Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
Join us for a deep dive into the troubleshooting tools available to Lync voice deployment engineers and administrators. We will dig into the logs and network captures. We will try to have a fun, but deep conversation on how you can, detect and troubleshoot call quality due to network issues. We'll touch on UCCAPI logs, XML, QoE reports, Network Monitor/Wireshark tools. We'll try to have fun with some log based analysis of a call that had or reported issues.
Keeping track of all the various resources used by a solution is a daunting task. Azure Resource Manager enables you to group multiple resources into a single logical group. With the ability to save the group as a template, we can reuse it for future solutions. In this session we'll explore how the Azure Resource Manager can be used to better manage our Azure solutions. We'll dive deep into creating resources and manipulating the Resource Manager templates. In the end, you'll be able to unlock new, powerful ways to manage your Azure resources.