Remove Examples Remove Libraries Remove Metadata Remove Presentation
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Example: peframe file_name.

Libraries 102
article thumbnail

Recap of the 2022 Best Practice Exchange/CoSA (un)conference

Preservica

Inevitably my google search will return a presentation title from a previous BPE (un)conference that seems to perfectly answer my question. As a former archivist at the Texas State Library and Archives Commission, the Council of State Archivists (CoSA) will forever be on my radar. This was finally my year for BPE/CoSA! Thank you TSLA!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Maximizing Your Sharepoint Investment

AIIM

Files are uploaded but do not have any corresponding metadata to make them searchable. For example, someone misplaces a document and uploads another version of it. After creating the site, you will want to create Document Libraries for each of the different types of files that will be stored in the site.

Libraries 190
article thumbnail

Erwin Data Intelligence: A Data Partner’s Perspective

erwin

Technology is an enabler, and for data governance this is essentially having an excellent metadata management tool. Examples of complementary technologies include technology for data warehouse automation, change data capture and master data management. Next to data governance, data architecture is really embedded in our DNA.

article thumbnail

2023 Archive-It Partner Meeting Recap

Archive-It

Public Library’s Martin Luther King Jr. In the second hour, Ruth Bryan, University Archivist from the University of Kentucky (UK) Special Collections Research Center (SCRC) presented UK Libraries’ Wildcat Histories: Preserving Student Activist Social Media Content. Memorial branch.

article thumbnail

Feature Spotlight: Internal Seeds Groups

Archive-It

As of March 2023, the top names given to these internal seed groups were: ‘Fix’ (21) ‘7’ (7) A three-way tie: ‘Twitter’ (5), ‘QA seeds’ (5), ‘needs metadata’ (5) And of course there were many unique group names, meaningful perhaps only to those at the organizations.

article thumbnail

How Mayhem Helped Uncover a Security Vulnerability in RustOS (CVE-2022-36086)

ForAllSecure

The target of interest for this example comes from Philipp Opperman's amazing " BlogOS ". This library is designed for use in embedded and bootloader contexts, where we don't have the standard library's Vec or Box for dynamic memory. We can't just call Heap::deallocate , for example, with a randomly generated pointer!