Search for "42" returned 3654 results

Was schützt eigentlich der Datenschutz?
62 min

Was schützt eigentlich der Datenschutz?

Warum DatenschützerInnen aufhören müssen von individueller…

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

Computer, die über Asyl (mit)entscheiden
59 min

Computer, die über Asyl (mit)entscheiden

Wie das BAMF seine Probleme mit Technik lösen wollte und…

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux