Podcast appearances and mentions of joanna rutkowska

  • 8PODCASTS
  • 9EPISODES
  • 1h 2mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 7, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about joanna rutkowska

Latest podcast episodes about joanna rutkowska

DGPtalk: Obiektywnie o biznesie
Joanna Rutkowska: Ustawodawca dostrzegł, że funkcjonujemy w świecie cyfrowym

DGPtalk: Obiektywnie o biznesie

Play Episode Listen Later Apr 7, 2023 27:32


Jakie obowiązki na pracodawców nakłada ustawa work-life balance? Czy pracodawcy muszą przygotować zmiany w systemach kadrowo-płacowych? Co pracodawcy muszą zmienić w formularzach?Gościnią Szymona Glonka w podcaście "DGPtalk: Obiektywnie o Biznesie" jest Joanna Rutkowska Dyrektorka HR w agencji zatrudnienia Trenkwalder. Hosted on Acast. See acast.com/privacy for more information.

DGPtalk: Obiektywnie o biznesie
Joanna Rutkowska: Pracodawca musi zapewnić pracownikowi niezbędne materiały i narzędzia w tym urządzenia techniczne, żeby on pracę zdalną mógł wykonywać

DGPtalk: Obiektywnie o biznesie

Play Episode Listen Later Feb 8, 2023 29:07


Gościnią Szymona Glonka w podcaście "DGPtalk: Obiektywnie o Biznesie" jest Joanna Rutkowska Dyrektorka HR w agencji zatrudnienia Trenkwalder. Kto może pracować zdalnie? Ile dni pracy zdalnej w 2023 roku przysługuje? Czy pracownik ma prawo odmówić pracy zdalnej? Kiedy pracodawca nie może odmówić pracy zdalnej? Hosted on Acast. See acast.com/privacy for more information.

Ojcowska Strona Mocy
Jak pomóc dziecku uczącemu się w szkole muzycznej. Joanna Rutkowska – OSM 077

Ojcowska Strona Mocy

Play Episode Listen Later Sep 15, 2021 35:37


Wygraj iPada od Partnera odcinka - Salonów Muzycznych Riff: https://riff.net.pl/wygraj-ipadaJak pomóc dziecku w adaptacji w szkole muzycznej? Co robić, gdy chce z niej zrezygnować? I dlaczego warto kształcić się muzycznie? Gościem 77. odcinka podcastu jest Joanna Rutkowska, dyrektor Szkoły Muzycznej I i II stopnia w Gdyni, z którą rozmawiamy o tym jak pomóc uczniom rozpoczynającym naukę w szkole muzycznej, a także ich rodzicom na początku tej artystycznej drogi. A Partnerem dzisiejszego odcinka są Salony Muzyczne Riff, oferujące szeroki wybór instrumentów i akcesoriów muzycznych dla wszystkich uczących się grać, jak i dla tych, którzy są już z muzyką za pan brat. Robiąc zakupy w Salonach Muzycznych Riff do końca września 2021 roku możesz wziąć udział w akcji „Nauka nie poszła w las” i wygrać nowego iPada lub 200 zł voucher na zakupy. Wystarczy że zarejestrujesz paragon na stronie https://riff.net.pl/wygraj-ipada i odpowiesz na pytanie „Jakie były twoje najbardziej odjechane wagary?” Wersję wideo, transkrypcję i linki znajdziesz na: https://www.ojcowskastronamocy.pl/077 Dobrego dnia ;) 00:00 - Wstęp i konkurs - Wygraj iPada02:06 - Gość odcinka. Joanna Rutkowska 03:12 - Jak pomóć dzieciom rozpoczynającym szkołę muzyczną? 05:41 - Co robić, gdy rodzic nie zna się na muzyce? 12:39 - Co robić gdy dziecko chce zrezygnować ze szkoły muzycznej?20:33 - Psycholog w szkole muzycznej 22:30 - Przygotowanie do szkoły muzycznej. Ognisko. Lekcje. Koncerty 24:58 - W jakim wieku można zacząć szkołę muzyczną 28:35 - Nauka śpiewu od 15. roku życia 30:09 - Co daje szkoła muzyczna 34:55 - Nauka nie poszła w las. KonkursZobacz pozostałe odsłony Ojcowskiej Strony Mocy Podcast: http://www.ojcowskastronamocy.pl/podcast FB: https://www.facebook.com/OjcowskaStronaMocy IG: https://www.instagram.com/OjcowskaStronaMocy Blog: http://www.ojcowskastronamocy.pl Życzę Ci, byś każdego dnia stawał się lepszym ojcem i lepszym człowiekiem oraz byś zawsze powodował uśmiech na twarzach swoich dzieci Zapraszam Jarek Kania #polskipodcast #chcesięgrać

Rozmowa Kontrolowana
Odcinek 31 – Joanna Rutkowska

Rozmowa Kontrolowana

Play Episode Listen Later Nov 8, 2020 74:59


Gościem trzydziestego pierwszego odcinka podcastu Rozmowa Kontrolowana jest Joanna Rutkowska, kiedyś hakerka i twórczyni systemu QUBES, dzisiaj pracująca nad nowatorskim systemem kontenerów na dane Wildlands. Odwiedź stronę podcastu pod adresem https://live.zaufanatrzeciastrona.pl/, zapisz się do newslettera i otrzymuj powiadomienia o nowych odcinkach Rozmowy Kontrolowanej.… Czytaj dalej The post Odcinek 31 – Joanna Rutkowska first appeared on Zaufana Trzecia Strona.

odcinek wildlands czytaj odwied joanna rutkowska zaufana trzecia strona
Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference
Joanna Rutkowska: Subverting Vista Kernel For Fun And Profit (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 84:12


"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassing the (in)famous Vista policy for allowing only digitally singed code to be loaded into kernel. The presented attack does not requite system reboot. Next, the new technology for creating stealth malware, code-named Blue Pill, will be presented. Blue Pill utilizes the latest virtualization technology from AMD - Pacifica - to achieve unprecedented stealth. The ultimate goal is to demonstrate that is possible (or soon will be) to create an undetectable malware which is not based on a concept, but, similarly to modern cryptography, on the strength of the 'algorithm'."

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Joanna Rutkowska: Rootkits vs Stealth by design Malware

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 79:50


"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassing the (in)famous Vista policy for allowing only digitally singed code to be loaded into kernel. The presented attack does not requite system reboot. Next, the new technology for creating stealth malware, code-named Blue Pill, will be presented. Blue Pill utilizes the latest virtualization technology from AMD - Pacifica - to achieve unprecedented stealth. The ultimate goal is to demonstrate that is possible (or soon will be) to create an undetectable malware which is not based on a concept, but, similarly to modern cryptography, on the strength of the 'algorithm'. Joanna Rutkowska has been involved in computer security research for several years. She has been fascinated by the internals of operating systems since she was in primary school and started learning x86 assembler on MS-DOS. Soon after she switched to Linux world, gotinvolved with some system and kernel programming, focusing on exploit development for both Linux and Windows x86 systems. A couple of years ago she has gotten very interested in stealth technology as used by malware and attackers to hide their malicious actions after a successful break-in. This includes various types of rootkits, network backdoors and covert channels. She now focuses on both detecting this kind of activity and on developing and testing new offensive techniques. She currently works as a security researcher for COSEINC, a Singapore based IT security company."

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Joanna Rutkowska: Rootkits vs Stealth by design Malware

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 79:50


The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassing the (in)famous Vista policy for allowing only digitally singed code to be loaded into kernel. The presented attack does not requite system reboot. Next, the new technology for creating stealth malware, code-named Blue Pill, will be presented. Blue Pill utilizes the latest virtualization technology from AMD - Pacifica - to achieve unprecedented stealth. The ultimate goal is to demonstrate that is possible (or soon will be) to create an undetectable malware which is not based on a concept, but, similarly to modern cryptography, on the strength of the 'algorithm'. Joanna Rutkowska has been involved in computer security research for several years. She has been fascinated by the internals of operating systems since she was in primary school and started learning x86 assembler on MS-DOS. Soon after she switched to Linux world, gotinvolved with some system and kernel programming, focusing on exploit development for both Linux and Windows x86 systems. A couple of years ago she has gotten very interested in stealth technology as used by malware and attackers to hide their malicious actions after a successful break-in. This includes various types of rootkits, network backdoors and covert channels. She now focuses on both detecting this kind of activity and on developing and testing new offensive techniques. She currently works as a security researcher for COSEINC, a Singapore based IT security company."

