21C3: The Usual Suspects

Hacking

Full playlist: Video / Audio
Bluetooth Hacking
97 min

Bluetooth Hacking

How to find *anything* on the Web
85 min

How to find *anything* on the Web

Advanced internet searching strategies & "wizard seeking"…

Inside PDF
54 min

Inside PDF

XMPP/Jabber
34 min

XMPP/Jabber

Introducing the 'lingua franca' of Instant Messaging

Honeypot Forensics
117 min

Honeypot Forensics

No stone unturned or: logs, what logs?

Passive covert channels in the Linux kernel
115 min

Passive covert channels in the Linux kernel

Implementation and detection of kernel based backdoors and…

SPAM Workshop
110 min

SPAM Workshop

SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

Gentoo Hardened
52 min

Gentoo Hardened

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

Edit This Page
45 min

Edit This Page

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
64 min

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand

Untersuchung eines Austauschsystems für hochsensible…

The Kernel Accelerator Device
45 min

The Kernel Accelerator Device

Reconfigurable computing for the kernel

Secure Instant Messaging
46 min

Secure Instant Messaging

Suppression of secure communications by governments

Mehr Sicherheit für HostAP-WLANs
29 min

Mehr Sicherheit für HostAP-WLANs

WLANs mit Wi-Fi Protected Access (WPA) betreiben

The Convergence of Anti-Counterfeiting and Computer Security
45 min

The Convergence of Anti-Counterfeiting and Computer Security

Reverse-engineering currency detection systems

Physical Security
58 min

Physical Security

The Good, the Bad and the Ugly

Phishing the Web
40 min

Phishing the Web

Physical Security
44 min

Physical Security