Search for "15" returned 4930 results

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

Desinformation und Fake News
42 min

Desinformation und Fake News

Bekämpfung und Verifizierung leicht gemacht

Console Hacking
72 min

Console Hacking

Breaking the 3DS

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Fallstricke der Anonymisierung
44 min

Fallstricke der Anonymisierung

Auf unserer Onlineplattform können Studierende…

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Welcome Pattern - Theorie und Praxis
40 min

Welcome Pattern - Theorie und Praxis

(Eine Gemeinschaftsproduktion der Haecksen, der…

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

The mummy unwrapped
56 min

The mummy unwrapped

Cultural Commons durch Kunstraub

net neutrality: days of future past?
60 min

net neutrality: days of future past?

Taking stock after two years of net neutrality in the…