Search for "13" returned 4826 results

lasers in space
29 min

lasers in space

more than just pew pew!

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Locked up science
41 min

Locked up science

Tearing down paywalls in scholarly communication

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

the possibility of an army
60 min

the possibility of an army

phone verified accounts bringing the Hessian army back to…

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows

The Ultimate Amiga 500 Talk
53 min

The Ultimate Amiga 500 Talk

Amiga Hardware Design And Programming

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

net neutrality: days of future past?
60 min

net neutrality: days of future past?

Taking stock after two years of net neutrality in the…