Popular Events

All - 2024 - 2023 - 2022 - 2021 - 2020 - 2019 - 2018 - 2017 - 2016 - 2015 - 2014 - 2013 - 2012 - 2011 - 2010 - 2009 - 2008 - 2007 - 2006 - 2005 - 2004 - 2003 - 2002 - 2001 - 2000
ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

Your Disaster/Crisis/Revolution just got Pwned
45 min

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis…

Wrangling Git
50 min

Wrangling Git

Git power tips for the intermediate Git user

Test-Driven Web Development
47 min

Test-Driven Web Development

Treating your web application like the grown-up it is

Strahlung im Weltall
43 min

Strahlung im Weltall

Hell yeah, it's radiation science!

Deduplication
51 min

Deduplication

Wie funktioniert es? Wofür kann man es Nutzen? Wofür nicht?

Eight rollouts a day keeping downtime away
53 min

Eight rollouts a day keeping downtime away

The philosophy of shared space in a development environment

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles
57 min

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles

Lessons learned from producing a weekly independent podcast…

There's Gold in Them Circuit Boards
65 min

There's Gold in Them Circuit Boards

Why E-Waste Recycling Is Smart and How To Make It Smarter

Hybrid rocket engines
52 min

Hybrid rocket engines

Design and implementation of rocket engines with two-phase…

Macro dragnets: Why trawl the river when you can do the whole ocean
60 min

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st…

Pentanews Game Show 2k11/3
107 min

Pentanews Game Show 2k11/3

42 new questions, new jokers, same concept, more fun than…

Strong encryption of credit card information
51 min

Strong encryption of credit card information

Attacks on common failures when encrypting credit card…

next