Windows continues to innovate on its implementation of core operating system security. To achieve the conflicting goals of security and compatibility, it can be complex. How do you understand how it works? Join "The App Compat Guy" for a deep dive into the operating system internals where security decisions begin. This is an operating system internals session, and not a packaged software session.
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
Optimization is very hard topic which requires deep understanding of how underline system works. While every app is unique in its implementation, there are common areas that might improve app performance and memory usage in general. This especially true when apps were updated from previous versions on Windows. In this session, Mickey MacDonald talks about these common areas, how to optimize, and how to plan for low memory and hardware constraints.
Even though you're watching this on-demand, Mickey wants to help. Post your questions, comments, etc below or tweet it, mentioning @cdndevs.