Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
Visual Studio 2013 and the Windows Azure 2.2 SDK provide a rich set of features for diagnosing and troubleshooting Windows Azure Applications. In this video you'll see how to use this new debugging capability through the entire development lifecycle of a cloud application, from the local developer environment all the way through a deployed site on Windows Azure
This session provides a deep dive of User Experience Virtualization (UE-V) 2.0, which allows your customers to personalize their experience across virtualized and physical environments. Specifically, it delves into how to leverage UE-V 2.0 across your Virtual Desktop Infrastructure (VDI) and physical devices from a lab deployment through deploying and managing UE-V 2.0 with Microsoft System Center 2012 R2 Configuration Manager in your Enterprise.