Concept

User Account Control

Related lectures (16)
Sudo Bug Exploitation: Demo
Demonstrates exploiting a bug in Sudo to run commands as root when restricted.
Clustering Stability: Methods and Computations
Covers the quantification of clustering stability and methods to save expensive computations and predictability diagnostics.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Digital Turn in History: Culturomics and Data Visualization
Delves into culturomics, a computational approach to studying cultural trends through quantitative analysis of digitized textual data.
Discretionary Access Control: Linux and Windows
Explores access control in Linux and Windows, covering Unix user identities, file access control lists, special users, super users, and Windows' discretionary access control lists.
Covariance Cleaning and Estimators
Explores covariance matrix cleaning, optimal estimators, and rotationally invariant methods for portfolio optimization.
Fair distribution of water
Explores the economic value of nature, virtual water in trade, demographic growth, and strategies for water security.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.