An Overview of the Linux Kernel Crypto Subsystem - Boris Brezillon, Free Electrons The Linux kernel has long provided cryptographic support for in-kernel users (like the network or storage stacks) and has been pushed to open these cryptographic capabities to user-space along the way. But what is exactly inside this subsystem, and how can it be used by kernel users? What is the official userspace interface exposing these features and what are non-upstream alternatives? When should we use a HW engine compared to a purely software based implementation? What's inside a crypto engine driver and what precautions should be taken when developing one? These are some of the questions we'll answer throughout this talk, after having given a short introduction to cryptographic algorithms. About Boris Brezillon Since 2014, Boris works at Free Electrons, a company offering development, consulting and training services to embedded Linux system developers worldwide. He has been working on embedded systems since 2008, mostly Linux on ARM. Boris has written and upstreamed a Linux kernel driver for the Marvell CESA cryptographic engine, he is the maintainer of the MTD NAND subsystem, and has contributed to support for Atmel and Allwinner ARM SoCs in the Linux kernel.
Views: 1120 The Linux Foundation
￼Zinc is a new minimal cryptography API for the kernel that is in the process of being upstreamed. Rather than providing an abstracted framework, Zinc provides simple functions. This talk will address the design considerations of the new API, its approach to implementation choice and fuzzing, and touch on formally verified cryptography implementations. We’ll explore the difference between, on one hand, reference code for a particular algorithm, and on the other hand, the present crypto API with its large and complicated abstractions, and how Zinc fits into the middle of these extremes. We’ll also examine issues relating to using SIMD from kernel space and the costs associated with it, and what we can do about it.
Views: 405 hupstream
The Linux kernel has a rich and modular cryptographic API that is used extensively by familiar user facing software such as Android. It's also cryptic, badly documented, subject to change and can easily bite you in unexpected and painful ways. This talk will describe the cryptography API, provide some usage example and discuss some of the more interesting in-kernel users, such as DM-Crypt, DM-Verity and the new file system encryption code. Slides available at: https://www.slideshare.net/kerneltlv/linux-kernel-cryptographic-api-and-use-cases Gilad Ben-Yossef is a principal software engineer at ARM. He works on the kernel security sub-system and the ARM CryptCell engine. Open source work done by Gilad includes an experiment in integration of network processors in the networking stack, a patch set for reducing the interference caused to user space processes in large multi-core systems by Linux kernel “maintenance” work and on SMP support for the Synopsys Arc processor among others. Gilad has co-authored O’Reilly’s “Building Embedded Linux Systems” 2nd edition and presented at such venues as Embedded Linux Conference Europe and the Ottawa Linux Symposium, as well as co-founded Hamakor, an Israeli NGO for the advancement for Open Source and Free Software in Israel. When not hacking on kernel code you can find Gilad meditating and making dad jokes on Twitter.
Views: 878 KernelTLV
url: https://linuxplumbersconf.org/event/2/contributions/254/ speaker: Jason Donenfeld
Views: 343 Linux Plumbers Conference
The Linux kernel has a rich and modular cryptographic API that is used extensively by familiar user facing software such as Android. It's also cryptic, badly documented, subject to change and can easily bite you in unexpected and painful ways. This talk will describe the crypto API, provide some usage example and discuss some of the more interesting in-kernel users, such as DM-Crypt, DM-Verity and the new file system encryption code. Slides available at: https://www.slideshare.net/kerneltlv/linux-kernel-cryptographic-api-and-use-cases Gilad Ben-Yossef is a principal software engineer at ARM. He works on the kernel security sub-system and the ARM CryptCell engine. Open source work done by Gilad includes an experiment in integration of network processors in the networking stack, a patch set for reducing the interference caused to user space processes in large multi-core systems by Linux kernel “maintenance” work and on SMP support for the Synopsys Arc processor among others. Gilad has co-authored O’Reilly’s “Building Embedded Linux Systems” 2nd edition and presented at such venues as Embedded Linux Conference Europe and the Ottawa Linux Symposium, as well as co-founded Hamakor, an Israeli NGO for the advancement for Open Source and Free Software in Israel. When not hacking on kernel code you can find Gilad meditating and making dad jokes on Twitter.
Views: 289 KernelTLV
What exactly is an API? Finally learn for yourself in this helpful video from MuleSoft, the API experts. https://www.mulesoft.com/platform/api The textbook definition goes something like this: “An application programming interface (API) is a set of routines, protocols, and tools for building software applications. An API expresses a software component in terms of its operations, inputs, outputs, and underlying types. An API defines functionalities that are independent of their respective implementations, which allows definitions and implementations to vary without compromising each other. A good API makes it easier to develop a program by providing all the building blocks. APIs often come in the form of a library that includes specifications for routines, data structures, object classes, and variables. In other cases, notably SOAP and REST services, an API is simply a specification of remote calls exposed to the API consumers. An API specification can take many forms, including an International Standard, such as POSIX, vendor documentation, such as the Microsoft Windows API, or the libraries of a programming language, e.g., the Standard Template Library in C++ or the Java APIs. An API differs from an application binary interface (ABI) in that an API is source code-based while an ABI is a binary interface. For instance POSIX is an API, while the Linux Standard Base provides an ABI”. To speak plainly, an API is the messenger that runs and delivers your request to the provider you’re requesting it from, and then delivers the response back to you. To give you a familiar example, think of an API as a waiter in a restaurant. Imagine you’re sitting at the table with a menu of choices to order from, and the kitchen is the provider who will fulfill your order. What’s missing is the critical link to communicate your order to the kitchen and deliver your food back to your table. That’s where the waiter (or API) comes in. ”AHEM” The waiter takes your order, delivers it to the kitchen, and then delivers the food (or response) back to you. (Hopefully without letting your order crash if designed correctly) Now that we’ve whetted your appetite, let’s apply this to a real API example. In keeping with our theme, let’s book a flight to a culinary capital – Paris. You’re probably familiar with the process of searching for airline flights online. Just like at a restaurant, you have a menu of options to choose from ( a dropdown menu in this case). You choose a departure city and date, a return city and date, cabin class, and other variables (like meal or seating, baggage or pet requests) In order to book your flight, you interact with the airline’s website to access the airline’s database to see if any seats are available on those dates, and what the cost might be based on certain variables. But, what if you are not using the airline’s website, which has direct access to the information? What if you are using online travel service that aggregates information from many different airlines? Just like a human interacts with the airline’s website to get that information, an application interacts with the airline’s API. The API is the interface that, like your helpful waiter, runs and and delivers the data from that online travel service to the airline’s systems over the Internet. It also then takes the airline’s response to your request and delivers right back to the online travel service . And through each step of the process it facilitates that interaction between the travel service and the airline’s systems - from seat selection to payment and booking. So now you can see that it’s APIs that make it possible for us all to use travel sites. They interface with with airlines’ APIs to gather information in order to present options back to us The same goes for all interactions between applications, data and devices - they all have API’s that allow computers to operate them, and that's what ultimately creates connectivity. API’s provide a standard way of accessing any application, data or device whether it is shopping from your phone, or accessing cloud applications at work. So, whenever you think of an API, just think of it as your waiter running back and forth between applications, databases and devices to deliver data and create the connectivity that puts the world at our fingertips. And whenever you think of creating an API, think MuleSoft.
