Search for "windows" returned 684 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

qaul
23 min

qaul

Resilient Communication during Blackouts & Internet…

Infrastructure of a migratory bird
41 min

Infrastructure of a migratory bird

Technology and autonomy in more-than-human networks

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

The Tor Network
62 min

The Tor Network

We're living in interesting times

Security Nightmares
90 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…