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Joanna Rutkowska & Alexander Tereshkin: IsGameOver(), anyone?

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Play Episode Listen Later Jan 9, 2006 75:41


We will present new, practical methods for compromising Vista x64 kernel on the fly and discuss the irrelevance of TPM/Bitlocker technology in protecting against such non-persistent attacks. Then we will briefly discuss kernel infections of the type II (pure data patching), especially NDIS subversions that allow for generic bypassing of personal firewalls on Vista systems. A significant amount of time will be devoted to presenting new details about virtualization-based malware. This will include presenting various detection methods that could be used to either detect the presence of a hypervisor or find the malware itself. We will also discuss why each of these approaches cannot be used to build a practical detector, either because they could be fully defeated by virtualization based malware or because they are very impractical. This will include demonstration of how virtualization based malware can avoid timing-based detection, even if a detector uses trusted time source. We will also discuss detection approaches based on exploiting CPU bugs. The conclusion of this part is that we still do not have any good way to detect virtualization based malware... Were also going to talk about malware that fully supports nested virtualization (like e.g. our New Blue Pill does) and how this might be a challenge for OSes that would like to provide their own hypervisors in order to prevent Blue Pill-like attacks. People say that once an attacker gets into the kernel, the game is over and we should reinstall the whole system from scratch. In this presentation we show that sometimes we cannot know that the game is actually over, so we do not even know when to stop trusting our systems. In order to change this we need something more then just a bunch of patches! Joanna Rutkowska is a recognized researcher in the field of stealth malware and system compromises. Over the past several years she has introduced several breakthrough concepts and techniques on both the offensive and defensive side in this field. Her work has been quoted by the international press and she is a frequent speaker at security conferences around the world. In April 2007 she founded Invisible Things Lab, a consulting company dedicated for cutting-edge research into operating systems security. Alexander Tereshkin, aka 90210, is a seasoned reverse engineer and expert into Windows kernel, specializing in rootkit technology and kernel exploitation. He presented several sophisticated ideas for rootkit creation and personal firewall bypassing in the past few years. During the last year, when working for COSEINC Advanced Malware Labs, he has done significant work in the field of virtualization based malware and kernel protection bypassing.

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Joanna Rutkowska & Alexander Tereshkin: IsGameOver(), anyone?

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.

Play Episode Listen Later Jan 9, 2006 75:41


We will present new, practical methods for compromising Vista x64 kernel on the fly and discuss the irrelevance of TPM/Bitlocker technology in protecting against such non-persistent attacks. Then we will briefly discuss kernel infections of the type II (pure data patching), especially NDIS subversions that allow for generic bypassing of personal firewalls on Vista systems. A significant amount of time will be devoted to presenting new details about virtualization-based malware. This will include presenting various detection methods that could be used to either detect the presence of a hypervisor or find the malware itself. We will also discuss why each of these approaches cannot be used to build a practical detector, either because they could be fully defeated by virtualization based malware or because they are very impractical. This will include demonstration of how virtualization based malware can avoid timing-based detection, even if a detector uses trusted time source. We will also discuss detection approaches based on exploiting CPU bugs. The conclusion of this part is that we still do not have any good way to detect virtualization based malware... Were also going to talk about malware that fully supports nested virtualization (like e.g. our New Blue Pill does) and how this might be a challenge for OSes that would like to provide their own hypervisors in order to prevent Blue Pill-like attacks. People say that once an attacker gets into the kernel, the game is over and we should reinstall the whole system from scratch. In this presentation we show that sometimes we cannot know that the game is actually over, so we do not even know when to stop trusting our systems. In order to change this we need something more then just a bunch of patches! Joanna Rutkowska is a recognized researcher in the field of stealth malware and system compromises. Over the past several years she has introduced several breakthrough concepts and techniques on both the offensive and defensive side in this field. Her work has been quoted by the international press and she is a frequent speaker at security conferences around the world. In April 2007 she founded Invisible Things Lab, a consulting company dedicated for cutting-edge research into operating systems security. Alexander Tereshkin, aka 90210, is a seasoned reverse engineer and expert into Windows kernel, specializing in rootkit technology and kernel exploitation. He presented several sophisticated ideas for rootkit creation and personal firewall bypassing in the past few years. During the last year, when working for COSEINC Advanced Malware Labs, he has done significant work in the field of virtualization based malware and kernel protection bypassing.