Views: 2178303 MuleSoft Videos
This presentation introduced Zinc and its motivations, the cryptography library used by WireGuard. Slides: https://www.wireguard.com/talks/kr2018-slides.pdf
Views: 1037 zx2c4
Brian walks you through a simple cryptocurrency trading bot in Python and using the Poloniex API. The code from this video can be found here: https://github.com/bwentzloff/trading-bot Poloniex API: https://poloniex.com/support/api/ How moving averages work: https://youtu.be/YHSX5_vLR8Q Get some bitcoin ornaments for Christmas: https://cryptogifts.store/product/bitcoin-ornament-bitcoin-rollercoaster-guy-on-a-sleigh/ Contact me directly: https://www.youtube.com/channel/UCme3b9GKKSjZsI8AGth-VlA/about
Views: 198042 Cryptocurrency Trading
Views: 6519 Decypher Media
Linux malware isn't as widespread as malware for Windows, but it is getting more sophisticated. Here's an article about a new Linux trojan malware that can make your computer do Monero mining, steal passwords, replicate itself via Secure Shell, and install a Linux rootkit. But, is it as serious as the tech press makes it sound? What if you practice good Linux security and hardening? Link to article: https://www.zdnet.com/article/new-linux-crypto-miner-steals-your-root-password-and-disables-your-antivirus/ Purchase link for my "Mastering Linux Security and Hardening" book: https://www.packtpub.com/networking-and-servers/mastering-linux-security-and-hardening Purchase link for my "Mastering Linux Security and Hardening" video course: https://www.packtpub.com/networking-and-servers/mastering-linux-security-and-hardening-video So don't delay! Get started with your Linux security hardening today. Many thanks, from the BeginLinux Guru.
Views: 240 BeginLinux Guru
This presentation will provide an overview of cryptodev framework in DPDK. It will show how both software and hardware crypto accelerators can be used transparently from the application, providing an overview of the framework, its API, a performance analysis and comparisons of software and hardware solutions, and finally an example of NFV use case.
Views: 250 DPDK Project
Подсоединение к серверу. Установка минимума программ. Закачка бота. Настройка и запуск первой пары. Понадобятся: 1. Putty(https://putty.org.ru/download.html) ; 2. Linux на вашем сервере VPS(например DO, 10$ на счёте по ссылке https://m.do.co/c/de474ac38c71 ); 3. логин и пароль для подключения через протокол SSH. Команды/ссылки: apt-get install mc wget htop https://github.com/GuntharDeNiro/BTCT/releases wget https://github.com/GuntharDeNiro/BTCT/releases/download/Gunbot3.3.2/GUNBOT_v3.3.2_Poloniex_Bittrex_Patch.zip 3 файла: 1. allpairs-params.js 2. gunthy-linuxx86(для 32х разрядной Linux, для 64х используем gunthy-linuxx64) 3. poloniex-BTC_LSK-config.js ./gunthy-linuxx86 BTC_LSK poloniex (для 32х разрядной Linux) ./gunthy-linuxx64 BTC_LSK poloniex (для 64х разрядной Linux) Автор видео Андрей в telegram: @Dyvosvit Задонатить Андрею: BTC: 1HRjjHByNL2enV1eRR1RkN698tucecL6FA ETH: 0x4e5e7b86baf1f8d6dfb8a242c85201c47fa86c74 ZEC: t1aKAm7qXi6fbGvAhbLioZm3Q8obb4e3BRo Теперь купить можно прямо у меня! https://t.me/dobcrypto Русский топик по Gunbot 3.3 Release: https://gunthy.org/forum/index.php?topic=354.0 Ссылка на русскую группу в #telegram: https://t.me/gunbot_ru Плейлист по #GUNBOT: https://goo.gl/yGNisx Ссылка на это видео: https://youtu.be/j33lByD2lxc #dobcrypto Подписывайтесь на новые видео http://www.youtube.com/c/dobcryptocurrency?sub_confirmation=1 **************************************************** Production Music courtesy of Epidemic Sound! A New Decade 2 - Jan Chmela Back In The Days - Andreas Jamsheree Get Em Up - Jan Chmelar South Grind - Da Tooby The Biljard - Mеns Billner Weighin' Me Down - Push N' Glide Лучшие краны для получения #BTC / #DOGE: http://freebitco.in/?r=1361999 http://freedoge.co.in/?r=315789 Успешного заработка! / Successful earnings! **************************************************** По вопросам можете писать в группу: Группа в вк: http://vk.com/dobcrypto Поддержать и поблагодарить: Btc - 1G8qML6X94EP7qa9W5CKbcPzPfgFHr4E9f Dash - XqLYHqZ8oZ4qxB1qfbTvnN54iSiNk8cYfr ETH - 0x16D7F78B1eB92b23A0Ac4Ca3Cd6438593a59a5eA Монетизация канала: https://youpartnerwsp.com/ru/join?80174 Ссылка на ДИСКЛЕЙМЕР: https://youtu.be/OMRrxHUpkuk
Views: 943 dobcrypto
Cryptography Basics for Embedded Developers - Eystein Stenberg, Mender Many vulnerabilities and breaches happen due to incorrect use of cryptographic mechanisms like encryption. This talk will cover the basic mechanisms of cryptography, like encryption, signatures, and key storage, looking at how these are used to create important security properties like authentication, confidentiality and integrity. Performance is particularly important for embedded development and we will cover which cryptographic operations are computationally expensive and why. We will highlight implementations of cryptographic mechanisms that help meet the performance needs of embedded devices, including Elliptic Curve Cryptography. We will wrap up with common pitfalls, libraries and tools relevant for secure use of cryptography for embedded devices. Eystein Stenberg has over 7 years of experience in security and systems management as a developer, a support engineer, a technical account manager, and now as a product manager. He has been in the front line of some of the largest production environments in various roles and has in-depth knowledge of the challenges in systems security in a real-world context. His holds a Master’s degree in cryptography and his writing credits include “Distributing a Private Key Generator in Ad Hoc Networks."
