Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
當企業內部自建 IT 服務失效時，如何快速的透過備份與備援，達成有效的災難復原能力，是身為企業 IT 系統管理及維運人員重要的工作項目之。
透過 System Center 2012 R2 的套件組合，你可以使用 Microsoft Azure 及 HyperV 打造現代化的虛擬化資料中心，以提供商業永續營運最強大的後盾 ！ 透過本活動，您將對如何在一個現代化的動態資料中心提供 BaaS (備份即服務, Backup as a Services)，RAAS (Restore as a Services) 和 DRaaS (Disaster Recovery as a Services災難恢復即服務) 有相當程度的了解，並且善用以 Windows Server 2012 R2 為基礎的 System Center 2012 R2 ，Microsoft Azure ，HyperV 的強大整合能力，建構出屬於您的企業資料中心的 BaaS，Raas ，DRaaS 等服務的自動化 IT 架構。
Join this session for a journey through the lifecycle of a Microsoft Application Virtualization (App-V) 5.0 package. From the birth of a sequenced package through deployment, streaming, configuration, updates, connection groups, user customization and eventual termination. This session is based solely on stand-alone mode, demo-driven, behind-the-scenes views of how each part of the application lifecycle is handled by the App-V Client. No ties to Configuration Manager or Full Infrastructure, just an under the hood insight into how App-V applications are handled regardless of delivery mechanisms.