52 min
Practical Mac OS X Insecurity
Security Concepts, Problems, and Exploits on Your Mac
85 min
How to find *anything* on the Web
Advanced internet searching strategies & "wizard seeking"…
45 min
The Kernel Accelerator Device
Reconfigurable computing for the kernel
46 min
Secure Instant Messaging
Suppression of secure communications by governments
110 min
SPAM Workshop
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
117 min
Honeypot Forensics
No stone unturned or: logs, what logs?
64 min
Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
Untersuchung eines Austauschsystems für hochsensible…
58 min
Physical Security
The Good, the Bad and the Ugly
115 min
Passive covert channels in the Linux kernel
Implementation and detection of kernel based backdoors and…
29 min
Mehr Sicherheit für HostAP-WLANs
WLANs mit Wi-Fi Protected Access (WPA) betreiben
45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems
34 min