Views: 2339 Linux Foundation Events
In the Linux kernel, DMA controllers are handled through a framework called DMAEngine, which provides an API for other device drivers to perform DMA transfers. While this framework is critical to some drivers and use cases, it is also fairly obscure and under-documented. This talk aims to give an overview of this kernel framework, using the knowledge gathered during the development of a DMAEngine driver for the Allwinner ARM processors and the writing kernel documentation for this subsystem. We see the main aspects of it, the different features and the recent developments in this framework. Speakers Maxime Ripard Embedded Linux Engineer, Free Electrons Maxime Ripard is an embedded Linux engineer and trainer at Free Electrons since 2011. He is a regular contributor to various Free Software projects related to embedded Linux such as Barebox and Buildroot. He is also the maintainer of Allwinner ARM SoCs in the Linux kernel.
Views: 3634 Linux Foundation Events
In this video I show how to use the Bittrex API to automate your cryptocurrency investment portfolio. Github: https://github.com/coinables/bittrex/blob/master/index.php My Book: https://www.amazon.com/Building-Bitcoin-Websites-Beginners-Development/dp/153494544X
Views: 125459 m1xolyd1an
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note1: Yes, it should have been 'Obi Wan' not 'Obi One' :) note2: The string of 'garbage' text in the two examples should have been different to illustrate more clearly that there are two different systems in use. http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 428953 Computerphile
Video also at http://www.irongeek.com/i.php?page=videos/crypto-block-cipher-modes-openssl-aes-128-ecb-cbc with notes
Views: 19592 Adrian Crenshaw
For decades, all laptops have come with a TPM. Now with Microsoft forcing the transition to the next generation, Linux faces a challenge in that all the previous TPM 1.2 tools don’t work with 2.0. Having to create new tools for TPM 2.0 also provides the opportunity to integrate the TPM more closely into our current crypto systems and thus give Linux the advantage of TPM resident and therefore secure private keys. This talks will provide the current state of play in using TPM 2.0 in place of crypto sticks and USB keys for secure key handling; including the algorithm agility of TPM 2.0 which finally provides a support for Elliptic Curve keys which have become the default recently. This talk will provide an overview of current TSS (Trusted computing group Software Stack) for TPM 2.0 implementation on Linux, including a discussion of the two distinct Intel and IBM stacks with their relative strengths and weaknesses. We will then move on to integration of the TSS into existing crypto system implementations that allow using TPM resident keys to be used with common tools like openssl, gnutls, gpg, openssh and gnome-keyring. We will report on the current state of that integration including demonstrations of how it works and future plans. The ultimate goal is to enable the seamless use of TPM resident keys in all places where encrypted private keys are currently used, thus increasing greatly the security posture of a standard Linux desktop.
Views: 179 hupstream
Part 5: Finally our first hack! We use the LD_PRELOAD feature to overwrite functions of the dynamic library libGameLogic.so. This allows us to change a lot of behaviour in the client. GitHub: https://github.com/LiveOverflow/PwnAdventure3/tree/master/tools/linux/part5_walking_speed.cpp 🌴 Playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG -=[ 🔴 Stuff I use ]=- → Microphone:* https://amzn.to/2LW6ldx → Graphics tablet:* https://amzn.to/2C8djYj → Camera#1 for streaming:* https://amzn.to/2SJ66VM → Lens for streaming:* https://amzn.to/2CdG31I → Connect Camera#1 to PC:* https://amzn.to/2VDRhWj → Camera#2 for electronics:* https://amzn.to/2LWxehv → Lens for macro shots:* https://amzn.to/2C5tXrw → Keyboard:* https://amzn.to/2LZgCFD → Headphones:* https://amzn.to/2M2KhxW -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #PwnAdventure #CTF #ReverseEngineering
Views: 36838 LiveOverflow
Link to the Blod Entry on Crypto++------http://programmingknowledgeblog.blogspot.de/2013/04/compiling-and-integrating-crypto-into.html c++ - about encryption and decryption using Crypto++ library Compiling and Integrating Crypto++ into the Microsoft Visual C++ .c++ - How do I install Crypto++ in Visual Studio 2010 Windows 7. Running Sample program Example How to build C++ cryptographic library, Crypto++ - NuLL CryptoPP DLL How to build Crypto++ dynamically on Microsoft Windows and Visual C++? ... is that your are linking against different versions of the run-time libraries....Visual C++ Crypto++ Library 5.6.2 - a Free C++ Class Library of Cryptographic encryption.cryptopp - Re: How to use Crypto++ with Visual C++ 6.0 Searches related to how to compile and run crypto++ in visual c++ ------------------Online Courses to learn---------------------------- Java - https://bit.ly/2H6wqXk C++ - https://bit.ly/2q8VWl1 AngularJS - https://bit.ly/2qebsLu Python - https://bit.ly/2Eq0VSt C- https://bit.ly/2HfZ6L8 Android - https://bit.ly/2qaRSAS Linux - https://bit.ly/2IwOuqz AWS Certified Solutions Architect - https://bit.ly/2JrGoAF Modern React with Redux - https://bit.ly/2H6wDtA MySQL - https://bit.ly/2qcF63Z ----------------------Follow--------------------------------------------- My Website - http://www.codebind.com My Blog - https://goo.gl/Nd2pFn My Facebook Page - https://goo.gl/eLp2cQ Google+ - https://goo.gl/lvC5FX Twitter - https://twitter.com/ProgrammingKnow Pinterest - https://goo.gl/kCInUp Text Case Converter - https://goo.gl/pVpcwL -------------------------Stuff I use to make videos ------------------- Stuff I use to make videos Windows notebook – http://amzn.to/2zcXPyF Apple MacBook Pro – http://amzn.to/2BTJBZ7 Ubuntu notebook - https://amzn.to/2GE4giY Desktop - http://amzn.to/2zct252 Microphone – http://amzn.to/2zcYbW1 notebook mouse – http://amzn.to/2BVs4Q3 ------------------Facebook Links ---------------------------------------- http://fb.me/ProgrammingKnowledgeLearning/ http://fb.me/AndroidTutorialsForBeginners http://fb.me/Programmingknowledge http://fb.me/CppProgrammingLanguage http://fb.me/JavaTutorialsAndCode http://fb.me/SQLiteTutorial http://fb.me/UbuntuLinuxTutorials http://fb.me/EasyOnlineConverter
