Search for "18" returned 4654 results

Wie man einen Blackout verursacht
62 min

Wie man einen Blackout verursacht

und warum das gar nicht so einfach ist.

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

Console Hacking
72 min

Console Hacking

Breaking the 3DS

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

SpiegelMining – Reverse Engineering von Spiegel-Online
58 min

SpiegelMining – Reverse Engineering von Spiegel-Online

Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Hebocon
50 min

Hebocon

The sumo robot fight for the technically ungifted

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time