61 min
Creating a rogue CA Certificate
94 min
Oder: worüber wir nächstes Jahr lachen werden
48 min
Reverse Engineering von 3D-Dateiformaten
92 min
Or: about what we will laugh next year
44 min
Building an anonymous Internet within the Internet
48 min
Hide and Seek in A. Flash
46 min
Turning data into line noise and back
82 min
First look at the security of NFC mobile phones
38 min
How to get useable information out of your honeypot
62 min
Past, present, and future
61 min
Everything about the C64 in 64 Minutes
66 min
The Digital Enhanced Cordless Telecommunications standard
61 min
Essentielles Grundwissen für alle, die nichts zu verbergen…
35 min
A clever or ingenious device or expedient; adroit…
65 min
Behind the scenes of the new light installation
63 min
Overview of Current Keylogger Threats
56 min
Dissecting contemporary cellphone hardware
61 min
Not your mother's XSS bugs
63 min
Symbian Exploit and Shellcode Development
30 min
Accepting the Partial Disclosure Challenge
56 min
Is implementation the enemy of design?
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
50 min
Open source BIOS replacement with a radical approach to…
58 min
Recovering keys and other secrets after power off
58 min
Pwning Apple's Mobile Internet Device
58 min
Tampering the Tamper-Proof
50 min
PowerLineCommunications has now their open source tool
61 min
Bestandsaufnahme und Auswirkungen