Views: 20815 ProgrammingKnowledge
url: https://linuxplumbersconf.org/event/2/contributions/66/ speaker: Jason Donenfeld WireGuard   is a new network tunneling mechanism written for Linux, which, after three years of development, is nearly ready for upstream. It uses a formally proven cryptographic protocol, custom tailored for the Linux kernel, and has already seen very widespread deployment, in everything from smart phones to massive data center clusters. WireGuard uses a novel timer mechanism to hide state from userspace, and in general presents userspace with a "stateless" and "declarative" system of establishing secure tunnels. The codebase is also remarkably small and has been written with a number of defense in depth techniques. Integration into the larger Linux ecosystem is advancing at a health rate, with recent patches for systemd and NetworkManager merged. There is also ongoing work into combining WireGuard with automatic configuration and mesh routing daemons on Linux. This talk will focus on a wide variety of WireGuard’s innards and tentacles onto other projects. The presentation will walk through WireGuard's integration into the netdev subsystem, its unique use of network namespaces, why kernel space is necessary is necessary, the various hurdles that have gone into designing a cryptographic protocol specifically with kernel constraints in mind. It will also examine a practical approach to formal verification, suitable for kernel engineers and not just academics, and connect the ideas of that with our extensive continuous integration testing framework across multiple kernel architectures and versions. As if that was not already enough, we will also take a close look at the interesting performance aspects of doing high throughput CPU-bound computations in kernel space while still keeping latency to a minimum. On the topic of smartphones, the talk will examine power efficiency techniques of both the implementation and of the protocol design, our experience in integrating this into Android kernels, and the relationship between cryptographic secrets and smartphones suspend cycles. Finally we will look carefully at the WireGuard userspace API and its usage in various daemons and managers. In short, this presentation will examine the networking and cryptography design, the kernel engineering, and the userspace integration considerations of WireGuard.  https://www.wireguard.com  https://www.wireguard.com/papers/wireguard.pdf
Views: 2651 Linux Plumbers Conference
Grin Coin is a no ICO, no premine, and no dev tax mineable cryptocurrency. Today I'll show you how to mine GRIN which is THE MOST ANTICIPATED GPU mineable crypto of the year! Subscribe to VoskCoin - http://bit.ly/VoskCoin Join our Grin Coin Discord channel - https://discord.gg/QFuBRDa VoskCoin Written Grin Coin Mining blog post - http://bit.ly/MineGrin Grin Coin is without a doubt one of the most exciting coins to launch that is mineable arguably ever. This is exactly why this video guide was created to show you how to partake in the earliest phase of mining GRIN regardless of if you are a windows miner or linux / smos / hiveos miner AND also regardless if you have the technical skills to use the CLI GRIN wallet or await the release of the GUI Grin Coin wallet. Hash hard my friends! Do you want to mine Grin Coin on windows? Download Grin Gold Miner & Net 2.2 here - http://bit.ly/GrinGold Best mining overclocking tool msi afterburner - http://bit.ly/2s9pakb Do you want to mine Grin Coin on Linux / smOS? Download Simple Mining OS here - http://bit.ly/smosdl Copy and paste this into group miner config for bminer @ f2pool -uri cuckaroo29://voskcoin.boom:[email protected]:13654 Copy and paste this smOS setup for mining w/ bminer @ grinmint -uri cuckaroo29://[email protected]:[email protected]:3416 -api 127.0.0.1:1880 Here are some critical links for mining and holding Grin Coin Grin Coin official website - http://bit.ly/2HcCCyk Compare Grin Coin mining pool hashrates - http://bit.ly/2Fuj3zU Grin Coin official wallet setup guide - http://bit.ly/2RT0ueg Grin Coin official wallet download link - http://bit.ly/2Rw3RZ9 Grin Coin official block explorer - http://bit.ly/2RX5Khf Grinmint block explorer (alt.) - http://bit.ly/2Fv0Kuq Buy 1070 TI to use for mining Grin Coin - http://geni.us/WQd7cCs VoskCoin Patreon - https://www.patreon.com/VoskCoin VoskCoin Facebook - https://www.facebook.com/VoskCoin/ VoskCoin Reddit - https://www.reddit.com/r/voskcoin/ VoskCoin Discord Server Invite - https://discord.gg/FGGmS2z VoskCoin Twitter - https://twitter.com/VoskCoin VoskCoin Instagram - https://www.instagram.com/voskcoin/ VoskCoin Official Donation Addresses BTC - 12PsgKuhcJrEqJbD3oMN7rcEcuyqyqRznL ETH - 0xDEe6A2ae293F8C58Ef71649658344BbF382b6e70 ZEC - t1ZoVF5t75NahSAfuwpcyHA8uzkPyocXpJZ VoskCoin is for entertainment purposes only and is never intended to be financial investment advice. VoskCoin owns or has owned cryptocurrency and associated hardware. VoskCoin may receive donations or sponsorships in association with certain content creation. VoskCoin may receive compensation when affiliate/referral links are used. VoskCoin is home of the Doge Dad, VoskCoin is not your Dad, and thus VoskCoin is never liable for any decisions you make. #GrinCoin #VoskCoin #Mining #MimbleWimble #GPUmining
Views: 31616 VoskCoin
Enterprise Security API (ESAPI) 2.0 Crypto Changes with Kevin Wall & the OWASP Project Portal with Jason Li
Views: 30 LASCON
Christoph Lameter http://linux.conf.au/schedule/presentation/68/ The interface to High Performance network fabrics such as Infiniband and Omnipath has traditionally been like a side car in the kernel. Software was developed in a separate section from the kernel netowrk stack. This talk is about how to integrate the fabrics properly into the network stack so that standard things like ethtool or netstat and the commonly availabe /proc/net/... things will work. This is work on progress so at this early point is it not clear how far the work will have progressed until the presentation.
