Search for "28" returned 4396 results

Hacker Jeopardy
115 min

Hacker Jeopardy

Zahlenraten für Geeks

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Uncertain Concern
58 min

Uncertain Concern

How Undocumented Immigrants in the US Navigate Technology

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Relativitätstheorie für blutige Anfänger
32 min

Relativitätstheorie für blutige Anfänger

Raum, Zeit, Licht und Gravitation, wie hängt das zusammen?

Fnord-Jahresrückblick
99 min

Fnord-Jahresrückblick

Wir helfen euch, die Fnords zu sehen!

Nougatbytes 11₂
107 min

Nougatbytes 11₂

Die geekige Wort- & Bilderrätselspielshau ist zuЯück

Conquering Large Numbers at the LHC
41 min

Conquering Large Numbers at the LHC

From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…

SymbiFlow - Finally the GCC of FPGAs!
62 min

SymbiFlow - Finally the GCC of FPGAs!

A fully FOSS, Verilog to bitstream, timing driven, cross…

Console Hacking
72 min

Console Hacking

Breaking the 3DS

Simulating Universes
60 min

Simulating Universes

What Virtual Universes Can Tell Us About Our Own

How to teach programming to your loved ones
59 min

How to teach programming to your loved ones

Enabling students over example-driven teaching

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

YOUR DATA MIRROR
35 min

YOUR DATA MIRROR

Wie die Macht der Daten die Demokratie untergräbt

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it