Défis passés et futurs pour Tor
Loading
0 %
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + coma | Decrease playback speed |
shift + dot or shift + semicolon | Increase playback speed |
end | Seek to end |
beginning | Seek to beginning |
You can right click on slides to open the menu
Information on this media
Links:
Creation date:
July 8th, 2014, 3:17 p.m.Add date:
July 10th, 2014, 6:29 p.m.Number of views:
148Speaker:
LunarLicense:
CC BY SA v4Visibility:
This media is publishedDescription
http://2014.rmll.info/conference311
Other media in the channel "Sécurité"
108 viewsJoue à la cryptoJuly 16th, 2014
140 views, 1 this monthDécouverte et utilisation d'une YubiKey de YubicoJuly 15th, 2014
58 viewsSécuriser votre serveur web avec une authentification à deux facteurs YubikeyJuly 15th, 2014
39 viewsGérer ses politiques de mots de passe dans OpenLDAPJuly 15th, 2014
68 viewsHandicap visuel: quels impacts sur la sécurité?July 15th, 2014
24 viewsRace condition in WordPress plugin allows php remote code executionJuly 15th, 2014