Views: 935 linux conf au 2017 - Hobart, Australia
Gekko Trading Bot: https://gekko.wizb.it/ Gekko Installation guide: https://gekko.wizb.it/docs/installation/installing_gekko.html Support My Channel: Patreon: https://www.patreon.com/crypto49er Buy my t-shirt: https://teespring.com/crypto49er-t-shirt SteemIt: https://steemit.com/@crypto49er Twitter: https://twitter.com/Crypto49er ,.-~*´¨¯¨`*·~-.¸-( Buy your first Bitcoin )-,.-~*´¨¯¨`*·~-.¸ Get $10 free from Coinbase when you buy $100 Crypto: http://bit.ly/FreeMoneyCoinBase ,.-~*´¨¯¨`*·~-.¸-( Google Advanced Protection )-,.-~*´¨¯¨`*·~-.¸ Feitian Bluetooth FIDO Security Key: http://bit.ly/FeitianBluetoothSecurityKey Yubico FIDO U2F Security Key: http://bit.ly/YubicoSecurityKey ,.-~*´¨¯¨`*·~-.¸-( Hardware Wallets )-,.-~*´¨¯¨`*·~-.¸ Ledger Nano S (also a FIDO U2F device): http://bit.ly/BuyLedgerWalletNanoS ,.-~*´¨¯¨`*·~-.¸-( Exchanges )-,.-~*´¨¯¨`*·~-.¸ Join Binance: http://bit.ly/BinanceCryptoExchange Join KuCoin: http://bit.ly/JoinKuCoin ,.-~*´¨¯¨`*·~-.¸-( Donations Addresses )-,.-~*´¨¯¨`*·~-.¸ BTC: 1FhS1cxTvnAaMEZcsTSndFJDwkAQZAfTfv LTC: LfeZYPJecyyPCJ2GzV2LWnUsoZoJKtx5mQ BitShares: Crypto49er ,.-~*´¨¯¨`*·~-.¸-( Disclaimer )-,.-~*´¨¯¨`*·~-.¸ This video should not be taken as financial advice.
Views: 26179 Crypto49er
Quickly setup your Raspberry Pi to mine many crypto currencies including TurtleCoin! TurtleCoin: http://turtlecoin.lol/ Mine2Gether: https://trtl.mine2gether.com/ Etcher: http://etcher.io/ Raspbian Images: https://www.raspberrypi.org/downloads/ Raspberry Pi Commands: mkdir miner cd miner git clone https://github.com/oppressing/CpuMinerRaspberryPiAutoInstall.git ls cd CpuMinerRaspberryPiAutoInstall chmod +x install.sh ./install.sh cd cpuminer-multi screen ./cpuminer -a cryptonight -o stratum+tcp://(pool:port) -p x -u (wallet) --api-bind 0 Pools that I know of: Mine2Gether is the on used in the video (port 1115) https://trtl.mine2gether.com/ trtl.mine2gether.com:1115 The NY Turtl Pool commented on our previous video and we thought we'd give them a shoutout: http://ny.minetrtl.us/ Send us a small tip here: TRTLuyhQgCxPc9zwm9zMvLZJL7vDBRWMAKrHCfyHFQ3ig9AUdYyWoUUaHBMjbuH5hBKRSeLerBEiuRg9yLU5hJh9QXnccBCdeek Music: Funk Your Style - @TonezPro Wallpaper: https://jscenery.deviantart.com/art/Northern-Valley-198551838
Views: 4942 Pear Crew
Headless installation for alt crypto coin using Ubuntu Linux Server
Views: 10514 Antonie Geerts
Conteúdo com finalidade educacional! Use apenas em sua rede local com autorização do responsável pela rede. Curso Hacker grátis: https://goo.gl/EPyrGA Tudo sobre criptomoedas: https://goo.gl/j67HQM Script e mais: https://goo.gl/YnDkuM *Não funciona em suas páginas HTTPS da forma como é apresentado no vídeo, para isso é necessário alguns passos a mais que não abordamos ainda. Doe bitcoin para o canal: 1LQvNXRAUSbm39Fzg6o8rkQsebLrQkTpt Nome das músicas utilizadas: Mr Robot -- Theme Song Mix -- [HD] BANG Chief Keef - Hate Being Sober (Dotcom's Festival Trap Remix) Créditos animação da intro: Ronyclaps - https://www.youtube.com/channel/UCAGHAWLPyhlq2Lub53i58dw Site - http://www.limontec.com/ Facebook - http://www.facebook.com/limontecsocial Twitter - https://twitter.com/@LimonTec
Views: 18383 Limon Tec
Video Tutorial for installing Electrum Bitcoin wallet in Linux, specifically Centos 7. Terminal commands in order... sudo yum update sudo yum install yum-utils sudo yum -y groupinstall development sudo yum -y install https://centos7.iuscommunity.org/ius-release.rpm sudo yum -y install python36u sudo yum -y install python36u-pip sudo pip3.6 install pyqt5 sudo pip3 install https://download.electrum.org/3.0.5/Electrum-3.0.5.tar.gz Signup links Coinbase - Buy cryptocurrency easily: https://www.coinbase.com/join/5a3b11c274ced8050cb02575 Hashflare - Mine bitcoin and other coins: https://hashflare.io/r/5F5CA638 Some signup links provide me a referral fee. This helps grow the channel, thanks for your support. I appreciate any donations to help the channel grow. Below are my wallet addresses to receive donations. Thanks! Bitcoin: 1DZZ8ptrdT3bTRfesE4qsWsiYdfmaVxHri Litecoin: LWqWs5HD4qbTtPFk6FxrP9wmttYS35iTL5 Ethereum: 0x1d4b7841339c6364f5d6c5C7F47ad1b8233ED5dF Please do not use my channel as financial advice. Do your research and invest only money that you can afford to lose. I hope to provide technical insight and documentation of my journey.
