Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Introduction
00:00 • 4min
How to Change the Rules of a Sandbox Without Changing the Kernel
03:34 • 2min
How to Use eBPF to Create a Linux Kernel That Responds to Certain Hooks
05:14 • 2min
The Limitations of eBPF
07:10 • 2min
Microsoft's Porting BPF to Windows
09:16 • 2min
How to Write Programs That Run in Kernel Space
11:01 • 2min
The Advantages of eBPF for Tracing
12:46 • 4min
How to Write an eBPF Program in C
17:00 • 3min
How to Use Slack to Manage Incidents
19:48 • 2min
EVBF: A Targeted Tool for Security
21:58 • 2min
How to Monitor Memory Allocation
23:43 • 2min
How to Debug a Production Issue in Prod
25:16 • 2min
The Benefits of Writing eBPF Code
27:12 • 2min
What's It Like to Work With a Rockstar?
29:03 • 2min
How to Implement eBPF-based Load Balancing
30:39 • 2min
How to Write and Use eBPF Programs and Go Against Go
32:10 • 3min
How to Use a Ring Buffer in an eBPF Program
35:11 • 2min
The Different Features of eBPF Go
36:58 • 2min
How to Use Lib BPF Go to Build a File Watcher
38:35 • 2min
The Future of eBPF
40:49 • 2min
The Future of LiveBPF
42:48 • 2min
The Importance of a Security Engineer on Every Team
45:11 • 2min
The Future of Software Development
46:52 • 2min
Snake Cases Better Than Camel Case
48:37 • 2min
Snake Case Versus Camel Case
50:15 • 2min
The Unpopular Opinion
51:52 • 2min
The Unpopularity of Grant Grant on Twitter
53:31 • 2min
How to Be a Go Developer
55:18 • 2min
How the Sausage Gets Made
57:14 • 2min