У нас вы можете посмотреть бесплатно The Hidden Battle Behind Blocking Malware | Peter Lowe | Defender's Log или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
How much work goes into maintaining one of the most widely used ad and tracking blocklists on the internet? In this clip, David Redekop sits down with Peter Lowe to discuss the daily reality of managing a massive domain list, the "cat and mouse" game with tracking companies, and why blocklisting remains a vital secondary filter in an "Allow List" world. Peter shares insights into his weekly routine—balancing legitimate de-listing requests against cheeky complaints from tracking companies—and why he still wakes up every day excited to solve these problems. The two also dive into the philosophy of internet safety, discussing the balance between technology and human involvement when it comes to protecting vulnerable users and the role of "Eat the Frog" productivity in a high-stakes engineering environment. In this video, you’ll learn about: The Maintenance Load: How Peter manages the list in just 2-3 hours a week. The Tracking Wars: Why parent domains get blocked and how Peter handles angry tracking companies. Allow Listing vs. Blocklisting: Why even a perfect "Allow List" needs a strong blocklist as a secondary filter. The Future of AI: Why Peter believes the internet’s problems will repeat themselves in the world of Artificial Intelligence. The Human Element: Why technology alone isn't enough to protect children and students online—and why the teacher/parent relationship is the ultimate "filter." Key Moments: 0:00 – How many hours a week does maintenance take? 1:15 – Handling "annoyed" tracking companies. 2:30 – "I eat frogs for breakfast": David on productivity. 3:45 – The shift from blocklisting to Allow Listing. 5:10 – The "Human Element" in digital safety and neural networks.