Views: 274 Crypto Covet
SHRIMPY Crypto Portfolio Management and Rebalancing ►http://bit.ly/shrimpy-tool ►Telegram Kanal: https://t.me/PassivesEinkommenBlogCom Shrimpy A brief tutorial on portfolio management and boosting the performance of your HODL Portfolio Today I'd like to introduce a free tool that manages my portfolio. According to the backtests my portfolio performance should increase to 250-300%. I'll show you how this works in this video. Thereafter I am gonna show you how you signup and implement your coins And in the following videos we talk about further insights and my experiences. We quite often talked about the sense and nonsense of trading vs. HODL or bot trading in crypto. Personally, I am a longterm investor in the market and believe that crypto has come to stay. Now I wonder how much of my time I want to invest in my portfolio. Trading is too complicated for me and if you dig deeper, there are very few people who beat the market in the long term. Exceptions excepted. But I'm not an exception. So I would rather HODL and maintain a long-term portfolio. I have already mentioned in other posts that I have a personal savings plan set up and buy four times a month smaller amounts of a single coin. Its an Index coin an maps the upper 20 market caps.. Due to the resulting cost-average (average purchase price) I can buy with almost no emotions and expand my portfolio further. Fortunes are created in the dips and crashes. In bull run we "only" collect. So, take care of it now. Setup your strategy and stick to it. I recently stumbled across a new tool that seems promising to me. It is called Shrimpy, is free and very simple. I linked it to you below in the video description. In Shrimpy you can have your crypto-exchange like Binance or Bittrex, but, at least in the beta version, also connect some other wallets. It then determines how much of a certain coins you want to keep in your portfolio and Shrimpy buys and sells to keep this balance always. Before the details I take one thing first: Shrimpy has an average portfolio with hourly rebalancing proven to bring about 2.5-3.0 times as much performance as the HODL portfolio itself. But how exactly does it work? I have linked some interesting articles in the video description. Makers of Shrimpy are explaining in great detail how Weekly / Daily / Hourly rebalancing works and how many assets (Coins) one should ideally hold. https://hackernoon.com/crypto-users-who-diversify-perform-better-new-researchebf775d348dd If you are too lazy to read, here is the solution. Between 14-22 coins in the portfolio and hourly Rebalancing brought in 100,000 backtest the best results. What Shrimpy is actually doing, is to sell parts of your over performing coins and therefore buys the under performing coins. Once this changes again it does it the other way around. So it bounces back and forth and generates more coins in total. That's a good starting point for the next bull run. We will talk about strategies in later videos. I am very confident to have found an easy solution that improves my performance quiet a bit without doing too much work on it. The rest will be explained in the video. Enjoy and trade save. ► Link to Website: http://bit.ly/shrimpy-tool ► Shrimpy Backtest Tool: https://www.shrimpy.io/backtest?c=FDAKARQMAA==&p=1h&r=128 ► Overview all Shrimpy Posts: https://hackernoon.com/@ShrimpyApp ► Strategy Basics: https://hackernoon.com/portfolio-rebalancing-for-cryptocurrency-7a129a968ff4 https://hackernoon.com/rebalancing-is-the-crypto-promised-land-6cc37264a4a3 ▬ Cryptos and Tax ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Crypto and Tax mad easy with Cointracking ►Cointracking: http://bit.ly/Coin-Tracking ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Please note that I am not a financial advisor, I am simply showing what crosses my way and what I find interesting. always do your own research! ▬ Useful Tools ▬▬▬▬▬▬▬▬▬▬▬▬▬ Crypto Portfolio Tracking with Cointracking ►Cointracking: http://bit.ly/Coin-Tracking ▬ Contact ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ ►E-Mail: [email protected] ►Telegram: https://t.me/PassivesEinkommenBlogCom ►YouTube: http://bit.ly/2k7KO6W ►Blog: Under construction ►DTube: https://d.tube/#!/c/kryptorero ►Steemit: https://steemit.com/@kryptorero Pitcures: https://pixabay.com SHRIMPY Crypto Portfolio Management and Rebalancing
Views: 669 Shrimpy
AES Encryption/Decryption using Web Cryptography API Reference: https://8gwifi.org/docs/window-crypto-aes.jsp web crypto api tutorial The Crypto interface represents an interface to general purpose cryptographic functionality including a cryptographically strong pseudo-random number generator seeded with truly random values. The AES Encryption/Decryption Mode The AES-CTR algorithm identifier is used to perform encryption and decryption using AES in Counter mode. The "AES-CBC" algorithm identifier is used to perform encryption and decryption using AES in Cipher Block Chaining mode The "AES-GCM" algorithm identifier is used to perform authenticated encryption and decryption using AES in Galois/Counter Mode mode The "AES-KW" algorithm identifier is used to perform key wrapping using AES,
Views: 118 Zariga Tongy
PF_RING è un framework per la cattura del traffico di rete ad alta velocità, nato per accelerare le applicazioni di monitoraggio di rete su Linux utilizzando hardware a basso costo. Ad oggi, grazie alla sua semplice API, al suo design modulare, al supporto per gran parte delle device di cattura presenti sul mercato, è diventato uno dei framework più utilizzati per la cattura del traffico. Alfredo Cardigliano: Lavora da anni al progetto ntop, che si occupa di sviluppare strumenti open-source per il monitoraggio del traffico di rete, dove guida lo sviluppo di tecnologie per la cattura e il processamento di traffico ad alte prestazioni e mitigazione di attacchi DDoS. Ha conseguito una laurea in Tecnologie Informatiche presso l’Università di Pisa ed ha approfondito i suoi studi sulle architetture parallele presso l’Uppsala Universitet in Svezia.
