Search for "31" returned 4039 results

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
60 min

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik

Politische Phrasologie – warum man aus dem ganzen Zeug, das…

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

The mummy unwrapped
56 min

The mummy unwrapped

Cultural Commons durch Kunstraub

"Day 2 Ops" Linux for Kubernetes and Container Workloads
54 min

"Day 2 Ops" Linux for Kubernetes and Container Workloads

Leveraging 10 years of Container Linux experience for…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Keine Anhaltspunkte für flächendeckende Überwachung
66 min

Keine Anhaltspunkte für flächendeckende Überwachung

Die Diskussion um NSA, PRISM, Tempora sprachlich und…