Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
If you are considering Microsoft Office 365 you need to understand what compliance features and capabilities are available. These features may replace existing compliance functionality or create new opportunities to meet compliance obligations. This session will explore features and capabilities, such as data retention, data leakage protection and discovery and demonstrate usage in the Australian setting. The information presented is this session will help you navigate an organisational journey to Microsoft Office 365 by providing knowledge and examples to smooth the transition, whilst maintaining or enhancing regulatory compliance.
We will take a look at what's new in Kinect for Windows v2 including the improvements in core sources like Infrared and Depth data. We will also show how the new Kinect Studio enables Kinect development even while travelling via plane, train, or automobile (note: you should not dev and drive) and how Kinect Interactions can be used to add a new input modality to Windows Store applications.