Views: 30 Gulp Pisa
Rafael Wysocki http://lca2015.linux.org.au/schedule/30259/view_talk System suspend is one of the most mature and widely used power management techniques in Linux. At the same time the kernel's system suspend infrastructure is susceptible to inadvertent errors, so major changes in that code are relatively rare and applied with caution. However, that conservative approach has caused system suspend to gradually fall behind with meeting the expectations of modern systems' users. It has turned out recently that it needs to be faster, integrated more tightly with runtime PM, more careful about avoiding unnecessary operations and capable of handling systems with more advanced PM support in hardware in better ways. As a result, several efforts are under way to improve system suspend in Linux and make it even more useful. I will discuss those efforts, describe the improvements that have been achieved already and outline possible directions of future development.
Views: 860 Linux.conf.au 2015 -- Auckland, New Zealand
Data integrity protection with cryptsetup tools what is the Linux dm-integrity module and why we extended dm-crypt to use authenticated encryption by Milan Broz At: FOSDEM 2018 Room: Janson Scheduled start: 2018-02-04 12:00:00+01
Views: 233 FOSDEM
Efficient key management and data-at-rest encryption in GCP is possible today through Cloud KMS. Using Cloud KMS, applications have access to industry compliant symmetric key cryptography to either directly encrypt blocks of data or manage the keys used in other GCP services. But what if you need more? Come to this session to learn about the great new enhancements coming to Cloud KMS and key management in general. SEC210 Event schedule → http://g.co/next18 Watch more Security sessions here → http://bit.ly/2zJTZml Next ‘18 All Sessions playlist → http://bit.ly/Allsessions Subscribe to the Google Cloud channel! → http://bit.ly/NextSub
Views: 1103 Google Cloud Platform
Timestamps: 0:15 - What is a REST API and why do we need them for trading 3:05 - Difference between GET/POST API 4:00 - Difference between Public/Signed API 5:21 - Code to call API 11:14 - API Call - Ping 12:45 - API Call - Server time 13:42 - API Call - Exchange Information 14:40 - API Call - Orderbook 18:10 - API Call - Recent Trade List 19:43 - API Call - Historical Trades 21:05 - API Call - Candlestick Information 23:16 - API Call - 24hr ticker price change statistics Github Link: https://github.com/karthik947/Binance-REST-API-Examples CORS Chrome Extn: https://chrome.google.com/webstore/detail/cors/dboaklophljenpcjkbbibpkbpbobnbld Binance API : https://github.com/binance-exchange/binance-official-api-docs/blob/master/rest-api.md Disclaimer: I am not a financial advisor nor is any content in this article presented as financial advice. The information provided in this post or any other posts that I make and any accompanying material is for educational purposes only. It should not be considered financial or investment advice of any kind. Use these tools at your own risk.
Views: 6379 DeKay Arts
The state of VPN protocols is not pretty, with popular options, such as IPsec and OpenVPN, being overwhelmingly complex, with large attack surfaces, using mostly cryptographic designs from the 90s. WireGuard presents a new abuse-resistant and high-performance alternative based on modern cryptography, with a focus on implementation and usability simplicity. It uses a 1-RTT handshake, based on NoiseIK, to provide perfect forward secrecy, identity hiding, and resistance to key-compromise impersonation attacks, among other important security properties, as well as high performance transport using ChaCha20Poly1305. A novel IP-binding cookie MAC mechanism is used to prevent against several forms of common denial-of-service attacks, both against the client and server, improving greatly on those of DTLS and IKEv2. Key distribution is handled out-of-band with extremely short Curve25519 points, which can be passed around in the likes of OpenSSH. Discarding the academic layering perfection of IPsec, WireGuard introduces the idea of a "cryptokey routing table", alongside an extremely simple and fully defined timer-state mechanism, to allow for easy and minimal configuration; WireGuard is actually securely deployable in practical settings. In order to rival the performance of IPsec, WireGuard is implemented inside the Linux kernel, but unlike IPsec, it is implemented in less than 4,000 lines of code, making the implementation manageably auditable. The talk will examine both the cryptography and kernel implementation particulars of WireGuard and explore an offensive attack perspective on network tunnels. - Jason Donenfeld Jason Donenfeld is an independent security researcher and software developer, with a broad background of experience, well-known in both the security community and the open source world, and has pioneered several exploitation techniques. He has worked with many severe vulnerabilities in widespread software projects, including working on 0-day vulnerabilities in the Linux kernel, as well as extensive hardware reverse engineering. His security work spans advanced mathematical and geometric algorithms, cryptography, and remote exploitation. Jason founded Edge Security (www.edgesecurity.com), a highly capable security consulting firm, with expertise in vulnerability discovery, security assessments, reverse engineering, hardened development, and physical security. http://codeblue.jp/2016/en/contents/speakers.html#speaker-donenfeld
Views: 4228 CODE BLUE Conference
Link to get a Profit Trailer License: https://profittrailer.com/pt/WNTT/?campaign=WNTT7 Link to get a Binance Account: https://www.binance.com/?ref=21282988 Link to the Analysis Spreadsheet: https://ufile.io/py005 The Profit Trailer Crypto Trading Bot is a Software For PC/Linux/Mac that connects via API Key to the Exchange Account. It is working with bittrex, poloniex, binance and kraken. I think even cryptopia is possible. You define the buy and sell strategy settings in the setting files. In this episode I want to give an update concerning the analysis sheet and want to share my Profit Trailer Settings. Have Fun
Views: 9154 We Need To Talk
