117 min
Honeypot Forensics
No stone unturned or: logs, what logs?
85 min
How to find *anything* on the Web
Advanced internet searching strategies & "wizard seeking"…
29 min
Mehr Sicherheit für HostAP-WLANs
WLANs mit Wi-Fi Protected Access (WPA) betreiben
115 min
Passive covert channels in the Linux kernel
Implementation and detection of kernel based backdoors and…
58 min
Physical Security
The Good, the Bad and the Ugly
52 min
Practical Mac OS X Insecurity
Security Concepts, Problems, and Exploits on Your Mac
46 min
Secure Instant Messaging
Suppression of secure communications by governments
64 min
Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
Untersuchung eines Austauschsystems für hochsensible…
110 min
SPAM Workshop
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems
45 min
The Kernel Accelerator Device
Reconfigurable computing for the kernel
34 min