Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system.
During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
With the release of XenDesktop 7, Citrix has closely integrated with Microsoft Application Virtualization (App-V) 5.0 to support Application Virtualization in deployments. In this session, we provide an overview of App-V 5.0 and how third-party products integrate with it, and then comprehensively cover how XenDesktop 7 has integrated with App-V 5.0 to provide a compelling experience for Citrix and Microsoft customers. We also cover migration strategies for customers who are moving to App-V 5.0 from Citrix Application Streaming.
Learn how to use Azure SQL Data Warehouse, an enterprise-class distributed database capable of processing up to petabyte volumes of relational and non-relational data, to quickly gain insights from your data. Using the scale-out nature of SQL Data Warehouse, the industry's first cloud data warehouse with grow, shrink, and pause in seconds, you'll be able to grow your BI and analytics systems quickly to meet your current and future data demands. SQL Data Warehouse blends the best of SQL Server's enterprise-class relational database quality and reliability with cloud computing.