Search for "32" returned 4077 results
60 min
Vor Windows 8 wird gewarnt
Und nichts (Secure) Bootet mehr?
32 min
Verified Firewall Ruleset Verification
Math, Functional Programming, Theorem Proving, and an…
40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks
26 min
Hacking the World
The struggle for security for all.
33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…
28 min
Home Distilling
Theory and practice of moonshining and legal distilling
33 min
Hacking as Artistic Practice
!Mediengruppe Bitnik about their recent works
33 min
Computer Science in the DPRK
A view into technology on the other side of the world
60 min
the possibility of an army
phone verified accounts bringing the Hessian army back to…
32 min
Visceral Systems
Approaches to working with sound and network data…
36 min
Modchips of the State
Hardware implants in the supply-chain
58 min