Subscribe === https://goo.gl/7FkfFU === In this video we talk about the secret to make money with Bitmex and a summary of Crypto news this week. 🚩Remember to subscribe and hit the bell "🔔" icon to get notifications as soon as I upload a new video or start a live stream! ___ 🔥How to make money with Crypto and ICOs 🔥 http://thecryptosphere.co/webinar How To Go From Zero To Hero and Make $85,000-$145,000 A Year As A Blockchain Developer (Without Any Programming Background) http://thecryptosphere.co/coding-webinar Sign up to Brave Browser (no ads, more privacy than Chrome) - http://thecryptosphere.co/brave ___ Any Donations Are Really Appreciated! ►💓Donate Ether and Ethereum-Based (ERC-20) Tokens: 0xac77Dd52C5eaA9948eA2840Bc9da0909E1Ea097a ►💓Donate Bitcoin: 31iPg2UZounZS68fYyszDidf9UqG2CvZqF ►💓Donate Using Paypal: http://paypal.me/thecryptosphere _ 📣 Join Telegram chat channel https://t.me/cryptospheretalk Twitter https://twitter.com/dvircrypto Instagram http://instagram.com/thecryptosphere1 NEO Review https://www.youtube.com/watch?v=F9YWHqDzSPI&index=121&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Ethereum Review https://www.youtube.com/watch?v=aZO55cB2wUI&index=137&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Stellar (XLM) - In-Depth Honest Review https://www.youtube.com/watch?v=R9IRIsJp6gI&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=132 Ripple Review https://www.youtube.com/watch?v=i7R0Ly4fpCU&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=125 EOS VS Ethereum VS NEO https://www.youtube.com/watch?v=M_8GybdaOjk&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=130 Holding Bags of Neo/ICON/Wanchain/EOS/Ontology? Watch This Video https://www.youtube.com/watch?v=atcuoBU7dsE&index=109&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi EOS Review https://www.youtube.com/watch?v=LmGSBM_ftQs&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=128 Ontology Review https://www.youtube.com/watch?v=PH6lS3zEr9s&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=124 Zilliqa Review https://www.youtube.com/watch?v=1kjT7Mt0hT0&index=107&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Tron Review https://www.youtube.com/watch?v=XG4GTj5YXjc&t=0s&index=114&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi VeChain Review https://www.youtube.com/watch?v=JJselxYq4io&t=0s&index=117&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Bear Market Action Plan - What You Should Do + My Personal Plan https://www.youtube.com/watch?v=gvtbEEYNte0&index=119&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Cardano Review https://www.youtube.com/watch?v=4lUjwiuN2nc&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=130 Monero Review - The #1 Privacy Coin? https://www.youtube.com/watch?v=MPo1Kj7aEjQ&index=149&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Binance Coin ($BNB) Review https://www.youtube.com/watch?v=TeHXL1rfdbo&index=154&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi Holochain Review https://www.youtube.com/watch?v=KGi2pEeO4Vo&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=155 Bitcoin Review https://www.youtube.com/watch?v=V1mHWnfYvdo&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=149 Dash Review https://www.youtube.com/watch?v=nV_ewIuO8-g&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=151 IOTA Review https://www.youtube.com/watch?v=YAxb3OyOr1Y&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&t=47s&index=166 DigiByte Review https://www.youtube.com/watch?v=ONXdyii6xzE&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=163 Nano Review https://www.youtube.com/watch?v=JS9tJgbFTUA&list=PLyChSPVKnGE61OcKeLpLLpy9OFf4aNVXi&index=153 ___ DISCLAIMER: This is NOT financial advice. This is just my opinions. I'm not responsible for any investment decisions that you choose to make. DYOR
Views: 576 Dvir Oren
Follow the steps in the video tutorial for how to build Daedalus/Cardano-SL from scratch Oracle VM: https://linus.nci.nih.gov/bdge/installUbuntu.html Twitter: https://twitter.com/SebastienGllmt Donation(ADA): DdzFFzCqrhsyX4HqRkrdyU5yxBww7BeJQix1At21Jv1HwTtL6CCGmPV9CC1PKwqWteNufzpoYVBMXLzX6aBaqK7bfm1X4L8ANNYxWM5S
Views: 2522 Sebastien Guillemot
How does full-disk encryption keep your data safe, and what are its limitations? Thanks to Braintree for supporting our channel. To learn more, and for your first $50,000 in transactions fee-free, go to http://www.braintreepayments.com/techquickie Follow: http://twitter.com/linustech Join the community: http://linustechtips.com License for image used in this video: https://creativecommons.org/licenses/by/3.0/legalcode
Views: 260975 Techquickie
How to authenticate using a JSON Web Token (JWT) and then using that token to interact with an API. This particular example is interacting with a Laravel application using the excellent Dingo API package. Visit bakerstreetsystems.com for more tutorials on programming, linux servers, information systems tips, and more.
Views: 38214 Jason Jensen
In this video I demonstrate how one could set up an automated trading bot on their own Windows PC using the bitmex API. Xampp: https://www.apachefriends.org/download.html Bitmex: https://www.bitmex.com/register/na9zMz GitHub: https://github.com/coinables/bitmex-api-php
Views: 14098 m1xolyd1an
Casper API - это инфраструктура, которая позволяет любому DApp, на любом блокчейне со смарт-контрактом, организовать децентрализованное облачное хранение данных своего сервиса. ========================================== ОФИЦИАЛЬНЫЙ САЙТ: http://www.casperproject.io/ WHITE PAPER: http://www.casperproject.io/docs/Casper_whitepaper_eng.pdf ANN: https://bitcointalk.org/index.php?topic=2869690 Twitter: https://twitter.com/CasperAPI Facebook: https://www.facebook.com/CasperAPI/ Telegram: https://t.me/CasperProjectENG ICO апрель 2018 Цена токена на ICO 1 CST = 1.2-2 USD Мой BBT: https://bitcointalk.org/index.php?action=profile;u=1198608 inesterdd ETH Wallet: 0x6fe86C4070f3F9CD87D7b575ED73972D608CFc4E ========================================== Музыка: Steerner & Martell - Sky
Views: 1602 ALLTCOIN iNFO
The arrival of flash storage introduced a radical change in performance profiles of direct attached devices. At the time, it was obvious that Linux I/O stack needed to be redesigned in order to support devices capable of millions of IOPs, and with extremely low latency. In this talk we will revisit the changes the Linux block layer in the last decade or so, that made it what it is today, performant, scalable, robust, NUMA-aware subsystem. In addition, we will cover the new NVMe over Fabrics support in Linux (if time permits). Sagi Grimberg Sagi is Principal Architect and co-founder at LightBits Labs. The slides are available at https://www.slideshare.net/kerneltlv/the-linux-block-layer-build-for-fast-storage
Views: 1105 KernelTLV