Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system.
During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
Today the competition took place at Microsoft and consisted of hands-on judging. Each judge spent fifteen minutes with each team, testing out their project directly. At the end of the judging we had a showcase for Microsoft Employees to come see the finalists and their projects. Also, John announces the winners of the partner awards.
Mobile app development has really exploded over the past few years. And with that, so have the number of options available to developers. Developers are looking for ways to maximize code reuse while being able to deploy to multiple platforms. In this session, David Totzke and Lori Lalonde talk about cross platform development, and the options available to developers - PhoneGap, Appcelerator's Titanium, Telerik's AppBuilder, Sencha Touch, and Xamarin, to name a few.