Search for "32" returned 4077 results

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Hacking the World
26 min

Hacking the World

The struggle for security for all.

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

Hacking as Artistic Practice
33 min

Hacking as Artistic Practice

!Mediengruppe Bitnik about their recent works

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

Afro TECH
30 min

Afro TECH

Afrofuturism, Telling tales of speculative futures

the possibility of an army
60 min

the possibility of an army

phone verified accounts bringing the Hessian army back to…

Visceral Systems
32 min

Visceral Systems

Approaches to working with sound and network data…

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…