exactly what makes up .NET Core 5 and describe in detail the components that make up .NET Core 5. Furthermore, we'll describe the differences between the full .NET Framework and .NET Core 5.
Many businesses are finding they need new versions of their trusty LOB apps for their increasingly mobile workforce. However, these businesses also want to leverage the existing investments they have made to date. In this session, learn about changes in Windows 8.1 Update to allow businesses to build new mobile LOB applications without having to re-write their entire app from scratch.