Search for "30" returned 4243 results

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Die Sprache der Überwacher
32 min

Die Sprache der Überwacher

Wie in Österreich über Sicherheit und Überwachung…

Hacker Jeopardy
115 min

Hacker Jeopardy

Zahlenraten für Geeks

Die Krise der Bilder ist die Krise der Politik
58 min

Die Krise der Bilder ist die Krise der Politik

Die Krise der Politik ist die Krise der Bilder

SuperMUC-NG
62 min

SuperMUC-NG

… und das Rennen um den schnellsten Computer der Welt

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

YOUR DATA MIRROR
35 min

YOUR DATA MIRROR

Wie die Macht der Daten die Demokratie untergräbt

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Ethics in the data society
35 min

Ethics in the data society

Power and politics in the development of the driverless car

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…