Related lectures (9)
Sudo Bug Exploitation: Demo
Demonstrates exploiting a bug in Sudo to run commands as root when restricted.
Biometrics & Tokens: Advantages, Authentication, & Adversarial Reasoning
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Quantum Search: Grover Algorithm
Explores the Grover algorithm, a quantum search algorithm with quadratic speedup, covering quantum circuits, final states, and geometric interpretations.
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Mass Conservation: Lapazian Laws
Covers the principles of mass conservation and Lapazian laws in fluid dynamics.
Discretionary Access Control: Linux and Windows
Explores access control in Linux and Windows, covering Unix user identities, file access control lists, special users, super users, and Windows' discretionary access control lists.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.